New SSH Vulnerabilities Discovered 33
possible writes "Rapid7 has discovered a new class of vulnerabilities affecting SSH2 implementations from many vendors. These vulnerabilities affect a wide variety of SSH servers and SSH clients. Rapid7 designed an SSH protocol test suite called SSHredder. The SSHredder test suite contains a large number of SSH2 protocol binary test cases, and is released under the BSD license. Rapid7's testing has revealed many defects in products such as F-Secure, SSH.com, PuTTY, etc. OpenSSH and GNU LSH are not affected." Some of the affected vendors have released fixed versions, and some say there's nothing exploitable about the reported holes.
Re:Responsible behaviour? (Score:1)
It looks like they gave all the affected vendors reasonable notice. Almost all the vendors have released fixed versions. These are not full-disclosure weenies.
They probably mean there's no workaround if you don't/can't update your software.
OpenSSH v3.5 and earlier not vulnerable (Score:5, Informative)
Re:OpenSSH v3.5 and earlier not vulnerable (duh) (Score:1)
Re:OpenSSH v3.5 and earlier not vulnerable (Score:2)
exploitable (Score:4, Interesting)
Bullshit. Those vulnerabilities are exploitable. I know because i caught someone exploiting the buffer token error earlier today. We had to shut down our ssh server until we could add double-passback scanning to our firewall.
Re:exploitable (Score:2)
Well, maybe you can, but you are still making this up!
Re:exploitable (Score:2)
i know i'm responding to a troll (Score:2)
all this and more including read-only cvs access, nightly cvs tarballs, and contacts for submitting your own patches can be found at putty's home page here [greenend.org.uk]
just getting the word out. they've apparently become inundated with support mail for their free product, and could use some more developers
Is this version of Putty an updated version? (Score:2)
I use Putty as a client to administer two remote Linux servers on a company internal network.
Re:Go Slashdot! (Score:1)
Re:putty (Score:2)
Even Pakistan's govt is moving to OSS (Score:1)
Governments with high stakes of information on their computers are moving to OSS OSes. Signs of people realizing the stability and reliability of Opensource(tm) code. News like this just hammer the point home.
Sure there were news about that SSL problemo mainly on Apache-SSL, but they fixed it and fixed it good. Did they fix it in IE6 on win32? Could this be used to steal nuclear weapon documents from a scientists laptop online?? If the SSL vulerability and this SSH exploit isnt used, some other security problem will prop up.
Re:Even Pakistan's govt is moving to OSS (Score:1, Funny)
It's nice... (Score:1)
Geez, death penalty for "cyberterrorists", a term that includes most twelve year old script kiddies? Like that won't be ab(used) by the prosecutors.
Why does SSH exist at all? (Score:3, Informative)
There was already a perfectly good socket encryption protocol before SSH came along, namely SSL, which has had a reasonably functional PKI (though not as great as the vendors pretend) for years, and it's perfectly reasonable to run telnet through it. SSL-secured telnet is called "telnets", similar to https, smtps, and so forth. Https is built into just about every web browser these days. But almost nobody uses telnets.
SSH just seems to me like a case of the bad driving out the good. There was never any need for it. We should have just used telnets instead.
Re:Why does SSH exist at all? (Score:3, Informative)
ssh some.host 'cd
and
for i in host1 host2 host3 host4
do
killall -HUP inetd
done
which are very hard to do with telnet.
I still don't get it (Score:2)
Re:I still don't get it (Score:2)
ssh adds password authentication to rsh, and adds authentication by certificate to rsh, rcp, and rlogin. This makes the authentication into something reasonable.
ssh also automatically does X11 port forwarding, and can forward any other ports you want. The r* protocols have no mechanism for this.
Finally, IIRC ssh predates SSL. Otherwise it might have been designed to use SSL. I'm not sure about this one, though.
SSH doesn't predate SSL (Score:2)
SSH uses passwords to let the server know that the client is legit. It doesn't do much to let the client know that the server is legit. And it doesn't stop active (man-in-the-middle) attacks unless you actually check the md5 hashes, which nobody does. SSL is far better about all these things.
Re:SSH doesn't predate SSL (Score:2)
ssh makes port forwarding simpler and more secure than stunnel. I can connect from my machine on my desk to a machine in the office, and ask ssh to create a local port localhost:8080 on my desk which forwards to a remote port 80 on an internal network, and so be able to connect to a machine behind a firewall. While I'm sure it's possible to do that with stunnel, it's much tricker than:
ssh -L8080:intranet.my.office:80 desktop.my.office
. Ditto for X11 forwarding. Of course, stunnel is useful for many other things that ssh can't do at all.
ssh can ensure that the server is legit, if you transfer the key into your known_hosts file by some secure mechanism. It doesn't support the same chain-of-authority mechanism that SSL does, which is both an advantage and a disadvantage. I think ssh would have caught on much less quickly if we'd had to purchase a certificate for every computer we ran it on.
You don't need to purchase certificates (Score:2)
Re:You don't need to purchase certificates (Score:2)
Also, when SSH came out, creating your own CA was significantly harder than it is now, IIRC. I remember spending several hours trying to figure it out in 1997 or so.
Re:Why does SSH exist at all? (Score:1)
Not sure what you mean about man in the middle... once the initial exchange has happened, it WILL warn you of changes.
The other reason we use it is because it's so damn easy. Port forwarding, commercial tools.. it just WORKS.
So to flip your argument around.. why should I switch all my servers to ssl instead? What benefits do I get for my work, other than having to switch to crappier terminal programs and/or run tunneling software on my administration stations.
WHat? Another more complicated yet somehow "better" solution? No thanks.