<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ssh leaking information in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-leaking-information/m-p/5174055#M732550</link>
    <description>Richard,&lt;BR /&gt;&lt;BR /&gt;This is I think, not particularly a function of ssh, but a function of the Pluggable Authentication Modules used by ssh, telnet, login etc...&lt;BR /&gt;&lt;BR /&gt;I don't know ssh well enough to know whether there is a way of turning this off - I do however have a little "hack" that at least makes the information "less obvious", by changing the message catalogue used by the PAM modules...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;cd /usr/lib/nls/msg/C/&lt;BR /&gt;cp -p /usr/lib/nls/msg/C/pam_comsec.cat /usr/lib/nls/msg/C/pam_comsec.cat.old&lt;BR /&gt;dumpmsg /usr/lib/nls/msg/C/pam_comsec.cat &amp;gt; pam_comsec.msg&lt;BR /&gt;&lt;BR /&gt;**edit pam_comsec.msg and replace "Your password was changed by %s" with just some white space - I found that just removing the whole line doesn't work **&lt;BR /&gt;&lt;BR /&gt;gencat /usr/lib/nls/msg/C/pam_comsec.cat.new pam_comsec.msg&lt;BR /&gt;&lt;BR /&gt;cp pam_comsec.cat.new pam_comsec.cat&lt;BR /&gt;&lt;BR /&gt;This at least obfuscates a little in that instead of:&lt;BR /&gt;&lt;BR /&gt;----------&lt;BR /&gt;ssh user@myhost&lt;BR /&gt;Your password has been changed by root&lt;BR /&gt;Password:&lt;BR /&gt;----------&lt;BR /&gt;&lt;BR /&gt;I now get:&lt;BR /&gt;&lt;BR /&gt;----------&lt;BR /&gt;ssh user@myhost&lt;BR /&gt;&lt;BR /&gt;Password:&lt;BR /&gt;----------&lt;BR /&gt;&lt;BR /&gt;Although its not perfect cos during a normal login you would get&lt;BR /&gt;&lt;BR /&gt;----------&lt;BR /&gt;ssh user@myhost&lt;BR /&gt;Password:&lt;BR /&gt;----------&lt;BR /&gt;&lt;BR /&gt;Which is subtly different for a hacker (but maybe not for an auditor!) I only played with it quickly, so there may be some way of inserting an escape sequence in the pam_comsec.msg file prior to generating the new pam_comsec.cat file with gencat.&lt;BR /&gt;&lt;BR /&gt;That worked OK for me - but then I haven't done more than 5 minutes testing and its *is* a hack...&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;Duncan</description>
    <pubDate>Fri, 08 May 2009 10:44:27 GMT</pubDate>
    <dc:creator>Duncan Edmonstone</dc:creator>
    <dc:date>2009-05-08T10:44:27Z</dc:date>
    <item>
      <title>ssh leaking information</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-leaking-information/m-p/5174054#M732549</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Does anybody know how to stop the system printing "Your password was changed by root"?&lt;BR /&gt;&lt;BR /&gt;If somebody is trying to hack their way into a server, say via ssh, by trying to find valid account names the above message gives the hacker the information he would be looking for - the account must exist.</description>
      <pubDate>Fri, 08 May 2009 09:20:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-leaking-information/m-p/5174054#M732549</guid>
      <dc:creator>Richard Hepworth</dc:creator>
      <dc:date>2009-05-08T09:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: ssh leaking information</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-leaking-information/m-p/5174055#M732550</link>
      <description>Richard,&lt;BR /&gt;&lt;BR /&gt;This is I think, not particularly a function of ssh, but a function of the Pluggable Authentication Modules used by ssh, telnet, login etc...&lt;BR /&gt;&lt;BR /&gt;I don't know ssh well enough to know whether there is a way of turning this off - I do however have a little "hack" that at least makes the information "less obvious", by changing the message catalogue used by the PAM modules...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;cd /usr/lib/nls/msg/C/&lt;BR /&gt;cp -p /usr/lib/nls/msg/C/pam_comsec.cat /usr/lib/nls/msg/C/pam_comsec.cat.old&lt;BR /&gt;dumpmsg /usr/lib/nls/msg/C/pam_comsec.cat &amp;gt; pam_comsec.msg&lt;BR /&gt;&lt;BR /&gt;**edit pam_comsec.msg and replace "Your password was changed by %s" with just some white space - I found that just removing the whole line doesn't work **&lt;BR /&gt;&lt;BR /&gt;gencat /usr/lib/nls/msg/C/pam_comsec.cat.new pam_comsec.msg&lt;BR /&gt;&lt;BR /&gt;cp pam_comsec.cat.new pam_comsec.cat&lt;BR /&gt;&lt;BR /&gt;This at least obfuscates a little in that instead of:&lt;BR /&gt;&lt;BR /&gt;----------&lt;BR /&gt;ssh user@myhost&lt;BR /&gt;Your password has been changed by root&lt;BR /&gt;Password:&lt;BR /&gt;----------&lt;BR /&gt;&lt;BR /&gt;I now get:&lt;BR /&gt;&lt;BR /&gt;----------&lt;BR /&gt;ssh user@myhost&lt;BR /&gt;&lt;BR /&gt;Password:&lt;BR /&gt;----------&lt;BR /&gt;&lt;BR /&gt;Although its not perfect cos during a normal login you would get&lt;BR /&gt;&lt;BR /&gt;----------&lt;BR /&gt;ssh user@myhost&lt;BR /&gt;Password:&lt;BR /&gt;----------&lt;BR /&gt;&lt;BR /&gt;Which is subtly different for a hacker (but maybe not for an auditor!) I only played with it quickly, so there may be some way of inserting an escape sequence in the pam_comsec.msg file prior to generating the new pam_comsec.cat file with gencat.&lt;BR /&gt;&lt;BR /&gt;That worked OK for me - but then I haven't done more than 5 minutes testing and its *is* a hack...&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;Duncan</description>
      <pubDate>Fri, 08 May 2009 10:44:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-leaking-information/m-p/5174055#M732550</guid>
      <dc:creator>Duncan Edmonstone</dc:creator>
      <dc:date>2009-05-08T10:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: ssh leaking information</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-leaking-information/m-p/5174056#M732551</link>
      <description>thanks Duncan.&lt;BR /&gt;&lt;BR /&gt;It does work but that newline is still a bit of a giveaway (or at least will be in the auditors eyes - they don't let much go :-) ). I have been unable so far to stop it from printing the newline......</description>
      <pubDate>Fri, 08 May 2009 11:09:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-leaking-information/m-p/5174056#M732551</guid>
      <dc:creator>Richard Hepworth</dc:creator>
      <dc:date>2009-05-08T11:09:08Z</dc:date>
    </item>
    <item>
      <title>Re: ssh leaking information</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-leaking-information/m-p/5174057#M732552</link>
      <description>Richard,&lt;BR /&gt;&lt;BR /&gt;Can you tell us a little more about your configuration? Are you runninmg a trusted system? On my 11.11 workstation which is trusted I can reproduce your problem, but on my untrusted 11.31 systems I can't...&lt;BR /&gt;&lt;BR /&gt;Assuming this is a trusted system, the other way to get around this is to remove the u_pwchanger=root entry  from the tcb file for the user, so you never get the message. I guess this could be scripted reasonably easily... e.g. if I've changed the password for user oracle then I'd need to remove the u_pwchanger=root entry from the file /tcb/files/auth/o/oracle&lt;BR /&gt;&lt;BR /&gt;This could be a manual process on password resets or I guess it could be scripted like something like this:&lt;BR /&gt;&lt;BR /&gt;#!/sbin/sh&lt;BR /&gt;# mypwreset.sh&lt;BR /&gt;# $1 = user to reset&lt;BR /&gt;&lt;BR /&gt;user=$1&lt;BR /&gt;&lt;BR /&gt;passwd ${user}&lt;BR /&gt;sed s/:u_pwchanger=root//g /tcb/files/auth/$(echo ${user} | cut -c 1)/${user} &amp;gt; /tmp/${user}.$$&lt;BR /&gt;cp /tmp/${user}.$$ /tcb/files/auth/$(echo ${user} | cut -c 1)/${user}&lt;BR /&gt;rm -f /tmp/${user}.$$&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;so that's quick and dirty and there's much more to think about - but I'm sure you get the gist...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;Duncan</description>
      <pubDate>Fri, 08 May 2009 13:33:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-leaking-information/m-p/5174057#M732552</guid>
      <dc:creator>Duncan Edmonstone</dc:creator>
      <dc:date>2009-05-08T13:33:26Z</dc:date>
    </item>
    <item>
      <title>Re: ssh leaking information</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-leaking-information/m-p/5174058#M732553</link>
      <description>Duncan, &lt;BR /&gt;&lt;BR /&gt;All our systems are trusted (11.31).&lt;BR /&gt;&lt;BR /&gt;Your second solution is probably best, we can just change our procedures for passwd resets (at least the procedure the auditor see's anyway!). &lt;BR /&gt;&lt;BR /&gt;It would be easier if u_pwchanger was editable via modprpw, but I can understand why it's not.&lt;BR /&gt;&lt;BR /&gt;thanks for your help!&lt;BR /&gt;&lt;BR /&gt;Richard</description>
      <pubDate>Fri, 08 May 2009 13:43:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-leaking-information/m-p/5174058#M732553</guid>
      <dc:creator>Richard Hepworth</dc:creator>
      <dc:date>2009-05-08T13:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: ssh leaking information</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-leaking-information/m-p/5174059#M732554</link>
      <description>Richard,&lt;BR /&gt;&lt;BR /&gt;One final point - I assume you are aware of the "deprecated" nature of trusted mode on 11iv3 (i.e. supported, but won't be in the next release) - you should at least be thinking about adopting standard mode security extensions instead:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://docs.hp.com/en/5992-3387/ch04s01.html" target="_blank"&gt;http://docs.hp.com/en/5992-3387/ch04s01.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;Duncan</description>
      <pubDate>Fri, 08 May 2009 14:18:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-leaking-information/m-p/5174059#M732554</guid>
      <dc:creator>Duncan Edmonstone</dc:creator>
      <dc:date>2009-05-08T14:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: ssh leaking information</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-leaking-information/m-p/5174060#M732555</link>
      <description>problem solved</description>
      <pubDate>Tue, 12 May 2009 05:19:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-leaking-information/m-p/5174060#M732555</guid>
      <dc:creator>Richard Hepworth</dc:creator>
      <dc:date>2009-05-12T05:19:54Z</dc:date>
    </item>
  </channel>
</rss>

