| Summary: | empty password accounts can login with random password | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Andrew Daviel <advax> |
| Component: | sshd | Assignee: | OpenSSH Bugzilla mailing list <openssh-bugs> |
| Status: | CLOSED INVALID | ||
| Severity: | security | CC: | matthewg |
| Priority: | P2 | ||
| Version: | 3.6.1p2 | ||
| Hardware: | ix86 | ||
| OS: | Linux | ||
|
Description
Andrew Daviel
2003-07-01 09:39:04 AEST
Can you reproduce this with vanilla openssh-3.6.1p2 (eg from ftp.ca.openbsd.org ) configured --with-pam? RTFM, or get your distributor to: http://www.openssh.com/faq.html#3.2 As a workaround, you could give your no-password user a shell that's not listed in /etc/shells. This will cause sshd to deny the connection attempt very early in the authentication process. There is no need for an additional workaround - one must remove the "nullok" flag in the PAM conf. Really, the bug is in PAM itself. OK, after messing around trying 3.6.1p2 I realize I had a "DenyUsers" line in sshd_config on the RedHat 8 system which I had forgotten about. The RedHat sshd.pam does not have nullok but it is chained to system-auth which does. I guess unchaining it might work but I don't want to depart too much from the stock distro especially in things I don't really understand (like PAM) So the issue is that PermitEmptyPasswords is ignored if PAM is used. If PAM is really broken like this then maybe a note in the sshd_config manpage is in order. Mass change of RESOLVED bugs to CLOSED |