Fw: Re: openiked.org down?

2020-01-10 Thread lu hu
Hello?

https://www.openiked.org/ is still down.

Thanks.


> Sent: Tuesday, January 07, 2020 at 8:27 PM
> From: "lu hu" 
> To: direct...@openbsdfoundation.org
> Subject: Fw: Re: openiked.org down?
>
> Hello,
>
> can you please help to bring back
>
> https://www.openiked.org/
>
> to life? someone even updated the wiki page to 
> https://en.wikipedia.org/wiki/OpenIKED
>
>
> > Sent: Sunday, January 05, 2020 at 3:10 PM
> > From: "lu hu" 
> > To: misc@openbsd.org, t...@openbsd.org
> > Subject: Re: openiked.org down?
> >
> > who can bring up openiked.org to life?
> >
> > > Sent: Tuesday, December 31, 2019 at 4:14 PM
> > > From: "Umgeher Torgersen" 
> > > To: misc@openbsd.org
> > > Subject: Re: openiked.org down?
> > >
> > > yeah, it's down...
> > >
> > > ; <<>> DiG 9.4.2-P2 <<>> openiked.org
> > > ;; global options:  printcmd
> > > ;; Got answer:
> > > ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58691
> > > ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
> > >
> > > ;; QUESTION SECTION:
> > > ;openiked.org.  IN  A
> > >
> > > ;; AUTHORITY SECTION:
> > > openiked.org.   2496IN  SOA
> > > a.ns.bsws.de. noc.bsws.de. 1577745128 1 3600 604800 86400
> > >
> > > ;; Query time: 0 msec
> > > ;; SERVER: 10.0.5.5#53(10.0.5.5)
> > > ;; WHEN: Tue Dec 31 15:14:22 2019
> > > ;; MSG SIZE  rcvd: 82
> > >
> > > On Tue, Dec 31, 2019 at 03:08:47PM +0100, lu hu wrote:
> > > > Hello,
> > > >
> > > > did anyone noticed that the https://openiked.org/ is down?
> > > >
> > > > NO "A" record is associated with the domain?
> > > >
> > > > Thanks for any infos.
> > > >
> > >
> > >
> >
> >



Re: Why isn't ChallengeResponseAuthentication NO in sshd_config?

2020-01-08 Thread lu hu
Hello, 

even the very first remote hole for OpenBSD, back in 2002 was about that the: 

https://web.archive.org/web/20160915002152/http://www.iss.net/threats/advise123.html
https://www.cvedetails.com/cve/CVE-2002-0639/

"ChallengeResponseAuthentication" was set to yes.. (it was more, but it would 
be mitigated with setting to "NO")


So I think ChallengeResponseAuthentication should be set to NO, since it is not 
used by anything by default (you need manual steps as root to use ex.: skey).


But please, correct me, I just want to point out an attack surface reduction in 
OpenSSH + OpenBSD. 


Many thanks. 




> Sent: Sunday, December 29, 2019 at 6:07 PM
> From: "lu hu" 
> To: misc@openbsd.org
> Subject: Re: Why isn't ChallengeResponseAuthentication NO in sshd_config?
>
> Hello: 
> 
> 66# grep -i challenge /etc/ssh/sshd_config
> #ChallengeResponseAuthentication yes
> 66# sshd -T|grep -i challenge
> challengeresponseauthentication yes
> 66#
> 
> it doesn't counts if it is commented out, since it is by default YES as I 
> started the thread with: 
> 
> > > 
> > > # what am I talking about?
> > >
> > > https://man.openbsd.org/sshd_config#ChallengeResponseAuthentication
> > >
> > > ChallengeResponseAuthentication
> > > Specifies whether challenge-response authentication is allowed. All
> > > authentication styles from login.conf(5) are supported. The default is
> > > yes.
> 
> 
> 
> anyone in this world that understands what am I trying to point out?  :)
> 
> with all the infos so far I have, the "ChallengeResponseAuthentication" 
> should be by default NO. but it isn't currently. 
> 
> maybe someone from the devs? or sorry, am I posting to the wrong list? 
> 
> Really Many Thanks. 
> 
> Happy New Year!
> 
> 
> 
> > Sent: Monday, December 23, 2019 at 1:58 PM
> > From: "Jan Betlach" 
> > To: "lu hu" 
> > Cc: misc@openbsd.org
> > Subject: Re: Why isn't ChallengeResponseAuthentication NO in sshd_config?
> >
> > 
> > Isn’t it commented out by default?
> > 
> > Jan
> > 
> > 
> > > Hello,
> > >
> > > nobody about the $subject? :)
> > >
> > > Why isn't ChallengeResponseAuthentication NO in sshd_config by 
> > > default?
> > >
> > > It would be more secure, afaik.
> > >
> > > Many thanks.
> > >
> > >
> > >> Sent: Thursday, December 19, 2019 at 7:58 PM
> > >> From: "lu hu" 
> > >> To: misc@openbsd.org
> > >> Subject: Re: Why isn't ChallengeResponseAuthentication NO in 
> > >> sshd_config?
> > >>
> > >>> Sent: Wednesday, December 18, 2019 at 9:49 PM
> > >>> From: "Bodie" 
> > >>> To: misc@openbsd.org, owner-m...@openbsd.org
> > >>> Subject: Re: Why isn't ChallengeResponseAuthentication NO in 
> > >>> sshd_config?
> > >>>
> > >>>
> > >>>
> > >>> On 18.12.2019 18:48, lu hu wrote:
> > >>>> Hello,
> > >>>>
> > >>>> 
> > >>>> # what am I talking about?
> > >>>>
> > >>>> https://man.openbsd.org/sshd_config#ChallengeResponseAuthentication
> > >>>>
> > >>>> ChallengeResponseAuthentication
> > >>>>Specifies whether challenge-response authentication is allowed. 
> > >>>> All
> > >>>> authentication styles from login.conf(5) are supported. The default 
> > >>>> is
> > >>>> yes.
> > >>>>
> > >>>> 
> > >>>> # what does linux distros use:
> > >>>>
> > >>>> If I ex.: read:
> > >>>>
> > >>>> https://access.redhat.com/solutions/336773
> > >>>>
> > >>>> then I can see ChallengeResponseAuthentication is NO for security
> > >>>> reasons. Ubuntu too.
> > >>>>
> > >>>> 
> > >>>> # what else says ChallengeResponseAuthentication should be NO?
> > >>>>
> > >>>> https://www.openwall.com/lists/oss-security/2019/12/04/5
> > >>>> ->
> > >>>
> > >>> These issues were quickly fixed in OpenBSD as you can see in 
> > >>> Security
> > >>>
> > >>

possible SSH algorithm issues?

2020-01-08 Thread lu hu
Hello,

used https://www.sshaudit.com/ + ssh-audit package

###

by default OpenBSD 6.6 ssh client (SSH-2.0-OpenSSH_8.1) has issues:

Host Key Types: nistp should be removed
Key Exchange Algorithms: nistp should be removed, also 
diffie-hellman-group14-sha1: SHA-1 has exploitable weaknesses.
Message Authentication Codes: umac-64-...@openssh.com MAC uses small tag size. 
+ hmac-sha1-...@openssh.com SHA-1 has exploitable weaknesses.  + 
umac...@openssh.com MAC uses small tag size. + hmac-sha1 SHA-1 has exploitable 
weaknesses.

###

by default OpenBSD 6.6 sshd server (SSH-2.0-OpenSSH_8.1) has issues:

# key exchange algorithms
(kex) ecdh-sha2-nistp256-- [fail] using weak elliptic curves
(kex) ecdh-sha2-nistp384-- [fail] using weak elliptic curves
(kex) ecdh-sha2-nistp521-- [fail] using weak elliptic curves

# host-key algorithms
(key) ecdsa-sha2-nistp256   -- [fail] using weak elliptic curves

###

are these real issues? nistp + weak macs. that are advised to be removed by 
ssh-audit?

Googled misc archives, didn't found any discussion about these! (yet)

Many thanks.



Fw: Re: sshd_config#PermitRootLogin typo

2020-01-05 Thread lu hu
fuck I did a typo, sorry, I wanted to write: 

66# sshd -T|grep -i permitr
permitrootlogin without-password
66#

really sorry. 

But the issue is still there. man page says there should be prohibit-password 
and not without-password

> Sent: Sunday, January 05, 2020 at 3:07 PM
> From: "lu hu" 
> To: misc@openbsd.org
> Subject: Re: sshd_config#PermitRootLogin typo
>
> yes!
> 
> > Sent: Sunday, January 05, 2020 at 3:00 PM
> > From: "Robert Klein" 
> > To: misc@openbsd.org
> > Subject: Re: sshd_config#PermitRootLogin typo
> >
> > On Sun, 5 Jan 2020 14:47:15 +0100
> > "lu hu"  wrote:
> > 
> > > Hello,
> > > 
> > > http://man.openbsd.org/sshd_config#PermitRootLogin
> > > says
> > > ...The default is prohibit-password.
> > > If this option is set to prohibit-password (or its deprecated alias,
> > > without-password), password and keyboard-interactive authentication
> > > are disabled for root.
> > > 
> > > SO:
> > > 
> > > if I remove the PermitRootLogin line from sshd_config, then rcctl
> > > restart sshd, then why can I see
> > > 
> > > 66# sshd -T|grep -i permitr
> > > permitrootlogin yes
> > > 66#
> > > 
> > > instead of prohibit-password ?
> > > 
> > > Thanks!
> > > 
> > 
> > Was the deleted one the only “PermitRootLogin” line in your
> > /etc/ssh/sshd_config? 
> > 
> >



Re: openiked.org down?

2020-01-05 Thread lu hu
who can bring up openiked.org to life?

> Sent: Tuesday, December 31, 2019 at 4:14 PM
> From: "Umgeher Torgersen" 
> To: misc@openbsd.org
> Subject: Re: openiked.org down?
>
> yeah, it's down...
>
> ; <<>> DiG 9.4.2-P2 <<>> openiked.org
> ;; global options:  printcmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58691
> ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
>
> ;; QUESTION SECTION:
> ;openiked.org.  IN  A
>
> ;; AUTHORITY SECTION:
> openiked.org.   2496IN  SOA
> a.ns.bsws.de. noc.bsws.de. 1577745128 1 3600 604800 86400
>
> ;; Query time: 0 msec
> ;; SERVER: 10.0.5.5#53(10.0.5.5)
> ;; WHEN: Tue Dec 31 15:14:22 2019
> ;; MSG SIZE  rcvd: 82
>
> On Tue, Dec 31, 2019 at 03:08:47PM +0100, lu hu wrote:
> > Hello,
> >
> > did anyone noticed that the https://openiked.org/ is down?
> >
> > NO "A" record is associated with the domain?
> >
> > Thanks for any infos.
> >
>
>



Fw: Re: Why isn't ChallengeResponseAuthentication NO in sshd_config?

2020-01-05 Thread lu hu
Hello, 

any thoughts anyone? 

