From owner-freebsd-stable@FreeBSD.ORG Mon Mar 3 20:14:03 2014 Return-Path: Delivered-To: stable@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 35EE6368; Mon, 3 Mar 2014 20:14:03 +0000 (UTC) Received: from mail-pa0-x22e.google.com (mail-pa0-x22e.google.com [IPv6:2607:f8b0:400e:c03::22e]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id F1847887; Mon, 3 Mar 2014 20:14:02 +0000 (UTC) Received: by mail-pa0-f46.google.com with SMTP id kp14so4108834pab.5 for ; Mon, 03 Mar 2014 12:14:02 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=tgcrVhfcw2dTqkeTLRMGIMb4WrmuFk3bgtv1bMdDC1w=; b=qBycish9F9ynVf9CBUe2wHprjK/5sFXQnWTHORhibUQmKFH9dNcToZd5wbzzc1xlOL kTmEXil9fUdMVJebcuuC81jC6KPpnaUlVHluoOWP7/F5h2X1TwogT6s9/OghHdg803Gn dL27AX6hv2lNBNYIK82ugxHIJv9gKxJcRuPwxncX22tGCzljz3NSbGqTCGrNq59kYw7E s34736t34kRdfKklyNqByfQXCeQ6TjIQxtU/iysYJwMJmIIukKoX6Ua56wHUJqkuRV8K nwVPV5RXgaFlNKSt5nw1E2T7DhuHrrIwafKsg25euWx2/CD29CqxTtzJuBTdQz/ELUjC oExw== MIME-Version: 1.0 X-Received: by 10.68.76.68 with SMTP id i4mr21378907pbw.73.1393877642622; Mon, 03 Mar 2014 12:14:02 -0800 (PST) Sender: kob6558@gmail.com Received: by 10.66.0.164 with HTTP; Mon, 3 Mar 2014 12:14:02 -0800 (PST) In-Reply-To: <5314D1F9.20909@intertainservices.com> References: <531184A8.4050909@freebsd.org> <53118E9C.5030804@freebsd.org> <5314D1F9.20909@intertainservices.com> Date: Mon, 3 Mar 2014 12:14:02 -0800 X-Google-Sender-Auth: Z_pEmmbw2EJCSYJLc7N7yJQENFg Message-ID: Subject: Re: openssh in stable-10 broken config or sandbox From: Kevin Oberman To: Mike Jakubik Content-Type: text/plain; charset=UTF-8 X-Content-Filtered-By: Mailman/MimeDel 2.1.17 Cc: FreeBSD Stable ML , Andrey Chernov , des@freebsd.org X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Mar 2014 20:14:03 -0000 On Mon, Mar 3, 2014 at 11:03 AM, Mike Jakubik < mike.jakubik@intertainservices.com> wrote: > On 03/01/14 02:39, Andrey Chernov wrote: > >> On 01.03.2014 10:56, Andrey Chernov wrote: >> >>> Hi. >>> Default /etc/ssh/sshd_config have >>> #UsePrivilegeSeparation sandbox >>> I.e. 'sandbox' by default. It breaks logins with error: >>> sshd[81721]: fatal: ssh_sandbox_child: failed to limit the network >>> socket [preauth] >>> Fixed by using old way, i.e. direct >>> UsePrivilegeSeparation yes >>> instead of 'sandbox'. Please fix this bug. >>> >> Just find that capsicum is required now for default (i.e. sandbox) mode. >> Don't think it is wise move, people may lost remote connections that >> way, at least UPDATING entry is needed, but check for WITHOUT_CAPSICUM >> for defaults will be better. >> >> > Personally I find this to be a monumental screw up, such a drastic change > and not even so much as an entry in UPDATING, what ever happened to POLA? > +1 I didn't get bitten by this by the good fortune of seeing the first message on this issue just minutes after I updated my system. Saw the change in mergemaster, so immediately edited the installed file back to "yes". But, if this had been a remote server, I would have been in deep weeds. This is simply not acceptable practice! -- R. Kevin Oberman, Network Engineer, Retired E-mail: rkoberman@gmail.com