Marvin <tbglosth...@yahoo.co.uk> writes:

> Since our fileserver auto patched to rssh 2.3.4-4+deb8u2 this morning,
> our automated scp requests have been failing if we try get multiple
> files from the server in one wildcarded request.

> So to recreate 
> ---------
> $ scp u...@example.com://directory//file.x86_64_*.*.zip .
> The authenticity of host 'example.com (192.168.60.224)' can't be established.
> ECDSA key fingerprint is ########################
> Are you sure you want to continue connecting (yes/no)? yes
> Warning: Permanently added 'example.com (192.168.60.224)' (ECDSA) to the list 
> of known hosts.

> insecure scp option not allowed.
> This account is restricted by rssh.
> Allowed commands: scp sftp rsync 

> If you believe this is in error, please contact your system administrator.
> ----------
> where example.com://directory//file.x86_64_*.*.zip matched 2 or more files

Ugh, yeah, that's going to be a problem.  The attempt here was to prevent
scp commands that initiate outbound ssh connections on the server, such as
syntax like "scp foo.txt remote:foo.txt" sent to the server, which can
lead to arbitrary code execution.  But it looks like the client sends
multiple arguments to the server in the multiple file download case.

I may be able to instead reject multiple file arguments if any contain a
colon.

> Moving files from the fileserver until there's only one match results in
> a successful download.  Not using wildcards is also ok.

Does not using wildcards even when listing multiple files to download
still work?

Are you using a chroot?

> This is on an Ubuntu14:04 machine. I've marked it "severity important"
> as it's a regression that caused a set of 3 fileservers who'd been happy
> for ~ 5 years to stop serving the required files and took a fair while
> to debug as this was an automated process and we didn't suspect a
> fileservr change for a fair while.

Yeah, I'm sorry about that.  Unfortunately, the security vulnerability was
fairly nasty, and I overlooked that use case.

Please be aware that rssh is going to be removed from Debian before the
next stable release because it's orphaned upstream and is essentially
unsupportable from a security standpoint.  Time has proven its security
model to be far too fragile; we're seeing a regular stream of security
vulnerabilities, and I suspect there are a lot more that we just haven't
found yet.  You're therefore unfortunately going to have to start thinking
about a migration plan, although I'm going to try to keep it limping
along for the lifetime of stable.

-- 
Russ Allbery (r...@debian.org)               <http://www.eyrie.org/~eagle/>

Reply via email to