On Sun, Nov 28, 2004 at 12:37:11PM +0000, Colin Watson wrote:
> On Sat, Nov 27, 2004 at 05:26:50PM +0000, Colin Watson wrote:
> > Thanks for this. I've backported these to 3.8.1p1, which didn't have PAM
> > PasswordAuthentication; the patch is attached. It seems to work for me.
> > After a bit more testing I'll upload this to unstable.
>
> Here's a further patch on top of your openssh-pam-kbdint-leak.patch
> which makes sure that attempted root logins when PermitRootLogin is not
> set to yes always have the same delay (Debian bug #248747). It's the
> same as you did for PAM PasswordAuthentication.
Message-ID: <email address hidden>
Date: Sun, 28 Nov 2004 12:52:14 +0000
From: Colin Watson <email address hidden>
To: Darren Tucker <email address hidden>
Cc: Joey Hess <email address hidden>, <email address hidden>,
<email address hidden>
Subject: Re: Bug#281595: timing attack allows attacker to determine valid usernames
--G4iJoqBmSsgzjUCe Disposition: inline
Content-Type: text/plain; charset=us-ascii
Content-
On Sun, Nov 28, 2004 at 12:37:11PM +0000, Colin Watson wrote: ication; the patch is attached. It seems to work for me. pam-kbdint- leak.patch ication.
> On Sat, Nov 27, 2004 at 05:26:50PM +0000, Colin Watson wrote:
> > Thanks for this. I've backported these to 3.8.1p1, which didn't have PAM
> > PasswordAuthent
> > After a bit more testing I'll upload this to unstable.
>
> Here's a further patch on top of your openssh-
> which makes sure that attempted root logins when PermitRootLogin is not
> set to yes always have the same delay (Debian bug #248747). It's the
> same as you did for PAM PasswordAuthent
... how about I actually attach it?
--
Colin Watson [<email address hidden>]
--G4iJoqBmSsgzjUCe Disposition: attachment; filename= "openssh- root-delay. patch"
Content-Type: text/plain; charset=us-ascii
Content-
Index: auth-pam.c ======= ======= ======= ======= ======= ======= ======= ======= ==== cvs/openssh/ openssh/ auth-pam. c,v init(&buffer) ; authctxt- >valid) authctxt- >valid && authctxt- >pw->pw_ uid != 0 || permit_ root_login == PERMIT_YES)) put_cstring( &buffer, *resp); put_cstring( &buffer, badpw);
=======
RCS file: /home/cjwatson/
retrieving revision 1.11
diff -p -u -r1.11 auth-pam.c
--- auth-pam.c 28 Nov 2004 12:31:03 -0000 1.11
+++ auth-pam.c 28 Nov 2004 12:33:20 -0000
@@ -645,7 +645,9 @@ sshpam_respond(void *ctx, u_int num, cha
return (-1);
}
buffer_
- if (sshpam_
+ if (sshpam_
+ (sshpam_
+ options.
buffer_
else
buffer_
--G4iJoqBmSsgzj UCe--