> Sent: Sunday, December 29, 2019 at 6:07 PM
> From: "lu hu" 
> To: misc@openbsd.org
> Subject: Re: Why isn't ChallengeResponseAuthentication NO in sshd_config?
>
> Hello: 
> 
> 66# grep -i challenge /etc/ssh/sshd_config
> #ChallengeResponseAuthentication yes
> 66# sshd -T|grep -i challenge
> challengeresponseauthentication yes
> 66#
> 
> it doesn't counts if it is commented out, since it is by default YES as I 
> started the thread with: 
> 
> > > 
> > > # what am I talking about?
> > >
> > > https://man.openbsd.org/sshd_config#ChallengeResponseAuthentication
> > >
> > > ChallengeResponseAuthentication
> > > Specifies whether challenge-response authentication is allowed. All
> > > authentication styles from login.conf(5) are supported. The default is
> > > yes.
> 
> 
> 
> anyone in this world that understands what am I trying to point out?  :)
> 
> with all the infos so far I have, the "ChallengeResponseAuthentication" 
> should be by default NO. but it isn't currently. 
> 
> maybe someone from the devs? or sorry, am I posting to the wrong list? 
> 
> Really Many Thanks. 
> 
> Happy New Year!
> 
> 
> 
> > Sent: Monday, December 23, 2019 at 1:58 PM
> > From: "Jan Betlach" 
> > To: "lu hu" 
> > Cc: misc@openbsd.org
> > Subject: Re: Why isn't ChallengeResponseAuthentication NO in sshd_config?
> >
> > 
> > Isn’t it commented out by default?
> > 
> > Jan
> > 
> > 
> > > Hello,
> > >
> > > nobody about the $subject? :)
> > >
> > > Why isn't ChallengeResponseAuthentication NO in sshd_config by 
> > > default?
> > >
> > > It would be more secure, afaik.
> > >
> > > Many thanks.
> > >
> > >
> > >> Sent: Thursday, December 19, 2019 at 7:58 PM
> > >> From: "lu hu" 
> > >> To: misc@openbsd.org
> > >> Subject: Re: Why isn't ChallengeResponseAuthentication NO in 
> > >> sshd_config?
> > >>
> > >>> Sent: Wednesday, December 18, 2019 at 9:49 PM
> > >>> From: "Bodie" 
> > >>> To: misc@openbsd.org, owner-m...@openbsd.org
> > >>> Subject: Re: Why isn't ChallengeResponseAuthentication NO in 
> > >>> sshd_config?
> > >>>
> > >>>
> > >>>
> > >>> On 18.12.2019 18:48, lu hu wrote:
> > >>>> Hello,
> > >>>>
> > >>>> 
> > >>>> # what am I talking about?
> > >>>>
> > >>>> https://man.openbsd.org/sshd_config#ChallengeResponseAuthentication
> > >>>>
> > >>>> ChallengeResponseAuthentication
> > >>>>Specifies whether challenge-response authentication is allowed. 
> > >>>> All
> > >>>> authentication styles from login.conf(5) are supported. The default 
> > >>>> is
> > >>>> yes.
> > >>>>
> > >>>> 
> > >>>> # what does linux distros use:
> > >>>>
> > >>>> If I ex.: read:
> > >>>>
> > >>>> https://access.redhat.com/solutions/336773
> > >>>>
> > >>>> then I can see ChallengeResponseAuthentication is NO for security
> > >>>> reasons. Ubuntu too.
> > >>>>
> > >>>> 
> > >>>> # what else says ChallengeResponseAuthentication should be NO?
> > >>>>
> > >>>> https://www.openwall.com/lists/oss-security/2019/12/04/5
> > >>>> ->
> > >>>
> > >>> These issues were quickly fixed in OpenBSD as you can see in 
> > >>> Security
> > >>>
> > >>
> > >> This isn't related to the subject.
> > >>
> > >>>
> > >>>> 1. CVE-2019-19521: Authentication bypass
> > >>>>
> > >>>> this attack should be more mitigated if
> > >>>> ChallengeResponseAuthentication would be by default set to NO.
> > >>>>
> > >>>> 
> > >>>> # FIX:
> > >>>>
> > >>>> from this:
> > >>>>cat /etc/ssh/sshd_config
> > >>

Re: sshd_config#PermitRootLogin typo

2020-01-05 Thread lu hu
yes!

> Sent: Sunday, January 05, 2020 at 3:00 PM
> From: "Robert Klein" 
> To: misc@openbsd.org
> Subject: Re: sshd_config#PermitRootLogin typo
>
> On Sun, 5 Jan 2020 14:47:15 +0100
> "lu hu"  wrote:
> 
> > Hello,
> > 
> > http://man.openbsd.org/sshd_config#PermitRootLogin
> > says
> > ...The default is prohibit-password.
> > If this option is set to prohibit-password (or its deprecated alias,
> > without-password), password and keyboard-interactive authentication
> > are disabled for root.
> > 
> > SO:
> > 
> > if I remove the PermitRootLogin line from sshd_config, then rcctl
> > restart sshd, then why can I see
> > 
> > 66# sshd -T|grep -i permitr
> > permitrootlogin yes
> > 66#
> > 
> > instead of prohibit-password ?
> > 
> > Thanks!
> > 
> 
> Was the deleted one the only “PermitRootLogin” line in your
> /etc/ssh/sshd_config? 
> 
>



sshd_config#PermitRootLogin typo

2020-01-05 Thread lu hu
Hello,

http://man.openbsd.org/sshd_config#PermitRootLogin
says
...The default is prohibit-password.
If this option is set to prohibit-password (or its deprecated alias, 
without-password), password and keyboard-interactive authentication are 
disabled for root.

SO:

if I remove the PermitRootLogin line from sshd_config, then rcctl restart sshd, 
then why can I see

66# sshd -T|grep -i permitr
permitrootlogin yes
66#

instead of prohibit-password ?

Thanks!



openiked.org down?

2019-12-31 Thread lu hu
Hello,

did anyone noticed that the https://openiked.org/ is down?

NO "A" record is associated with the domain?

Thanks for any infos.



Blank/black screen for 6.6 - any general debugging hints?

2019-12-30 Thread lu hu
Hello,

I was using 6.5 on a desktop PC.

I did a sysupgrade, but after the blue boot text, I only get black/blank screen.

I don't think it is just the screen, since I cannot reach it via network.

I booted the 6.6 bsd.rd then did a clean install with 6.6. The same issue.

I downloaded the 6.5 bsd.rd/sets and clean installed it. IT WORKED! YAY!!!

So looks like, there is some issue with 6.6 on my HW.

So I will probably skip 6.6 on this HW and hope 6.7 will work :)


BUT:

I didn't found any MAN pages, DOCs, how to troubleshoot these kind of 
black/blank screen boot issues.

Any hints in general, what can I do next time to avoid a clean install of the 
older major version?

Many thanks and wishing peaceful holidays!



Re: Why isn't ChallengeResponseAuthentication NO in sshd_config?

2019-12-29 Thread lu hu
Hello: 

66# grep -i challenge /etc/ssh/sshd_config
#ChallengeResponseAuthentication yes
66# sshd -T|grep -i challenge
challengeresponseauthentication yes
66#

it doesn't counts if it is commented out, since it is by default YES as I 
started the thread with: 

> > 
> > # what am I talking about?
> >
> > https://man.openbsd.org/sshd_config#ChallengeResponseAuthentication
> >
> > ChallengeResponseAuthentication
> > Specifies whether challenge-response authentication is allowed. All
> > authentication styles from login.conf(5) are supported. The default is
> > yes.



anyone in this world that understands what am I trying to point out?  :)

with all the infos so far I have, the "ChallengeResponseAuthentication" should 
be by default NO. but it isn't currently. 

maybe someone from the devs? or sorry, am I posting to the wrong list? 

Really Many Thanks. 

Happy New Year!



> Sent: Monday, December 23, 2019 at 1:58 PM
> From: "Jan Betlach" 
> To: "lu hu" 
> Cc: misc@openbsd.org
> Subject: Re: Why isn't ChallengeResponseAuthentication NO in sshd_config?
>
> 
> Isn’t it commented out by default?
> 
> Jan
> 
> 
> > Hello,
> >
> > nobody about the $subject? :)
> >
> > Why isn't ChallengeResponseAuthentication NO in sshd_config by 
> > default?
> >
> > It would be more secure, afaik.
> >
> > Many thanks.
> >
> >
> >> Sent: Thursday, December 19, 2019 at 7:58 PM
> >> From: "lu hu" 
> >> To: misc@openbsd.org
> >> Subject: Re: Why isn't ChallengeResponseAuthentication NO in 
> >> sshd_config?
> >>
> >>> Sent: Wednesday, December 18, 2019 at 9:49 PM
> >>> From: "Bodie" 
> >>> To: misc@openbsd.org, owner-m...@openbsd.org
> >>> Subject: Re: Why isn't ChallengeResponseAuthentication NO in 
> >>> sshd_config?
> >>>
> >>>
> >>>
> >>> On 18.12.2019 18:48, lu hu wrote:
> >>>> Hello,
> >>>>
> >>>> 
> >>>> # what am I talking about?
> >>>>
> >>>> https://man.openbsd.org/sshd_config#ChallengeResponseAuthentication
> >>>>
> >>>> ChallengeResponseAuthentication
> >>>>  Specifies whether challenge-response authentication is allowed. 
> >>>> All
> >>>> authentication styles from login.conf(5) are supported. The default 
> >>>> is
> >>>> yes.
> >>>>
> >>>> 
> >>>> # what does linux distros use:
> >>>>
> >>>> If I ex.: read:
> >>>>
> >>>> https://access.redhat.com/solutions/336773
> >>>>
> >>>> then I can see ChallengeResponseAuthentication is NO for security
> >>>> reasons. Ubuntu too.
> >>>>
> >>>> 
> >>>> # what else says ChallengeResponseAuthentication should be NO?
> >>>>
> >>>> https://www.openwall.com/lists/oss-security/2019/12/04/5
> >>>> ->
> >>>
> >>> These issues were quickly fixed in OpenBSD as you can see in 
> >>> Security
> >>>
> >>
> >> This isn't related to the subject.
> >>
> >>>
> >>>> 1. CVE-2019-19521: Authentication bypass
> >>>>
> >>>> this attack should be more mitigated if
> >>>> ChallengeResponseAuthentication would be by default set to NO.
> >>>>
> >>>> 
> >>>> # FIX:
> >>>>
> >>>> from this:
> >>>>  cat /etc/ssh/sshd_config
> >>>>  ...
> >>>>  # Change to no to disable s/key passwords
> >>>>  #ChallengeResponseAuthentication yes
> >>>>  ...
> >>>>
> >>>> to this:
> >>>>  vi /etc/ssh/sshd_config
> >>>>  cat /etc/ssh/sshd_config
> >>>>  ...
> >>>>  # Change to no to disable s/key passwords
> >>>>  ChallengeResponseAuthentication no
> >>>>  ...
> >>>>
> >>>> But of course by default, without fixing sshd_config it should be 
> >>>> NO.
> >>>>
> >>>> Who the hell uses s/key with sshd nowadays?
> >>>>
> >>>
> >>> And you are aware that this option is not there just for S/Key, 
> &g

