[23123] in bugtraq

home help back first fref pref prev next nref lref last post

Re: OpenSSH & S/Key information leakage

daemon@ATHENA.MIT.EDU (Markus Friedl)
Tue Nov 13 08:59:01 2001

Date: Tue, 13 Nov 2001 13:00:04 +0100
From: Markus Friedl <markus@openbsd.org>
To: Joel Maslak <jmaslak@antelope.net>
Cc: bugtraq@securityfocus.com
Message-ID: <20011113130004.A24212@faui02.informatik.uni-erlangen.de>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
In-Reply-To: <Pine.LNX.4.21.0111111810040.9341-100000@bigsky.antelope.net>; from jmaslak@antelope.net on Sun, Nov 11, 2001 at 06:29:38PM -0700

On Sun, Nov 11, 2001 at 06:29:38PM -0700, Joel Maslak wrote:
> There are some bad implementations of S/Key in client programs.  OpenSSH
> (at least on OpenBSD 2.9) is one such bad implementation.  OpenSSH only
> provides this challenge string if (1) the user exists and (2) the user is
> using one-time-passwords.

This depends very much on the version of the OpenSSH and the versions
of your skey library. OpenSSH switched away from creating fake skey
challenges, and now depends on the skey/otp/bsdauth/whatever-library to
created fake challenges. With BSD_AUTH it even depends on the
authentication algorithms available in the default class.

With a post-Nov 2000 OpenBSD, skeychallenge() creates fake challenges,
so OpenSSH does not need to care.

home help back first fref pref prev next nref lref last post