summaryrefslogtreecommitdiff
path: root/debian/README.Debian
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2003-09-01 19:03:02 +0000
committerColin Watson <cjwatson@debian.org>2003-09-01 19:03:02 +0000
commit4a4400f027c87b8b8182ecad3e821c0a0db49df0 (patch)
treeb2ea7235c6f34ddb60f5f7001f23dfcfe1766fa3 /debian/README.Debian
parent1501d1e253613aba573e163869a2f704abd73a44 (diff)
parent854156dd39acbde9b4a47ec0fc54a042ea7358e0 (diff)
Debian release 3.6.1p2-1.
Diffstat (limited to 'debian/README.Debian')
-rw-r--r--debian/README.Debian125
1 files changed, 73 insertions, 52 deletions
diff --git a/debian/README.Debian b/debian/README.Debian
index 13d005ac0..5deac15be 100644
--- a/debian/README.Debian
+++ b/debian/README.Debian
@@ -16,6 +16,9 @@ Debian don't ship it.
16 16
17=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 17=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
18 18
19UPGRADE ISSUES
20==============
21
19Privilege Separation 22Privilege Separation
20-------------------- 23--------------------
21 24
@@ -33,8 +36,7 @@ want it turned off, you need to add "UsePrivilegeSeparation no" to
33 36
34NB! If you are running a 2.0 series Linux kernel, then privilege 37NB! If you are running a 2.0 series Linux kernel, then privilege
35separation will not work at all, and your sshd will fail to start 38separation will not work at all, and your sshd will fail to start
36unless you explicity turn privilege separation off. 39unless you explicitly turn privilege separation off.
37
38 40
39PermitRootLogin set to yes 41PermitRootLogin set to yes
40-------------------------- 42--------------------------
@@ -91,21 +93,9 @@ HostKey /etc/ssh/ssh_host_key
91 93
92(you may need to generate a host key if you do not already have one) 94(you may need to generate a host key if you do not already have one)
93 95
94/usr/bin/ssh not SUID: 96X11 Forwarding
95---------------------- 97--------------
96If you have not installed debconf, you'll have missed the chance to
97install ssh SUID, which means you won't be able to do Rhosts
98authentication. If that upsets you, use:
99
100 dpkg-statoverride
101
102or if that's also missing, use this:
103 98
104 chown root.root /usr/bin/ssh
105 chmod 04755 /usr/bin/ssh
106
107X11 Forwarding:
108---------------
109ssh's default for ForwardX11 has been changed to ``no'' because it has 99ssh's default for ForwardX11 has been changed to ``no'' because it has
110been pointed out that logging into remote systems administered by 100been pointed out that logging into remote systems administered by
111untrusted people is likely to open you up to X11 attacks, so you 101untrusted people is likely to open you up to X11 attacks, so you
@@ -117,8 +107,60 @@ host settings.
117In order for X11 forwarding to work, you need to install xauth on the 107In order for X11 forwarding to work, you need to install xauth on the
118server. In Debian this is in the xbase-clients package. 108server. In Debian this is in the xbase-clients package.
119 109
120Authorization Forwarding: 110As of OpenSSH 3.1, the remote $DISPLAY uses localhost by default to reduce
121------------------------- 111the security risks of X11 forwarding. Look up X11UseLocalhost in
112sshd_config(8) if this is a problem.
113
114Fallback to RSH
115---------------
116
117The default for this setting has been changed from Yes to No, for
118security reasons, and to stop the delay attempting to rsh to machines
119that don't offer the service. Simply switch it back on in either
120/etc/ssh/ssh_config or ~/.ssh/config for those machines that you need
121it for.
122
123Setgid ssh-agent and environment variables
124------------------------------------------
125
126As of version 1:3.5p1-1, ssh-agent is installed setgid to prevent ptrace()
127attacks retrieving private key material. This has the side-effect of causing
128glibc to remove certain environment variables which might have security
129implications for set-id programs, including LD_PRELOAD, LD_LIBRARY_PATH, and
130TMPDIR.
131
132If you need to set any of these environment variables, you will need to do
133so in the program exec()ed by ssh-agent. This may involve creating a small
134wrapper script.
135
136Symlink Hostname invocation
137---------------------------
138
139This version of ssh no longer includes support for invoking ssh with the
140hostname as the name of the file run. People wanting this support should
141use the ssh-argv0 script.
142
143=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
144
145OTHER ISSUES
146============
147
148/usr/bin/ssh not SUID
149---------------------
150
151Due to Debian bug #164325, RhostsRSAAuthentication can only be used if ssh
152is SUID. Until this is fixed, if that is a problem, use:
153
154 dpkg-statoverride
155
156or if that's also missing, use this:
157
158 chown root.root /usr/bin/ssh
159 chmod 04755 /usr/bin/ssh
160
161Authorization Forwarding
162------------------------
163
122Similarly, root on a remote server could make use of your ssh-agent 164Similarly, root on a remote server could make use of your ssh-agent
123(while you're logged into their machine) to obtain access to machines 165(while you're logged into their machine) to obtain access to machines
124which trust your keys. This feature is therefore disabled by default. 166which trust your keys. This feature is therefore disabled by default.
@@ -126,16 +168,9 @@ You should only re-enable it for those hosts (in your ~/.ssh/config or
126/etc/ssh/ssh_config) where you are confident that the remote machine 168/etc/ssh/ssh_config) where you are confident that the remote machine
127is not a threat. 169is not a threat.
128 170
129Fallback to RSH: 171Problems logging in with RSA authentication
130---------------- 172-------------------------------------------
131The default for this setting has been changed from Yes to No, for
132security reasons, and to stop the delay attempting to rsh to machines
133that don't offer the service. Simply switch it back on in either
134/etc/ssh/ssh_config or ~/.ssh/config for those machines that you need
135it for.
136 173
137Problems logging in with RSA authentication:
138--------------------------------------------
139If you have trouble logging in with RSA authentication then the 174If you have trouble logging in with RSA authentication then the
140problem is probably caused by the fact that you have your home 175problem is probably caused by the fact that you have your home
141directory writable by group, as well as user (this is the default on 176directory writable by group, as well as user (this is the default on
@@ -151,46 +186,32 @@ as yourself:
151to remove group write permissions. If you use ssh-copy-id to install your 186to remove group write permissions. If you use ssh-copy-id to install your
152keys, it does this for you. 187keys, it does this for you.
153 188
154-L option of ssh nonfree: 189-L option of ssh nonfree
155------------------------- 190------------------------
191
156non-free ssh supported the usage of the option -L to use a non privileged 192non-free ssh supported the usage of the option -L to use a non privileged
157port for scp. This option will not be supported by scp from openssh. 193port for scp. This option will not be supported by scp from openssh.
158 194
159Please use instead scp -o "UsePrivilegedPort=no" as documented in the 195Please use instead scp -o "UsePrivilegedPort=no" as documented in the
160manpage to scp itself. 196manpage to scp itself.
161 197
162Problem logging in because of TCP-Wrappers: 198Problem logging in because of TCP-Wrappers
163------------------------------------------- 199------------------------------------------
200
164ssh is compiled with support for tcp-wrappers. So if you can no longer 201ssh is compiled with support for tcp-wrappers. So if you can no longer
165log into your system, please check that /etc/hosts.allow and /etc/hosts.deny 202log into your system, please check that /etc/hosts.allow and /etc/hosts.deny
166are configured so that ssh is not blocked. 203are configured so that ssh is not blocked.
167 204
168Kerberos Authentication: 205Kerberos Authentication
169------------------------ 206-----------------------
207
170ssh is compiled without support for kerberos authentication, and there are 208ssh is compiled without support for kerberos authentication, and there are
171no current plans to support this. Thus the KerberosAuthentication and 209no current plans to support this. Thus the KerberosAuthentication and
172KerberosTgtPassing options will not be recognised. 210KerberosTgtPassing options will not be recognised.
173 211
174Setgid ssh-agent and environment variables: 212Interoperability between scp and the ssh.com SSH server
175------------------------------------------- 213-------------------------------------------------------
176ssh-agent is installed setgid as of version 1:3.5p1-1 to prevent ptrace()
177attacks retrieving private key material. This has the side-effect of causing
178glibc to remove certain environment variables which might have security
179implications for set-id programs, including LD_PRELOAD, LD_LIBRARY_PATH, and
180TMPDIR.
181
182If you need to set any of these environment variables, you will need to do
183so in the program exec()ed by ssh-agent. This may involve creating a small
184wrapper script.
185
186Symlink Hostname invocation:
187----------------------------
188This version of ssh no longer includes support for invoking ssh with the
189hostname as the name of the file run. People wanting this support should
190use the ssh-argv0 script.
191 214
192Interoperability between scp and the ssh.com SSH server:
193--------------------------------------------------------
194In version 2 and greater of the commercial SSH server produced by SSH 215In version 2 and greater of the commercial SSH server produced by SSH
195Communications Security, scp was changed to use SFTP (SSH2's file transfer 216Communications Security, scp was changed to use SFTP (SSH2's file transfer
196protocol) instead of the traditional rcp-over-ssh, thereby breaking 217protocol) instead of the traditional rcp-over-ssh, thereby breaking