New Vulnerabilities in Portable OpenSSH 324
An anonymous reader writes "The OpenSSH team has uncovered multiple exploitable vulnerabilities in the days-old portable release of OpenSSH. That's right folks: time to patch *again*. 3.7.1p2 is now available. Instructions and mirror list here. Please note that this vulnerability only affects *portable* OpenSSH--so if you are running OpenBSD, you're safe. This vulnerability apparently has to do with PAM, so you can use the 'UsePam no' option in your config file. Info on the advisory here and here."
Re:A solution? (Score:4, Insightful)
Re:Non-standard configuration (Score:5, Insightful)
your belt may fail
your suspenders may fail
if you're really serious about keeping your pants up, use both!
this is the theory of theo-n-the-openbsd-cats. you used priv sep plus all the other security goodies.
you don't say that doing nightly backups is a "weak" practice because the backups could fail at the same time as your main drive. do you?
JEBUS (Score:2, Insightful)
Just like MS then. (Score:1, Insightful)
Re:Non-standard configuration (Score:5, Insightful)
Having a small amount of the sshd code running as root with the 'sshd' user handling the rest helps make it harder for other exploits. I don't think anyone would suggest that PrivSep makes an exploit impossible, but it is another great layer on the security-onion.
Re:A better solution (Score:4, Insightful)
Re:JEBUS (Score:5, Insightful)
Re:Case matters (Score:3, Insightful)
man sshd: keywords are case-insensitive and arguments are case-sensitive, meaning that usepam and UsePam and UsePAM are equivalent.
Re:Apple affected? (Score:3, Insightful)
Re:Just like MS then. (Score:5, Insightful)
Re:Time for a new spin on security practices? (Score:5, Insightful)
Well, yes, we should hold them both to the same standard
fact of life (Score:4, Insightful)
As users of software though, it is irresponsible to assume that just because it is commercial, open source, MS, non-MS, or whoever is the messiah of the day's product that it will never have unexpected problems. Admittedly, some companies software appears to be worse than others, but that is the gamble we take when we build complex systems.
Re:RedHat boxes are safe (Score:5, Insightful)
Opened by mjc@redhat.com (Mark J Cox, Security Response Team Lead) on 2003-09-23 11:16
http://www.openssh.com/txt/sshpam.adv came out on Sep23 with two new
vulnerabilities that affect OpenSSH.
Both these issues only affect OpenSSH 3.7 and 3.7.1. Red Hat Linux and Red Hat
Enterprise Linux are not vulnerable to these issues as we ship with earlier
versions (with the addition of backported security fixes for other issues).
Keeping this bug open for a few days to enable users searching bugzilla to find
out that they are not vulnerable.
Re:JEBUS (Score:4, Insightful)
That's why it doesn't affect earlier versions.
Re:Just like MS then. (Score:1, Insightful)
Software defects are a part of software engineering. It doesn't matter if it is open or closed source. As long as humans are doing the coding, there will be 1 defect for X lines of code. It is as simple as that.
Pass me the crack pipe please. C U bye!
Re:Just like MS then. (Score:3, Insightful)
1) The people behind OpenBSD and OpenSSH are much less driven by time-to-market and ooh-shiney crap than the monkeys at Microsoft are.
2) OpenBSD and OpenSSH actually strive for simplicity rather than obsess over bullet-points.
3) OpenBSD's default install has basically only OpenSSH as a public service (among a handful more). This is already light-years ahead of numerous (thousands undiscovered, probably) default-available remote-root exploits in Windows.
4) The people behind OpenSSH are much less likely (although no one's perfect) to sweep things under the rug than Microsoft.
Microsoft is like a car dealership complete with greasy salespeople. OpenBSD/OpenSSH basically have no salespeople (word of mouth, who'd have thunk that?).
Which makes you feel more warm and cozy?
"Patch *again*" == no big deal (Score:5, Insightful)
Heck, just be thankful they don't belong to the Microsoft school of security and fixes
-psy
Re:Just like MS then. (Score:3, Insightful)
It's different because this is only one of a handful of programs which have required security updates in the past X weeks. How many security updates has MS released in the same amount of time?
All of the MS advocates are spending a lot of time complaining about how everyone here bashes MS. I've been using Windows since 3.1 was released. Now I have a choice. Linux isn't for everyone. It requires a lot of time to learn it. Windows also required a lot of time to learn, but most people don't remember that. Back in the days when GUI's were new, we expected things to be difficult, and we lived with that until it was fixed. Now linux is coming in and trying to do everything the right way, but apparently many people are unwilling to give linux the same chance they originally gave to Windows.
Windows is like a first-draft program. It's a kludge. It works, and with enough effort you can add a lot of eye-candy to make it look like a polished system, but underneath, it's still a kludge. They started with a vague idea of what they were going to write, and created it as best they could.
Linux is more like a second-draft program. It's built from scratch completely based off of all the concepts that were discovered in writing the original version. The goal is in site, the mistakes can mostly be avoided, and they have a clear idea of what they're doing from start to finish. It's still not going to be perfect, but it's built on a solid understanding of what needs to be done.
Up next..? Who knows, but I imagine that comparing the next generation software to what we have now will be like comparing a finely-tuned Indy car to a horseless carriage.
Re:Time for a new spin on security practices? (Score:3, Insightful)
Re:Time for a new spin on security practices? (Score:5, Insightful)
This is not in the same league as "Oops, we left the RPC port open and rootable by default."
The class of errors being fixed by OpenSSH is very different and the design takes security much more seriously.
Re:PAM is not in by default (Score:3, Insightful)
Most people use Windows.
In addition not having pam normally is not something to be proud of!
No, normally it is. A quick glace through the BugTraq archives will show how often there are vulnerabilities having something to do with PAM. By comparision, sendmail looks mighty bug free.
Re:EXCUSE ME!? (Score:2, Insightful)
Nimda:
Patch Released: August 15, 2001
Major Exploit Starts: September 18, 2001
SQL Slammer Worm:
Patch Released: July 24, 2002
Major Exploit Starts: January 25, 2003
MS Blaster Worm:
Patch Released: July 16, 2003
Patch Released: August 11, 2003
Re:JEBUS (Score:3, Insightful)
No, the vulnerabilities are due to new code in 3.7; the Red Hat and Debian people who backported only the security fixes to older OpenSSH versions are safe. They are not old vulnerabilities that were discovered by an increase in code vetting.
Use real ssh. (Score:2, Insightful)
ssh from ssh.fi is more secure out of the box (no ssh1), requires alot less depedencies on other programs, and is more configurable. Not to mention its the offical version of SSH.
OpenSSH == wuftpd/sendmail of security software, get rid of it. At least for now.
Re:Time for a new spin on security practices? (Score:3, Insightful)
They will once the OSS community start providing 0-day enterprise quality patches that actually get regression tested before being installed on mission critical servers. MS may have a few poorly tested patches in its relatively distant history, but MS still puts its patches through far more testing than most OSS patches are put through when released. Testing takes time, period.
Re:JEBUS (Score:1, Insightful)