Re: Why isn't ChallengeResponseAuthentication NO in sshd_config?

2019-12-23 Thread lu hu
Hello,

nobody about the $subject? :)

Why isn't ChallengeResponseAuthentication NO in sshd_config by default?

It would be more secure, afaik.

Many thanks.


> Sent: Thursday, December 19, 2019 at 7:58 PM
> From: "lu hu" 
> To: misc@openbsd.org
> Subject: Re: Why isn't ChallengeResponseAuthentication NO in sshd_config?
>
> > Sent: Wednesday, December 18, 2019 at 9:49 PM
> > From: "Bodie" 
> > To: misc@openbsd.org, owner-m...@openbsd.org
> > Subject: Re: Why isn't ChallengeResponseAuthentication NO in sshd_config?
> >
> >
> >
> > On 18.12.2019 18:48, lu hu wrote:
> > > Hello,
> > >
> > > 
> > > # what am I talking about?
> > >
> > > https://man.openbsd.org/sshd_config#ChallengeResponseAuthentication
> > >
> > > ChallengeResponseAuthentication
> > >   Specifies whether challenge-response authentication is allowed. All
> > > authentication styles from login.conf(5) are supported. The default is
> > > yes.
> > >
> > > 
> > > # what does linux distros use:
> > >
> > > If I ex.: read:
> > >
> > > https://access.redhat.com/solutions/336773
> > >
> > > then I can see ChallengeResponseAuthentication is NO for security
> > > reasons. Ubuntu too.
> > >
> > > 
> > > # what else says ChallengeResponseAuthentication should be NO?
> > >
> > > https://www.openwall.com/lists/oss-security/2019/12/04/5
> > > ->
> >
> > These issues were quickly fixed in OpenBSD as you can see in Security
> >
>
> This isn't related to the subject.
>
> >
> > > 1. CVE-2019-19521: Authentication bypass
> > >
> > > this attack should be more mitigated if
> > > ChallengeResponseAuthentication would be by default set to NO.
> > >
> > > 
> > > # FIX:
> > >
> > > from this:
> > >   cat /etc/ssh/sshd_config
> > >   ...
> > >   # Change to no to disable s/key passwords
> > >   #ChallengeResponseAuthentication yes
> > >   ...
> > >
> > > to this:
> > >   vi /etc/ssh/sshd_config
> > >   cat /etc/ssh/sshd_config
> > >   ...
> > >   # Change to no to disable s/key passwords
> > >   ChallengeResponseAuthentication no
> > >   ...
> > >
> > > But of course by default, without fixing sshd_config it should be NO.
> > >
> > > Who the hell uses s/key with sshd nowadays?
> > >
> >
> > And you are aware that this option is not there just for S/Key, right?
> > It's for example PAM Google authenticator too on Linux and others
> >
> > I think you missed couple of points. Eg.:
> >
> > https://www.openbsd.org/faq/faq10.html#SKey
> >
> > and the fact that login.conf(5) on OpenBSD by default enables S/Key.
> >
>
> I checked the https://www.openbsd.org/faq/faq10.html#SKey
>
> first step is to have a /etc/skey dir. So checked it:
>
> 66# ls /etc/skey
> ls: /etc/skey: No such file or directory
> 66#
>
> There is no /etc/skey by default. So you have to do the "skeyinit -E" as 
> root, etc. Same for Google authenticator, etc. So 
> ChallengeResponseAuthentication should be only enabled then.. when you set up 
> extra auth methods.
>
> So afaik skey isn't enabled by default on OpenBSD, but for still some unkown 
> reason (for me) ChallengeResponseAuthentication is set to yes by default on 
> OpenBSD.
>
> Why?
>
> > > 
> > >
> > > So please, can we make the default sshd_config more secure and set the
> > > "ChallengeResponseAuthentication to NO"?
> > >
> >
> > Some practical examples at hand of the current vulnerability which will
> > make this change reasonable?
>
> It is about proactive security, to avoid future possible security issues.
>
> >
> > > Many thanks and whishing a peaceful xmas!
> >
> >
>
>



