Bug 94 - Userdefineable identification string
Summary: Userdefineable identification string
Status: CLOSED WONTFIX
Alias: None
Product: Portable OpenSSH
Classification: Unclassified
Component: sshd (show other bugs)
Version: -current
Hardware: All All
: P2 enhancement
Assignee: OpenSSH Bugzilla mailing list
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2002-02-02 09:12 AEDT by Jason Prondak
Modified: 2004-04-14 12:24 AEST (History)
0 users

See Also:


Attachments
Patch to sshd to allow a userdefinable identification string (3.26 KB, patch)
2002-02-02 09:15 AEDT, Jason Prondak
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Jason Prondak 2002-02-02 09:12:51 AEDT
This patch allows one to change the software version and comment field(s) in the identification string. The ident strings is of the form 
"SSH-protoversion-softwareversion   comments" as per draft-ietf-secsh-transport-11.txt. The identstring still conforms to the spec. But there could be a 
possibilty of some sompatability issues. But that should be up to the user/administrator

They are of the form

VersionString "My_Version_1.0"
CommentString "test"

in sshd_config
Comment 1 Jason Prondak 2002-02-02 09:15:10 AEDT
Created attachment 17 [details]
Patch to sshd to allow a userdefinable identification string
Comment 2 Damien Miller 2002-02-02 09:51:58 AEDT
The identity string is used for bug/feature compatibility. As the protocol spec
is not an RFC yet, it may also be needed in future. Have a look at compat.c
Comment 3 Markus Friedl 2002-02-04 04:12:00 AEDT
i don't see why the version string should be changed.
it's used for bug-detection. if we are bug free, then
we can have a fixed version string.
Comment 4 Jason Prondak 2002-02-05 03:51:56 AEDT
The word is *if*. Secondly. I have had requests from some of my clients for the 
ability to change both the version and comment string(s). The version string for 
the sole purpose of hiding the version in the event of a security hole. 
Similarly to the way say bind or sendmail does. If other standards do why no 
openssh.

As for the comment string this is not that all far fetched. I have the need to 
put information about an installation(i.e. internal version number, say for a 
companies internal package version. or for describing additional options.. 
gssapi?).  In large environments it is hard to keep everything machine up to 
date. Let alone making a perfect installation. So one can have used openssh 
3.0.2p1 but had multiple revisions of the package. And a quick way to audit said 
installation(s) would be to look at the comment field. And then use something 
like scanssh to gather the information.
Comment 5 Markus Friedl 2002-02-05 04:07:39 AEDT
why should we encourage people to run a broken version of openssh?

why not edit version.h and include this information at compile time?

if you have a revision of your modified sshd you will have to recompile
anyway.

changing version.h will possibly break compatibility.
Comment 6 Jason Prondak 2002-02-05 05:55:41 AEDT
>why should we encourage people to run a broken version of openssh?
Why do you think it is broken?.. or is the compatibility handling just broken.

> why not edit version.h and include this information at compile time?
Why do you have to recompile?? That is where the term "runtime options" 
comes from. Fine. We disagree with the version string. But, the comment should 
be at least user configurable.

>if you have a revision of your modified sshd you will have to recompile
anyway.
No...  who says that you can't change just the config files and make a new 
package?
Comment 7 Jason Prondak 2002-02-05 06:24:14 AEDT
I agree that the "version" string would/could cause problems with compatability.  
So I will drop the "version" string. The comment is another matter. What are 
your thoughts on generalizing the compat stuff.. maybe making it runtime and not 
compile time? 
Comment 8 Markus Friedl 2002-02-05 07:43:51 AEDT
i don't understand how moving compat.c would simplify the code
or simplify handling. i prefer each version of openssh have
a fixed and defined behaviour.
Comment 9 Damien Miller 2002-02-05 11:02:40 AEDT
This patch adds obscurity at best, it doesn't help security at all. In fact, it
encourages people not to upgrade their vulnerable servers. The attackers won't
care about a faked version - they'll just try their exploits regardless (in fact
weird protocol ident strings would make me more interested).

On top of this, it ruins any chance of being able to interop should we find
protocol bugs or if the wire spec changes again. Making the compat stuff runtime
may be a good idea for other reasons, but not to support silly hacks like this.
Comment 10 Markus Friedl 2002-02-23 05:45:30 AEDT
after some discussion we decided that this wont happen.
Comment 11 Damien Miller 2004-04-14 12:24:17 AEST
Mass change of RESOLVED bugs to CLOSED