Article 1EEZE A report on the CoreOS remote SSH vulnerability

A report on the CoreOS remote SSH vulnerability

by
corbet
from LWN.net on (#1EEZE)
For those who are curious about how the CoreOS remote SSH vulnerabilitycame to be, the company has posted adetailed report. "This misconfiguration was abetted byconfirmation bias. The expected outcome of the change to the CoreOS PAMconfiguration was for users who presented a password present in anauthentication database to be successfully authenticated. Because of thepam_permit failure case explained above, this was the observed behavior intesting, so the change was assumed to be correct. No attempt was made todetermine whether the observed behavior could be explained in some otherway, such as the system allowing any presented password."
External Content
Source RSS or Atom Feed
Feed Location http://lwn.net/headlines/rss
Feed Title LWN.net
Feed Link https://lwn.net/
Reply 0 comments