[27309] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cisco says attacks are due to operational practices

daemon@ATHENA.MIT.EDU (adrian@creative.net.au)
Fri Feb 11 14:17:17 2000

From: adrian@creative.net.au
Date: Sat, 12 Feb 2000 03:07:25 +0800
To: nanog@merit.edu
Message-ID: <20000212030724.E82000@ewok.creative.net.au>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
In-Reply-To: <38A45BC0.73084959@pluris.com>; from Bora Akyol on Fri, Feb 11, 2000 at 10:58:08AM -0800
Errors-To: owner-nanog-outgoing@merit.edu


On Fri, Feb 11, 2000, Bora Akyol wrote:
> 
> Unfortunately, ssh on linux regularly assigns ports when ssh'ing out from a box
> below 1024, I think this is a bug, but make writing firewall commands annoying.
> 
> Bora

Its not a bug, its a leftover from rsh days - if the connection originates
from a port below 1024, you could assume *cough* that the credentials the
connection supplies are authentic, since the process needs to be root to
bind to ports < 1024.

This isn't a "but thats flawed!" discussion seed, take that to bugtraq.

There's a flag to ssh somewhere to stop it doing that. Yup, -P .




Adrian



home help back first fref pref prev next nref lref last post