Welcome to my site. Please CLICK HERE to give your opinions regarding this new look of "PCTipsbyAnu". Thanks for visiting.

Tuesday, September 7, 2010

Browse » Home » , , , , , , , , » LINUX : OpenSSH Vulnerability

LINUX : OpenSSH Vulnerability


About twenty minutes after the OpenSSH vulnerability was discovered, I started getting a number of messages from readers asking how to upgrade OpenSSH (http://www.openssh.com) safely. 

So here goes!


Many Linux distros are starting to ship with the OpenSSH daemon. OpenSSH is a replacement for the insecure rlogin, rsh, rcp, ftp, x11, and telnet protocols that offer no encryption and are vulnerable to numerous insertion, hijacking, ip spoofing, and other attacks. OpenSSH also has encrypted port-forwarding features that make it indispensable at times.

Anyone with security in mind should have long since turned off telnet and friends, and should rely on ssh for logins only. The problem occurs when it's time to upgrade the ssh daemon. If your machines are in a server room miles away with only SSH access, the last thing you want to do is either break sshd during the upgrade or get in your car and go back to the office.

Most folks don't realize that you can kill off the sshd server process (the one that forks off copies to handle incoming connections) without killing off any existing connections. That means you can log in, kill off the server process, and still work on the system until you log out. Instead, most folks think you need to upgrade and reboot so the changes take effect. This is not the case. However, if you don't take a few precautions, then you could find yourself in the unfortunate situation where you've killed the old process and accidentally logged out (or, more likely, kill all sshd processes) before starting the new daemon.

The following is my extremely paranoid procedure to ensure that I can remain sitting in my comfy chair, legs propped on the desk, and a bottle of caffinated beverage within easy reach. Driving to the server room is for Windows administrators.

The following assumes your ssh etc files are in /etc/ssh, and that your sshd binary is in /usr/sbin. Salt to taste.

1. Establish a copy of your working sshd daemon on port 9999:

server# mkdir /root/ssh-whoops
server# cd /root/ssh-whoops
server#cp -p /etc/ssh/* /usr/sbin/sshd  .
server# /root/ssh-whoops/sshd -p 9999 -f /root/ssh-whoops/sshd_config

2. Connect to your machine on this port a few times to make sure it works, and give you a few login sessions in case of bad things later.

home$ ssh MACHINE -p 9999
home$ ssh MACHINE -p 9999
home$ ssh MACHINE -p 9999
home$ (repeat until paranoia satisfied)

3. Upgrade your OpenSSH software in whatever way you use.

server#  rpm -F ...

or

server#  apt-get update && apt-get upgrade

or

server#  ./configure && make && make install

....

4. Find the normal sshd process id:

server#  ps -ef | grep sshd
root   10283 12684  0 Feb05 ?  00:00:05 /usr/sbin/sshd
root   12684     1  0 Dec03 ?  00:01:21 /usr/sbin/sshd
root   15446     1  0  4:15 ?  00:00:00 /usr/sbin/sshd -p 9999 -f ...
root   15846 15446  0  4:16 ?  00:00:00 /usr/sbin/sshd -p 9999 -f ...
root   15850 15446  0  4:16 ?  00:00:00 /usr/sbin/sshd -p 9999 -f ...
root   16748 12684  0 Feb25 ?  00:00:00 /usr/sbin/sshd


The process you're looking for will be the daemon (i.e., the PPID is 1) that is *not* running with the '-p 9999' arguments. In the above listing, that'd be process #12684.

5. Kill the sshd server process:

server# kill 12684

6. Wipe the sweat from your brow. It'll be ok.

7. Start the new ssh daemon (assuming you installed it in /usr/sbin where the original was).

server# /usr/sbin/sshd

8. Log in from home and make sure everything's ok.

home$ ssh -v MACHINE

9. Make sure that you see the version number you expect in the debugging output. For example, if you'd just upgraded to 3.1p1, you'd want to see a line like the following:

Remote protocol version 1.99, remote software version OpenSSH_3.1p1

10. If things aren't ok, then you still have a few login sessions open to use to fix the problems (perhaps the semantics of sshd_config has changed between versions) and also have the old version of the daemon available on port 9999, which you could connect to like you did in step 1 above, even if you accidentally log out of all your sessions. Fix the problems and go back to step 6. 


11. When all problems are fixed, kill off the temporary sshd listening on port 9999 and nuke the old files:
server# kill 15446
server# rm -r /root/ssh-whoops

Using this method, you've got enough preventative measures that you should have no worries if the new sshd doesn't work right away. No need for a reboot and, more importantly, no need to leave your chair.
You can leave a response, or trackback from your own site.

About 'Anu': My name is 'Anu' also Known as 'ANU 007 TIGER' .I'm administrator of 'PC Tips by Anu' blog .This blog was opened for sharing contents about hacking n cracking.
Thanks YAHOO OR GMAIL

0 comments:

Post a Comment

 
Back to Top