[Secure-testing-team] Bug#792485: etckeeper/git sets SSH host key perms to 644

Sebastian Wagner sebix at sebix.at
Wed Jul 15 09:47:18 UTC 2015


Package: etckeeper
Version: 0.63
Severity: critical
Tags: patch security
Justification: root security hole

Dear Maintainer,

   * What led up to the situation?
I am using etckepper with git to keep track of my changes in /etc. After reverting a commit (used commands: revert, reset, commit, checkout) system was working properly and I had a clean repository.
After closing the SSH connection I got alerted about some log entries like this one:

Jul 15 09:04:52 sendai sshd[564]: error: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Jul 15 09:04:52 sendai sshd[564]: error: @         WARNING: UNPROTECTED PRIVATE KEY FILE!          @
Jul 15 09:04:52 sendai sshd[564]: error: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Jul 15 09:04:52 sendai sshd[564]: error: Permissions 0644 for '/etc/ssh/ssh_host_rsa_key' are too open.
Jul 15 09:04:52 sendai sshd[564]: error: It is required that your private key files are NOT accessible by others.
Jul 15 09:04:52 sendai sshd[564]: error: This private key will be ignored.
Jul 15 09:04:52 sendai sshd[564]: error: bad permissions: ignore key: /etc/ssh/ssh_host_rsa_key
Jul 15 09:04:52 sendai sshd[564]: error: Could not load host key: /etc/ssh/ssh_host_rsa_key

Too late. The SSH daemon does not allow incoming connections any longer to fix this.
etckeeper does not keep track of the permissions of /etc/ssh/ssh_host_*_key
Git automatically sets them to 644
On the one hand, SSH keys are world-readable which is a security hole and
on the other hand, SSH does as consquence not allow connections, which is rather unpleasant on servers.
   * What exactly did you do (or not do) that was effective (or
     ineffective)?
   * What was the outcome of this action?
Contacted hosting provider to fix the file permissions.
   * What outcome did you expect instead?
etckeeper/git keeps the permissions of SSH host key files at 600 as it does with other files.



-- System Information:
Debian Release: 7.8
  APT prefers oldstable-updates
  APT policy: (500, 'oldstable-updates'), (500, 'oldstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages etckeeper depends on:
ii  debconf [debconf-2.0]  1.5.49
ii  git                    1:1.7.10.4-1+wheezy1

Versions of packages etckeeper recommends:
ii  cron  3.0pl1-124

Versions of packages etckeeper suggests:
ii  sudo  1.8.5p2-1+nmu2

-- debconf information:
  etckeeper/commit_failed:
  etckeeper/purge: true



More information about the Secure-testing-team mailing list