Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 2 Sep 2000 15:57:01 -0500
From:      "Jacques A. Vidrine" <n@nectar.com>
To:        Neil Blakey-Milner <nbm@mithrandr.moria.org>
Cc:        Dan Nelson <dnelson@emsphone.com>, sthaug@nethelp.no, phk@critter.freebsd.dk, ume@FreeBSD.ORG, arch@FreeBSD.ORG
Subject:   Re: setuid ssh should die (Re: Request for review: nsswitch)
Message-ID:  <20000902155701.C1263@hamlet.nectar.com>
In-Reply-To: <20000902221424.A39558@mithrandr.moria.org>; from nbm@mithrandr.moria.org on Sat, Sep 02, 2000 at 10:14:24PM %2B0200
References:  <41582.967924374@critter> <62717.967924513@verdi.nethelp.no> <20000902145822.B28852@dan.emsphone.com> <20000902150221.A1263@hamlet.nectar.com> <20000902221424.A39558@mithrandr.moria.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Sep 02, 2000 at 10:14:24PM +0200, Neil Blakey-Milner wrote:
> So was he.  He is talking RhostsRSAAuthentication.  I think we needn't
> worry about it, and we should default to non-suid, with a comment in the
> configuration stating that RhostsRSAAuthentication requires suid-root on
> the ssh binary on the client side.

Agreed.

It may make sense to have ssh warn if it is not setuid, and this option
has been requested, e.g.

@@ -546,6 +546,10 @@
 	}
 	/* Disable rhosts authentication if not running as root. */
 	if (original_effective_uid != 0 || !options.use_privileged_port) {
+		if (options.rhosts_authentication ||
+		    options.rhosts_rsa_authentication)
+			log("Warning: rhosts disabled - "
+			    "insufficient privileges");
 		options.rhosts_authentication = 0;
 		options.rhosts_rsa_authentication = 0;
 	}

-- 
Jacques Vidrine / n@nectar.com / jvidrine@verio.net / nectar@FreeBSD.org


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-arch" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000902155701.C1263>