Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Change allowing 0 length passwords caused openssh regression #7355

Closed
t8m opened this issue Oct 5, 2018 · 6 comments
Closed

Change allowing 0 length passwords caused openssh regression #7355

t8m opened this issue Oct 5, 2018 · 6 comments

Comments

@t8m
Copy link
Member

t8m commented Oct 5, 2018

The fix for issue #4716 caused regression in OpenSSH. It unfortunately depends on OpenSSL not attempting decryption of encrypted keys when zero-length password is passed to the callback, but returning a predictable error - that password is not supplied. Unfortunately for some of the keys that are encrypted with the old PEM encryption the decryption succeeds due to the accidentally correct padding in the decrypted garbage and the error returned is different.

In my opinion OpenSSH code is wrong and depending on things that it should not depend on but strictly speaking this is behavioral change on OpenSSL side.

See https://bugzilla.mindrot.org/show_bug.cgi?id=2913 for the discussion with OpenSSH.

@t8m t8m changed the title Change allowing 0 lenght passwords caused openssh regression Change allowing 0 length passwords caused openssh regression Oct 5, 2018
@mattcaswell
Copy link
Member

In my opinion OpenSSH code is wrong and depending on things that it should not depend on but strictly speaking this is behavioral change on OpenSSL side.

Interesting. Of course all bug fixes are a behavioural change in a way! One person's bug fix is another person's behaviour change if they happen to be relying on that buggy behaviour.

@t8m
Copy link
Member Author

t8m commented Oct 5, 2018

So true! :D

@petrovr
Copy link

petrovr commented Oct 8, 2018

Tomáš would you close this non OpenSSL issue?

@petrovr
Copy link

petrovr commented Oct 8, 2018

For protocol . issue is same as #6947. The difference is password length.
And yes 1.0.2p change "When unlocking a pass phrase protected PEM file or PKCS#8 container, we now allow empty (zero character) pass phrases." just reveals errorneous "translation of libcrypto errors" into SSH code.

@t8m
Copy link
Member Author

t8m commented Oct 9, 2018

I am not sure the issue is the same as #6947 - however it seems to be related.

@t8m
Copy link
Member Author

t8m commented Oct 10, 2018

Let's close this as it is not really issue in OpenSSL.

@t8m t8m closed this as completed Oct 10, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants