| Summary: | Make internal-sftp the default | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | MichaIng <micha> |
| Component: | sshd | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | NEW --- | ||
| Severity: | enhancement | CC: | djm |
| Priority: | P5 | ||
| Version: | 8.9p1 | ||
| Hardware: | All | ||
| OS: | Linux | ||
|
Description
MichaIng
2022-02-27 04:31:54 AEDT
Using a separate binary means that the sftp-server process does not inherit a memory image of the privileged sshd process (as it would for a merely fork()ed internal-sftp). Inheriting the memory image carries the risk that an error in sftp-server's attack surface could yield an arbitrary memory read primitive, and this could be used to break ASLR and other protections on the parent process, as well as granting access to any otherwise private data left in the sshd process. Unfortunately the existence of private data in the sshd address space is hard to reason about, especially since PAM modules can do pretty much what they feel like. Now, sftp-server _should_ be pretty free of bugs, but weird corner-cases that don't exist for other bits of sshd have yielded bad bugs there before (e.g. https://seclists.org/oss-sec/2014/q4/216) For this reason, my preference is to keep it as-is |