Bug 90799
Summary: | CAN-2003-0190 OpenSSH/PAM timing attack | ||
---|---|---|---|
Product: | [Retired] Red Hat Linux | Reporter: | Jesse Throwe <jesse.throwe> |
Component: | openssh | Assignee: | Nalin Dahyabhai <nalin> |
Status: | CLOSED WONTFIX | QA Contact: | Brian Brock <bbrock> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 7.1 | CC: | psr |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0190 | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2004-01-02 10:38:16 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Jesse Throwe
2003-05-13 22:24:42 UTC
The errata packages (https://rhn.redhat.com/errata/RHSA-2003-222.html) released to fix this issue have introduced a small side effect - /var/log/messages now records an authentication failure for every successful login (happens on at least RedHat 7.2 and 8.0): Jul 29 23:17:26 redhat72 sshd(pam_unix)[10163]: authentication failure; logname= uid=0 euid=0 tty=NODEVssh ruser= rhost=remotehost user=root Jul 29 23:17:31 redhat72 sshd(pam_unix)[10163]: session opened for user root by (uid=0) It would be preferable if the validation of the username was not actually logged as an authentication failure as it makes it difficult to tell the difference between successful logins and real authentication failures. Agreed. And without the nodelay option, you end up with an extra delay before logging in. I'd prefer to be able to have a fast login, and keep the delay if there's a failed attempt. |