GeekSpeak: June 10, 2002

 
 
By Timothy Dyck  |  Posted 2002-06-10 Print this article Print
 
 
 
 
 
 
 

Privilege separation makes openssh more secure.

OpenSSH, the secure shell server (and one of the worlds most important pieces of security software), has been redesigned to add privilege separation for increased resistance to attacks.

Niels Provos, an OpenSSH developer, has pulled out all the code that performs user authentication and put it into a much simpler (and easier-to-secure) separate process. "The privileged parent can be modeled by a very small finite-state machine so that it is easy to reason about the code that is being executed with privileges," Provos wrote (accessible via www.eweek.com/links). OpenSSH 3.2.2, released May 17, includes this code as an experimental feature.

OpenSSHs new trusted authentication kernel hands off most network interaction to a process containing the bulk of the OpenSSH code, which now can run in unprivileged (nonroot) mode. This change would have prevented OpenSSHs recent off-by-one channel bug or its token-passing-bug security holes (fixed in OpenSSH 3.1 and 3.2.2, respectively).

 
 
 
 
Timothy Dyck is a Senior Analyst with eWEEK Labs. He has been testing and reviewing application server, database and middleware products and technologies for eWEEK since 1996. Prior to joining eWEEK, he worked at the LAN and WAN network operations center for a large telecommunications firm, in operating systems and development tools technical marketing for a large software company and in the IT department at a government agency. He has an honors bachelors degree of mathematics in computer science from the University of Waterloo in Waterloo, Ontario, Canada, and a masters of arts degree in journalism from the University of Western Ontario in London, Ontario, Canada.
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel