| Summary: | Fork-bomb when misconfiguring a host to ProxyJump onto itself | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Andrej Kacian <andrej> | ||||||
| Component: | ssh | Assignee: | Assigned to nobody <unassigned-bugs> | ||||||
| Status: | CLOSED FIXED | ||||||||
| Severity: | enhancement | CC: | ahmedsayeed1982, djm, dtucker, petoju, woodwardj | ||||||
| Priority: | P5 | ||||||||
| Version: | 7.9p1 | ||||||||
| Hardware: | Other | ||||||||
| OS: | Linux | ||||||||
| Bug Depends on: | |||||||||
| Bug Blocks: | 3117 | ||||||||
| Attachments: |
|
||||||||
|
Description
Andrej Kacian
2019-08-14 18:14:20 AEST
*** Bug 3107 has been marked as a duplicate of this bug. *** Created attachment 3356 [details]
Detect simple proxyjump loops
We have just committed the follow patch which should address this issue (at least for the simple case) and will be in the 8.3 release. Thanks for the report.
Shouldn't this check also verify it is not the same user? I often use -J <un-privileged-user>@<same host> <privileged-user>@<same host>. Created attachment 3436 [details]
Also check jumphost user
I hadn't considered that use case but we could do that too.
Patch applied, thanks. It will be in the 8.4 release. closing resolved bugs as of 8.6p1 release [spam removed] |