LWN.net Logo

Advertisement

GStreamer, Embedded Linux, Android, VoD, Smooth Streaming, DRM, RTSP, HEVC, PulseAudio, OpenGL. Register now to attend.

Advertise here

Crying wolf over OpenSSH

By Jake Edge
July 15, 2009

In the security world, there is always tension between under and over-reporting on vulnerabilities. Not only between the "full" and "responsible" disclosure camps, but also for those trying to make sure that users are aware of the most recent attacks. Sometimes, that can lead to reports that eventually turn out to be incomplete, overstated, or flat out wrong. There is value even in incorrect reports, though; at a minimum they can raise the profile of the most vulnerable of services—reminding administrators to update and/or reconfigure the affected program—which may reduce the impact of the next exploit.

For many reasons, ssh vulnerabilities—or purported vulnerabilities—are treated differently than others. If this had been a report of yet another content management system cross-site scripting flaw or wireshark dissector bug, it would not have gotten much, if any, notice. But, ssh is one service that is turned on for nearly every server on the internet. Without ssh, many administrators couldn't access the server to handle important tasks—security updates for example.

In addition, many internet servers have just a few, trusted users, which may—unfortunately—make their administrators rather sanguine about patching for local privilege escalation flaws. That makes a way to subvert ssh and get that local access suddenly a much more dangerous flaw. In addition, many administrators allow root to log in remotely, so an ssh vulnerability might lead to root privileges without needing an additional privilege escalation flaw.

It is safe to say that exploitable ssh vulnerabilities are very high on the list of things that keep system administrators up at night. So that makes it rather easy to stir up a firestorm of publicity by reporting one. The Internet Storm Center (ISC) was one of the first to report on the rumored OpenSSH vulnerability (which we also passed along). The whole thing got started with a post to the full-disclosure mailing list that purported to show an ssh "zero-day" exploit compromising a server in New Zealand.

It wasn't very long before folks realized that it was likely the result of a "brute force" attack against a user password, but there was enough "chatter" of various sorts (see the updates on the ISC post) that it was difficult to be sure. In the end, we still aren't completely sure, but OpenSSH developer Damien Miller posted his belief that there was no ssh zero-day; ISC also posted a notice calling the vulnerability reports bogus. In the absence of any more information, those would seem to close the book on this vulnerability.

While it was a bit of a fire drill, it is likely that the reports led to some system administrators taking a look at their ssh installation to make sure it was up-to-date. They may also have tightened up their configuration in ways that might lessen the chances of a vulnerability affecting their systems. Disallowing root logins, requiring key-based instead of password-based logins, or restricting ssh access to certain IP addresses are all steps that administrators may have taken. Perhaps it was needless in this case, but a general tightening up of ssh configuration is likely to be helpful in fending off brute-force or other attacks down the road.


(Log in to post comments)

Crying wolf over OpenSSH

Posted Jul 16, 2009 9:38 UTC (Thu) by jengelh (subscriber, #33263) [Link]

Protocol 2
Ciphers aes256-ctr
MACs hmac-sha1

Crying wolf over OpenSSH

Posted Jul 16, 2009 19:08 UTC (Thu) by dion (subscriber, #2764) [Link]

I'll raise you:

PasswordAuthentication no
PermitRootLogin no

Crying wolf over OpenSSH

Posted Jul 17, 2009 3:57 UTC (Fri) by dtucker (guest, #6575) [Link]

If you have PAM enabled and you probably also want "ChallengeResponseAuthentication no" if it's not already set.

Crying wolf over OpenSSH

Posted Jul 17, 2009 8:45 UTC (Fri) by pabs (subscriber, #43278) [Link]

It is worth noting that even if there is no 0-day exploit, this was a successful social engineering attack; according to the ISC article, some web hosting companies shut down their SSH services.

Crying wolf over OpenSSH

Posted Jul 18, 2009 22:33 UTC (Sat) by Baylink (subscriber, #755) [Link]

If for some reason (and let us not get into just now what those reasons might be, and whether they're good enough for *you*) you need to run sshd in a password-accepting environment, let me recommend the SSH Brute Force attack defense page:

http://la-samhna.de/library/brutessh.html

I personally use the hosts.allow approach, but there's some good skullsweat on this page, whichever one suits you.

Crying wolf over OpenSSH

Posted Jul 20, 2009 14:40 UTC (Mon) by wookey (subscriber, #5501) [Link]

The thing I find missing for ssh is an easy way to say that only a subset of users on the machine can do remote ssh logins. I have machines with lots of users, but only a few of those need to do remote ssh. And of course those machines are hammered by brute-force attacks all the time, so restricting possible valid logins to the people who know what they are doing and can be relied-upon to have strong passwords would be a huge help.

The normal install is an everyone or nobody affair.

Crying wolf over OpenSSH

Posted Jul 20, 2009 14:45 UTC (Mon) by Baylink (subscriber, #755) [Link]

Well, yeah, but it's pretty trivial to limit it:

http://www.cyberciti.biz/tips/openssh-deny-or-restrict-ac...

Crying wolf over OpenSSH

Posted Jul 20, 2009 21:50 UTC (Mon) by nix (subscriber, #2304) [Link]

Note that in recent versions of OpenSSH you can put these under Match as
well, so different users/groups can be allowed in depending on where they
are connecting from.

Crying wolf over OpenSSH

Posted Jul 21, 2009 3:09 UTC (Tue) by deunan_knute (subscriber, #290) [Link]

This is a very handy feature that, frustratingly, hasn't made its way into RHEL or CentOS yet.

Copyright © 2009, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds