| Summary: | Add ability to disable escape char forward menu | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Thomas Jarosch <thomas.jarosch> | ||||
| Component: | ssh | Assignee: | Assigned to nobody <unassigned-bugs> | ||||
| Status: | CLOSED WONTFIX | ||||||
| Severity: | security | CC: | djm, dtucker | ||||
| Priority: | P5 | ||||||
| Version: | 7.4p1 | ||||||
| Hardware: | Other | ||||||
| OS: | Linux | ||||||
| Attachments: |
|
||||||
|
Description
Thomas Jarosch
2017-03-08 09:16:25 AEDT
I don't think this adds much - a nefarious client could use the connection multiplexing options, ptrace or even netcat to achieve the same outcome. IMO if you want to disable forwarding then the place to do it is on the server and we offer controls for that already. BTW, the page you linked is all post-exploitation attacks. These are almost always pointless to defend against, because the attacker has so much more leverage than the defender. Yes, it's true that once the machine is compromised, the attacker can replace / patch any binary file as he pleases. The worrysome part is the second attack stated in "Hijacking Active SSH Sessions". -> Is there filtering in the ssh client to prevent a remote host to send the escape sequence for '~C' back to the client? If so, I'm wondering a) what I tested back then in February and b) the patch would not be needed. Or may be it was possible to trigger ~C from the remote server as I used screen on the local side, too? No, ~C happens solely in the client and the server can't trigger it (In reply to Damien Miller from comment #3) > No, ~C happens solely in the client and the server can't trigger it If your terminal has escape-programmable answerback sequences it might. I dunno if any of those still exist though. close bugs that were resolved in OpenSSH 8.5 release cycle |