Bug 2779 - ssh-keygen let a user certify/sign a key with more principals than openssh will handle
Summary: ssh-keygen let a user certify/sign a key with more principals than openssh wi...
Status: CLOSED FIXED
Alias: None
Product: Portable OpenSSH
Classification: Unclassified
Component: ssh-keygen (show other bugs)
Version: 7.5p1
Hardware: Other Linux
: P5 enhancement
Assignee: Assigned to nobody
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2017-09-16 08:16 AEST by Guillaume Destuynder (:kang)
Modified: 2021-04-23 15:00 AEST (History)
1 user (show)

See Also:


Attachments
Fix: Check amount of principals in ssh-keygen (971 bytes, patch)
2017-09-16 08:16 AEST, Guillaume Destuynder (:kang)
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Guillaume Destuynder (:kang) 2017-09-16 08:16:02 AEST
Created attachment 3053 [details]
Fix: Check amount of principals in ssh-keygen

ssh-keygen allow creation of signed certificates for keys with more
principal values in the certificate identity than the sshkey_read()
would allow, causing the user to potentially create an unusable
certificate.

Ex:
⚡ ssh-keygen -s ca_user_key  -I groups -n "$(seq -s ',' 1 257)" /dev/shm/ssh/key_file
Signed user key /dev/shm/ssh/key_file-cert.pub: id "groups" serial 0 for 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,119,120,121,122,123,124,125,126,127,128,129,130,131,132,133,134,135,136,137,138,139,140,141,142,143,144,145,146,147,148,149,150,151,152,153,154,155,156,157,158,159,160,161,162,163,164,165,166,167,168,169,170,171,172,173,174,175,176,177,178,179,180,181,182,183,184,185,186,187,188,189,190,191,192,193,194,195,196,197,198,199,200,201,202,203,204,205,206,207,208,209,210,211,212,213,214,215,216,217,218,219,220,221,222,223,224,225,226,227,228,229,230,231,232,233,234,235,236,237,238,239,240,241,242,243,244,245,246,247,248,249,250,251,252,253,254,255,256,257 valid forever
⚡ ssh-keygen -L -f /dev/shm/ssh/key_file-cert.pub 
/dev/shm/ssh/key_file-cert.pub:1: invalid key: invalid format


After fix:


⚡ ./ssh-keygen -s ~/git/accessproxy/scripts/ca_user_key  -I groups -n "$(seq -s ',' 1 257)" /dev/shm/ssh/key_file
do_ca_sign: invalid format: too many principals (257) for this certificate identity, specify at most 256.


See also: https://github.com/openssh/openssh-portable/pull/77
Comment 1 Damien Miller 2019-07-19 15:44:20 AEST
An adaptation of your patch was included in OpenSSH >= 7.7 - thanks
Comment 2 Damien Miller 2021-04-23 15:00:25 AEST
closing resolved bugs as of 8.6p1 release