[Bug 1780] New: Option to disable .k5login support

2010-06-14 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=1780

   Summary: Option to disable .k5login support
   Product: Portable OpenSSH
   Version: 5.5p1
  Platform: All
OS/Version: All
Status: NEW
  Severity: normal
  Priority: P2
 Component: Kerberos support
AssignedTo: unassigned-b...@mindrot.org
ReportedBy: jchad...@redhat.com


.k5login allows a user to let others access his account w/o admin
intervention.

There are 2 potential problems in some setups.

A) Company policy that prevents account sharing
B) Access to other users credentials using social engineering
techniques to
make someone log into your account and forward you his credentials

For these reasons it would be useful if there were a sshd_config option
to
prevent sshd from using .k5login files.

-- 
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 1781] New: Document how to use Solaris 10 /dev/random

2010-06-14 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=1781

   Summary: Document how to use Solaris 10 /dev/random
   Product: Portable OpenSSH
   Version: -current
  Platform: All
OS/Version: All
Status: NEW
  Severity: normal
  Priority: P2
 Component: Documentation
AssignedTo: unassigned-b...@mindrot.org
ReportedBy: pep...@reppep.com


http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/INSTALL says:

--with-prngd-socket=/some/file allows you to enable EGD or PRNGD
support and to specify a PRNGd socket. Use this if your Unix lacks
/dev/random and you don't want to use OpenSSH's builtin entropy
collection support.

--with-prngd-port=portnum allows you to enable EGD or PRNGD support
and to specify a EGD localhost TCP port. Use this if your Unix lacks
/dev/random and you don't want to use OpenSSH's builtin entropy
collection support.


I hoped that the configure script would automatically use /dev/random,
but apparently not -- it says Random number source: OpenSSL internal
ONLY.

r...@thor:/# uname -a
SunOS thor 5.10 Generic_142901-08 i86pc i386 i86pc
r...@thor:/# ls -l /dev/random /devices/pseudo/ran...@0:random
lrwxrwxrwx   1 root root  33 Oct 21  2009 /dev/random -
../devices/pseudo/ran...@0:random
crw-r--r--   1 root sys  149,  0 Jun 10 11:27
/devices/pseudo/ran...@0:random


I see configure arguments for a subprocess or PRNGd, but nothing
obvious to point at /dev/random (a character device). Should I just use
--with-prngd-socket=/dev/random? 

pep...@thor:~/cvs/openssh$ ./configure --help|egrep -i '(rand|prng)'
  --with-rand-helper  Use subprocess to gather strong randomness
  --with-prngd-port=PORT  read entropy from PRNGD/EGD TCP
localhost:PORT
  --with-prngd-socket=FILE read entropy from PRNGD/EGD socket FILE
(default=/var/run/egd-pool)


Perhaps the Solaris heading in README.platform should include a
suggestion?

-- 
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 1781] Document how to use Solaris 10 /dev/random

2010-06-14 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=1781

Damien Miller d...@mindrot.org changed:

   What|Removed |Added

 CC||d...@mindrot.org
 Status|NEW |RESOLVED
 Resolution||WORKSFORME

--- Comment #1 from Damien Miller d...@mindrot.org  ---
If your platform supports /dev/random, and OpenSSL has been configured
to use it (if OpenSSL came with your system, or you compiled it on
there then it will almost certainly do so), then you can rely on its
internal seeding. 

If something is wrong (e.g. OpenSSL has not been configured to seed
from /dev/random) then the problem will be immediately apparent as ssh,
sshd, etc will throw loud error messages and refuse to start.

-- 
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 1781] Document how to use Solaris 10 /dev/random

2010-06-14 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=1781

--- Comment #2 from Chris Pepper pep...@reppep.com  ---
That makes sense, but then INSTALL or README.paltform should mention
that OpenSSL internal ONLY is likely to be acceptable if OpenSSL is
getting randomness from /dev/random. From the current wording, I
thought I needed to ensure that OpenSSH could access /dev/random
directly.

-- 
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs