| Summary: | session being terminated after succesful authentication | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Steve Hespelt <shespelt> | ||||
| Component: | sshd | Assignee: | Assigned to nobody <unassigned-bugs> | ||||
| Status: | CLOSED INVALID | ||||||
| Severity: | major | ||||||
| Priority: | P2 | ||||||
| Version: | 4.1p1 | ||||||
| Hardware: | UltraSPARC | ||||||
| OS: | Solaris | ||||||
| Attachments: |
|
||||||
|
Description
Steve Hespelt
2005-08-12 04:00:52 AEST
Created attachment 947 [details]
sshd -d traces and ssh -v traces for problem session & one that works
> I'm not empowered with root privileges [when deployed, the sshd daemon
> will be run as root] but I've convinced our SA group to at least chown
> root:sys the sshd & ssh binaries and to set the setuid bit on those
> binaries (this is needed as the geteuid checking in login_write() causes
> the daemon to exit if running in -D mode).
Don't do that. sshd isn't designed to be run setuid root.
You can run sshd without root privileges under your own uid, providing a) you
set UsePAM=no and you stick to pubkey or hostbased authentication. Obviously you
will not be able to authenticate as a different user.
sshd shouldn't be made suid root Change all RESOLVED bug to CLOSED with the exception of the ones fixed post-4.4. |