On Tue, 2003-08-05 at 06:54, Michael Schwendt wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> On Mon, 04 Aug 2003 22:22:16 -0600, Ashley M. Kirchner wrote:
> 
> >     While doing updates on my servers, I came across this one and I'm 
> > baffled.  I always ssh into my primary server and then ssh to the 
> > others.  I have them all setup to use keys, and normally it just logs in 
> > and records this in syslog.  However, after rpm updated 
> > openssh/openssh-clients/openssh-server to 3.1p1-8 tonight, I'm noticing 
> > something odd.  When I log in, I see this in the log file:
> > 
> > PAM-warn[1306]: service: sshd [on terminal: NODEVssh]
> > PAM-warn[1306]: user: (uid=0) -> root [remote: [EMAIL PROTECTED]
> > sshd(pam_unix)[1306]: authentication failure; logname= uid=0 euid=0
> >                       tty=NODEVssh ruser= rhost=intra.pcraft.com user=root
> > sshd(pam_unix)[1306]: session opened for user root by (uid=0)
> > 
> >     Notice how pam now says it failed authentication, yet it logged me 
> > in.  Um, what's going on?
> 
> See clarifying comment at end of
> https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=101157
> 

I assume that you are referring to:
<snip from bug comments>

If the only solution to the information leak is to have this delay, then
so be
it.  But it seems like this should definitely be a configuration option
for
those of us who aren't worried about this particular attack (the delay
is very
annoying).  But the bogus authentication failure message is wrong in
either
case.  As others have said, the cure is definitely worse than the
disease.

</snip from bug comments>


The irritating thing is that this is CLOSED with a resolution of NOTABUG

I just did this upgrade today on a couple of my internal machines and
find this very irritating.  As several commenters have done, you can
back it out but what happens when there is a real bug that gets fixed
later.

Three are indeed two issues as the comments indicate.  

1.  It takes much longer to login I use dsa type 2 keys and it usually
takes less than a second to get in now it takes closer to three seconds 

2. erroneous log messages   

I understand a delay in th failing but for an authenticated login?  And
I am sorry, bogus log messages are not ok.  I am about to try the
openssh.org rpm since I don't see any discussion about this on the
openssh developer or bug list.  I am thinking this is a bad backport.

Bret


-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list

Reply via email to