Subject: Re: evil? sshd patch
To: Kevin P. Neal <kpneal@pobox.com>
From: Andrew Brown <atatat@atatdot.net>
List: tech-security
Date: 11/03/1999 12:17:56
  by redmail.netbsd.org with SMTP; 3 Nov 1999 17:20:17 -0000
	by noc.untraceable.net (8.10.0.Beta6/8.10.0.Beta6/bonk!) id dA3HHug22781;
	Wed, 3 Nov 1999 12:17:56 -0500 (EST)
Date: Wed, 3 Nov 1999 12:17:56 -0500
From: Andrew Brown <atatat@atatdot.net>
To: "Kevin P. Neal" <kpneal@pobox.com>
Cc: tech-security@netbsd.org
Subject: Re: evil? sshd patch
Message-ID: <19991103121756.A22768@noc.untraceable.net>
Reply-To: Andrew Brown <atatat@atatdot.net>
References: <199911031352.IAA14915@Twig.Rodents.Montreal.QC.CA> <19991103121326.A18372@tome.neutralgood.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
In-Reply-To: <19991103121326.A18372@tome.neutralgood.org>; from kpneal@pobox.com on Wed, Nov 03, 1999 at 12:13:26PM -0500
Return-Receipt-To: receipts@daemon.org
Errors-To: errrors@graffiti.com

>> This is a gaping security hole waiting to happen to some site whose
>> local super-user is named something other than root.  (I'd expect you,
>> as someone in Oz-land, would be aware of this possibility.... :-)
>
>I know a guy who does just this. His 'root' account is named after
>cartoon characters.

well...geez...

-            || (auth_rsa(getpwnam("root"), &n, &sensitive_data.random_state,
+            || (auth_rsa(getpwuid(0), &n, &sensitive_data.random_state,

or do you know someone who changed the root uid as well?  :)

-- 
|-----< "CODE WARRIOR" >-----|
codewarrior@daemon.org             * "ah!  i see you have the internet
twofsonet@graffiti.com (Andrew Brown)                that goes *ping*!"
andrew@crossbar.com       * "information is power -- share the wealth."