| Summary: | Global ssh_config file permissions are not checked. | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | balu <balu.gajjala> |
| Component: | ssh | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | CLOSED WONTFIX | ||
| Severity: | normal | CC: | balu.gajjala, djm, dtucker |
| Priority: | P5 | ||
| Version: | 8.5p1 | ||
| Hardware: | Other | ||
| OS: | Windows 10 | ||
| Bug Depends on: | |||
| Bug Blocks: | 3302 | ||
|
Description
balu
2021-03-11 12:36:04 AEDT
I'm wondering if there are use cases where someone might want to do this, eg - making ssh_config group writable by an admin group - using Match and Include to delegate a subset of the config to another group retarget after 8.6p1 release I'm inclined to agree and to not add additional checking - ssh should aim to protect the user against misconfiguration, but it's IMO overkill to detect serious admin misconfiguration. On one hand, as Darren points out, a too strict definition of "misconfiguration" might break working setups. On the other, how far should a user tool go towards checking the system is in an expected state? Should it check the permissions on /etc/passwd? /dev/*? etc. Closing. Feel free to reopen if you have a good argument for this. closing bugs resolved before openssh-8.9 |