Re: OpenBSD pf - redirect all DNS queries to local DNS server

2019-12-23 Thread lu hu
rdr-to works perfectly! my hair is droppng off from the speed, without
ADs :) Many thanks. Wishing a great year-end for everybody!! Sent: Thursday,
December 19, 2019 at 8:50 PM
From: "Anthony O' Brien" 
To: "lu hu" 
Cc: misc@openbsd.org
Subject: Re: OpenBSD pf - redirect all DNS queries to local DNS server
Long time reader, first time writing in... > The big question: Is there
any DOC for OpenBSD about this? What pf rules > needed to redirect any
DNS server (ex.: 8.8.8.8 or 1.1.1.1) requests to the > DNS server running
on the ROUTER, coming from the CLIENTS?
You can use rdr-to[0] with pf to redirect all DNS queries to the DNS
resolver running on the router. A rule in pf.conf would look something
like:

pass in on $int_if proto { udp , tcp } from any to any port domain \
rdr-to $dns_server port domain

Ted Unangst has short write-up about turning your network inside out to
do
just this[1].

[0]: https://man.openbsd.org/pf.conf.5#rdr-to
[1]:
https://flak.tedunangst.com/post/turn-your-network-inside-out-with-one-pfconf-trick


Re: Why isn't ChallengeResponseAuthentication NO in sshd_config?

2019-12-19 Thread lu hu
> Sent: Wednesday, December 18, 2019 at 9:49 PM
> From: "Bodie" 
> To: misc@openbsd.org, owner-m...@openbsd.org
> Subject: Re: Why isn't ChallengeResponseAuthentication NO in sshd_config?
>
>
>
> On 18.12.2019 18:48, lu hu wrote:
> > Hello,
> >
> > 
> > # what am I talking about?
> >
> > https://man.openbsd.org/sshd_config#ChallengeResponseAuthentication
> >
> > ChallengeResponseAuthentication
> > Specifies whether challenge-response authentication is allowed. All
> > authentication styles from login.conf(5) are supported. The default is
> > yes.
> >
> > 
> > # what does linux distros use:
> >
> > If I ex.: read:
> >
> > https://access.redhat.com/solutions/336773
> >
> > then I can see ChallengeResponseAuthentication is NO for security
> > reasons. Ubuntu too.
> >
> > 
> > # what else says ChallengeResponseAuthentication should be NO?
> >
> > https://www.openwall.com/lists/oss-security/2019/12/04/5
> > ->
>
> These issues were quickly fixed in OpenBSD as you can see in Security
>

This isn't related to the subject.

>
> > 1. CVE-2019-19521: Authentication bypass
> >
> > this attack should be more mitigated if
> > ChallengeResponseAuthentication would be by default set to NO.
> >
> > 
> > # FIX:
> >
> > from this:
> > cat /etc/ssh/sshd_config
> > ...
> > # Change to no to disable s/key passwords
> > #ChallengeResponseAuthentication yes
> > ...
> >
> > to this:
> > vi /etc/ssh/sshd_config
> > cat /etc/ssh/sshd_config
> > ...
> > # Change to no to disable s/key passwords
> > ChallengeResponseAuthentication no
> > ...
> >
> > But of course by default, without fixing sshd_config it should be NO.
> >
> > Who the hell uses s/key with sshd nowadays?
> >
>
> And you are aware that this option is not there just for S/Key, right?
> It's for example PAM Google authenticator too on Linux and others
>
> I think you missed couple of points. Eg.:
>
> https://www.openbsd.org/faq/faq10.html#SKey
>
> and the fact that login.conf(5) on OpenBSD by default enables S/Key.
>

I checked the https://www.openbsd.org/faq/faq10.html#SKey

first step is to have a /etc/skey dir. So checked it:

66# ls /etc/skey
ls: /etc/skey: No such file or directory
66#

There is no /etc/skey by default. So you have to do the "skeyinit -E" as root, 
etc. Same for Google authenticator, etc. So ChallengeResponseAuthentication 
should be only enabled then.. when you set up extra auth methods.

So afaik skey isn't enabled by default on OpenBSD, but for still some unkown 
reason (for me) ChallengeResponseAuthentication is set to yes by default on 
OpenBSD.

Why?

> > 
> >
> > So please, can we make the default sshd_config more secure and set the
> > "ChallengeResponseAuthentication to NO"?
> >
>
> Some practical examples at hand of the current vulnerability which will
> make this change reasonable?

It is about proactive security, to avoid future possible security issues.

>
> > Many thanks and whishing a peaceful xmas!
>
>



Why isn't ChallengeResponseAuthentication NO in sshd_config?

2019-12-18 Thread lu hu
Hello,


# what am I talking about?

https://man.openbsd.org/sshd_config#ChallengeResponseAuthentication

ChallengeResponseAuthentication
Specifies whether challenge-response authentication is allowed. All 
authentication styles from login.conf(5) are supported. The default is yes.


# what does linux distros use:

If I ex.: read:

https://access.redhat.com/solutions/336773

then I can see ChallengeResponseAuthentication is NO for security reasons. 
Ubuntu too.


# what else says ChallengeResponseAuthentication should be NO?

https://www.openwall.com/lists/oss-security/2019/12/04/5
->
1. CVE-2019-19521: Authentication bypass

this attack should be more mitigated if ChallengeResponseAuthentication would 
be by default set to NO.


# FIX:

from this:
cat /etc/ssh/sshd_config
...
# Change to no to disable s/key passwords
#ChallengeResponseAuthentication yes
...

to this:
vi /etc/ssh/sshd_config
cat /etc/ssh/sshd_config
...
# Change to no to disable s/key passwords
ChallengeResponseAuthentication no
...

But of course by default, without fixing sshd_config it should be NO.

Who the hell uses s/key with sshd nowadays?



So please, can we make the default sshd_config more secure and set the 
"ChallengeResponseAuthentication to NO"?

Many thanks and whishing a peaceful xmas!



OpenBSD pf - redirect all DNS queries to local DNS server

2019-12-17 Thread lu hu
Our little home network:

ISP -> ROUTER -> SWITCH -> WIFI APs -> CLIENTS

ROUTER: OpenBSD 6.5, giving DHCP+fwing internet to the WIFI APs. Based on 
https://www.openbsd.org/faq/pf/example1.html#pf and 
https://www.openbsd.org/faq/pf/example1.html#dhcp

CLIENTS: laptops, smartphones.

So everything is going through the ROUTER.

We can see a https://www.openbsd.org/faq/pf/example1.html#dns DOC for how to 
setup a DNS server, ~ok.

AD filtering. We would like to have one, but not a fancy one, just a working 
one.

Based on "bad hosts", ex.: if a client queries iamAD.foo, then answer it back 
as 127.0.0.1, so the clients will try to connect to themselfes, which will end 
up not showing the AD.

The big question: Is there any DOC for OpenBSD about this? What pf rules needed 
to redirect any DNS server (ex.: 8.8.8.8 or 1.1.1.1) requests to the DNS server 
running on the ROUTER, coming from the CLIENTS?

So ex.: if a smartphone CLIENT wants to query iamAD.foo domain to get ADs, it 
will only get back 127.0.0.1