[14087] in bugtraq

home help back first fref pref prev next nref lref last post

Re: SSH & xauth

daemon@ATHENA.MIT.EDU (Cy Schubert - ITSD Open Systems Gr)
Tue Feb 29 21:45:16 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <200002281835.KAA05769@cwsys.cwsent.com>
Date:         Mon, 28 Feb 2000 10:35:55 -0800
Reply-To: Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>
From: Cy Schubert - ITSD Open Systems Group <Cy.Schubert@UUMAIL.GOV.BC.CA>
X-To:         Theo de Raadt <deraadt@CVS.OPENBSD.ORG>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  Your message of "Sun, 27 Feb 2000 20:01:41 MST." 
              <200002280301.UAA09309@cvs.openbsd.org>

In message <200002280301.UAA09309@cvs.openbsd.org>, Theo de Raadt
writes:
> > > All children of the SSH connection are able to tunnel X11 sessions
> > > through the X tunnel to the client X11 session.  This is
> > > accomplished by running xauth upon logging in.
> >
> > I'm really suprised this is still the default.  I've heard mention of
> > this at least 4 years ago, and have seen trojaned SSH servers around
> > _since then_ that do logging of client X11 keystrokes - probably the
> > best place to accomplish this.  The problem seems to be that the
> > authors have not figured out that this isn't a good default, perhaps
> > for convenience's sake.  This suprises me, since people DO know about
> > this.  I think the argument is really convenience vs. security (well,
> > thats always the argument isn't it?).
> >
> > alias ssh="ssh -x"
>
> Earlier, bugtraq was told that all ssh versions including openssh
> automatically tunnel X.
>
> This is not correct.  openssh has that turned off by default.
>

Theo, I held the same opinion as you until it was pointed out to me
offline that it's not the server that needs the default specification,
as it already has, and because an untrusted server could have its
specification changed.  Instead the ssh_config (client) needs to have
its default changed to deny X tunnelling as well in case an untrusted
server, e.g. a server one does not trust, has its specification X
tunnelling changed to allow it.

To disable X forwarding, ssh_config also needs,

Host *
  ForwardX11 no

Ultimately turning on X forwarding would require changing of
sshd_config, to enable the server X forwarding, and the users
~/.ssh/config file to enable the client's accepting of forwarded X
packets.  The second half of this would put the onus on the user for
their own security, as the user would have to specifically enable X
forwarding, even though the server already has it enabled.


Regards,                       Phone:  (250)387-8437
Cy Schubert                      Fax:  (250)387-5766
Team Leader, Sun/DEC Team   Internet:  Cy.Schubert@uumail.gov.bc.ca
UNIX Group, ITSD, ISTA
Province of BC
                    "COBOL IS A WASTE OF CARDS."

home help back first fref pref prev next nref lref last post