Hacker News new | past | comments | ask | show | jobs | submit login
Trivial authentication bypass in libssh leaves servers wide open (arstechnica.com)
227 points by okket on Oct 17, 2018 | hide | past | favorite | 62 comments



From the reading, the "hack" is pretty embarrassing. The server->client message that announces you're authenticated is instead sent client->server and the server just sets its mode to that. Abracadabra, you're logged in!


> the vulnerability literally works like this:

> me: "can i log in?"

> server: "no. you need a password."

> me: "hacker voice i'm in"

> server: "login successful. you're in"

https://mobile.twitter.com/FioraAeterna/status/1052294419607...


The fix implements a basic state machine to ensure protocol state transitions are sane. Prior to this, attacker-supplied data was used in calculating the offset inside an array of callbacks. So you could just tell the server to call into the “auth success” handler.


How on earth did this get past the developer dear god


This is the state of libssh. As if it wasn’t already, “many eyeballs theory” is turning over in it’s grave.

Contrast this level of insanity to a proposed standard of “developers should be liable for the damage caused by their negligent code”.

Just, wow.


>> developers should be liable for the damage caused by their negligent code

To be fair, at this point I would rather see developers not writing code; rather than writing buggy one.

I had a friend on FB who's just completed a security course and wrote a password generator in Go. The random was seeded from a current date in nanoseconds. The issue is that while no one will probably ever reverse his passwords, but the guy open-sourced his script. How many people will be influenced by that piece of code?

Lawyers have that: if you can't be liable - you're not a lawyer. GTFO.


I found that same exact issue in Terraform Go code where it generates passwords for AWS IAM users: https://www.cvedetails.com/cve/CVE-2018-9057/

We need to find out who is teaching this stupidity and make them stop.


libssh is pretty niche. This isn't openssh.


libssh is used because openssh isn't suited to be used as a library. So it's one of the most popular ways to automate the most popular remote shell protocol.

It's not really niche - I'd say it's an average popularity library and likely used by a bunch of internal projects.


The libssh client code is used pretty commonly for that sort of thing.

The libssh server code, on the other hand, is pretty niche.


So "niche" it was used by github, albeit in a configuration that protected them from this


Except for github, its unlikely you use any software that uses libssh.

Just because it has that name dosen't make it some kind of official SSH library that tons of software uses.


What does git use?


OpenSSH.


Actually, just whatever 'ssh' binary is installed. That is not necessarily OpenSSH, but it is the most common choice.


Easy: it's implemented in C.

While the brain cells of the C programmers are busy handling errors, managing memory, and avoiding buffer overflow, they forget about sound software engineering rules and proper design. While the code of libssh looks cleaner than eg. FreeBSD, there are still quite a number of functions that are bigger than a screen height.


I don't see how different language would protect you from this kind of vulnerability. Array of callbacks looks identical everywhere. Rust or Java would protect from out-of-bounds memory access (and that is a very good thing in that case), but this particular bug would be present.


You're assuming there would even be an array of callbacks if the code had been written in a different language, rather than the other language offering some nicer abstraction that eliminated the array. Having not seen the code, I can't be sure of this, but I know that, for instance, I rarely need to write array index arithmetic in the languages I usually work with (Python, JavaScript) whereas on the occasions I've dabbled with C such arithmetic came up constantly. If I introduced a nasty bug in some C code due to an array arithmetic error, arguing "Python wouldn't be any better because it doesn't do anything to make manually writing array index manipulations easier" would be missing the point.



A perfect example of why "use safe languages! C is the root of all RCE!" makes me immediately weary of a developer. Had the original poster been the author of such a library, he wouldn't have been motivated to spent much or any time investigating his implementation because he used a safe language.


Same issue and might even explain it better: They took the client-side implementation and effective state machine, flipped it around, and called it good.


Array of callbacks (or long switch which is essentially the same) is a standard method to implement state machine.


You can use type system to ensure that there are no wrong state transitions, e.g. you could transit to another state only if you are authorized.


And that's why you should use a thoroughly tested implementation instead of implementing a bug-ridden ad-hoc square wheel.

"Whoopsies, I forgot to ban some state transitions" won't happen if all you're writing is a state machine spec, and not a state machine spec and its ad-hoc implementation.

Don't roll your own crypto? Extend it to "don't roll your own low-level constructs".


> they forget about sound software engineering rules and proper design. While the code of libssh looks cleaner than eg. FreeBSD, there are still quite a number of functions that are bigger than a screen height.

You seem to be a very smart guy; will making my font smaller so my functions are shorter improve my code?


you 're assuming an incompetent programmer here, or just spreading FUD about non managed languages.


What makes this a bit more understandable is: almost nothing uses libssh server functionality. So most development was only focused on client functionality.

(The only notable exception, github.com backends, were not using the auth logic code in question, so again just not used and not given attention...)


Suspicious-me wonders who wrote/committed that code... Is it a "plausibly deniable mistake"?


Having implemented security protocols and used state machines to track state, this is a surprisingly easy (if embarrassing) mistake to make. It’s very easy to spend a lot of energy validating the documented state transitions and essentially forget to ban all other transitions.

For me this is much less “OMG how could they be so careless” and much more “There but for the grace of a diligent set of testers go I”


I guess you could say that about absolutely any bug though? This isn’t particularly underhanded, and it’s more of a broad design flaw than a subtle change. If you wanted a “backdoor” you could absolutely do 10x better than this.


How could you do 10x better? Because it's a broad design flaw there is no suspicious LOC or suspiciously overcomplicated code needed to hide the backdoor. You have to understand the whole context to notice the bug.


But it’s still there in plain sight. I’d hazard a guess that this may be the first time a solid code reviewer looked at the code, and spotted it straight away*

If you wanted 10x better, you could throw in some code that exhibits undefined (but known on major compilers) behavior, or super subtle C issues. Even a simple if statement in C forces all kinds of wonderful promotions and type conversions which can truncate, wrap, and drastically change values in ways that even most C developers aren’t aware.

I encourage folks to go check out the “underhanded C contest” before suggesting that this bug is a backdoor.

*The person who found this, Peter, is indeed insanely good.


Make sure the PRNG does not source enough entropy thus dramatically weakening all session keys to a crackable level.

Or do like WEP and recycle your one time pads. Lots of subtle design flaws one can introduce that generally get spotted in blackbox testing, and not in code.


I mean, a backdoor can just be flipping an if somewhere from && to ||, not exactly suspicious if it's mixed in with other stuff.


Pretty sure it's not insane to wonder that about any bugs _that give you a remote authentication bypass_...


Sure, you can wonder, but when I break it down, it’s either highly unlikely or highly clumsy.

If I were to put a backdoor into this code, I’d want the following properties:

- tricky to spot in code review

- virtually undiscoverable via current best-of-breed fuzzing

- tricky to spot in network captures or any type of IDS

This bug passes #2 (unless you’ve got a state-aware network fuzzer and panic() in the right places), but fails on the other two.

But who knows, maybe this was a low-investment effort and it paid off for some time, with a trivial-to-exploit (IE no mem corruption) bug they knew would eventually be retired?


Nope. It is so glaring it could only have been a mistake.


Hehe, which makes it a perfect plausible deniable mistake ;-)


This is the code equivalent of being allowed to wander around in a restricted area because you're carrying a clipboard.


or like the code equivalent of walking up to a locked door, shouting "let him in!" and being let in


Note that libssh != openssh, which is what's probably running on your server.


I had a semi heartattack for a second until I realized that


I tried to find what it is used in. The site claims that it's used server-side by GitHub: https://www.libssh.org/#text-5


    $ apt-cache rdepends libssh-4
    libssh-4
    Reverse Depends:
      libpam-x2go
      yafc
      x2goclient
      tmate
      remmina-plugin-nx
      remmina
      openvas-nasl
      libopenvas9
      libssh-dev
      cockpit-bridge
      kio-extras
      hydra
This is all of the packages that depend on libssh in Debian Testing, doesn't seem to be very problematic, I've only heard of one thing on this list, and that doesn't use the server code anyways.


Tmate might have issues...there's both client and server code.


Nice command. Cockpit-bridge has a very good name!


GitHub says that the way they're using libssh isn't affected. They apparently use in-house code for the authentication.

https://twitter.com/GitHubSecurity/status/105231733337972326...


Dependents in Homebrew: Csync, Hydra, Sshtrix, Yafc.

[1] http://brewformulas.org/Libssh


Those are almost certainly all using the client functionality. I'm not sure what uses libssh as an ssh server. (Edit: it may be that there is no open source code in existence anywhere which uses libssh in this way, except maybe some sample code. See https://twitter.com/cryptomilk/status/1052286350379114496 )


For some reason that site doesn't seem to list all possibly reverse dependencies of libssh.

According to the brew uses command the possible dependents are ffmpeg, ffmpeg@2.8, hydra, sshtrix, tmate, wireshark, and yafc. I say possible because some of those can optionally depend upon libssh, but the user has to opt-in to building with libssh support.


"GitHub isn’t vulnerable [...] my guess is you’ll be left with a small handful of random sftp servers or IoT devices and little else!”

That sounds reassuring. It's not as if hacking some random IoT device is going to win the jackpot.

Oh wait, it totally can: https://www.washingtonpost.com/news/innovations/wp/2017/07/2...


Most embedded devices which have ssh server functionality use Dropbear. You'll have to look really hard to find anything which uses this "libssh" server functionality (which, again, is _not openssh_).


Apparently there was an almost identical vulnerability in the Python SSH library Paramiko too: https://github.com/paramiko/paramiko/issues/1283



Is this a code error or a protocol error? If a protocol relies on a message from the client side to allow access, it's a protocol error!

It's unlikely that ssh - a protocol that powers large swaths of software, has such an error, but always good to hear from the experts that this is indeed a coding error.


It's an incorrect implementation of the protocol, yes. That message should only be sent from the server to the client, and the server should not take any action (besides dropping the connection) when it's received.


Move along. This isn't the exploit you're looking for.

(Unless your server uses the relatively uncommon libssh on your server. If you use openssl you're not vulnerable. Github's not vulnerable either.)


What a strange coincidence :/

First we had the YouTube outage and a bit later, this issue appeared...


I never heard of this library before. Most projects seem to use libssh2. https://github.com/libssh2/libssh2


libssh2 doesn't have server support.


Well, if there is libssh2, most likely there is libssh.


They are unrelated. I think libssh2 is named that as it implements the v2 ssh protocol.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: