Debian Bug report logs -
#607602
openssh-server: Bogus warning, "Authentication tried for XXX with correct key but not from a permitted host"
Reported by: Bill Wohler <wohler@newt.com>
Date: Mon, 20 Dec 2010 05:27:02 UTC
Severity: normal
Tags: fixed-upstream
Merged with 659000
Found in versions openssh/1:5.5p1-5, openssh/1:5.5p1-6+squeeze1
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>:
Bug#607602; Package openssh-server.
(Mon, 20 Dec 2010 05:27:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Bill Wohler <wohler@newt.com>:
New Bug report received and forwarded. Copy sent to Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>.
(Mon, 20 Dec 2010 05:27:04 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: openssh-server
Version: 1:5.5p1-5+b1
Severity: normal
I'm getting this warning by mistake. If my authorized_keys file
contains:
from="hostA" ssh-dss <hostA-key> <hostA-addr>
from="hostB" ssh-dss <hostB-key> <hostB-addr>
I *always* get this warning when coming in from hostB. If I swap the
order, for example:
from="hostB" ssh-dss <hostB-key> <hostB-addr>
from="hostA" ssh-dss <hostA-key> <hostA-addr>
then I only get this warning when coming in from hostA.
I would expect that I could come in from either hostA *or* hostB
without this warning.
-- System Information:
Debian Release: squeeze/sid
APT prefers testing
APT policy: (600, 'testing'), (80, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages openssh-server depends on:
ii adduser 3.112+nmu2 add and remove users and groups
ii debconf [debconf-2.0] 1.5.36 Debian configuration management sy
ii dpkg 1.15.8.5 Debian package management system
ii libc6 2.11.2-7 Embedded GNU C Library: Shared lib
ii libcomerr2 1.41.12-2 common error description library
ii libgssapi-krb5-2 1.8.3+dfsg-3 MIT Kerberos runtime libraries - k
ii libkrb5-3 1.8.3+dfsg-3 MIT Kerberos runtime libraries
ii libpam-modules 1.1.1-6.1 Pluggable Authentication Modules f
ii libpam-runtime 1.1.1-6.1 Runtime support for the PAM librar
ii libpam0g 1.1.1-6.1 Pluggable Authentication Modules l
ii libselinux1 2.0.96-1 SELinux runtime shared libraries
ii libssl0.9.8 0.9.8o-4 SSL shared libraries
ii libwrap0 7.6.q-19 Wietse Venema's TCP wrappers libra
ii lsb-base 3.2-23.1 Linux Standard Base 3.2 init scrip
ii openssh-blacklist 0.4.1 list of default blacklisted OpenSS
ii openssh-client 1:5.5p1-5+b1 secure shell (SSH) client, for sec
ii procps 1:3.2.8-9 /proc file system utilities
ii zlib1g 1:1.2.3.4.dfsg-3 compression library - runtime
Versions of packages openssh-server recommends:
ii openssh-blacklist-extra 0.4.1 list of non-default blacklisted Op
ii xauth 1:1.0.4-1 X authentication utility
Versions of packages openssh-server suggests:
pn molly-guard <none> (no description available)
pn rssh <none> (no description available)
pn ssh-askpass <none> (no description available)
pn ufw <none> (no description available)
-- debconf information:
ssh/vulnerable_host_keys:
* ssh/use_old_init_script: true
ssh/encrypted_host_key_but_no_keygen:
ssh/disable_cr_auth: false
--
Bill Wohler <wohler@newt.com> aka <Bill.Wohler@nasa.gov>
http://www.newt.com/wohler/
GnuPG ID:610BD9AD
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>:
Bug#607602; Package openssh-server.
(Thu, 31 Mar 2011 14:57:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Joel Smith <js-debianbugs3@jk1.net>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>.
(Thu, 31 Mar 2011 14:57:05 GMT) (full text, mbox, link).
Message #10 received at 607602@bugs.debian.org (full text, mbox, reply):
The fix was committed upstream on May 21, 2010. Please backport the
patch if debian won't be moving to an upstream version with this fix soon.
http://anoncvs.mindrot.org/index.cgi/openssh/auth2-pubkey.c?r1=1.26&r2=1.27
Thanks,
Joel
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>:
Bug#607602; Package openssh-server.
(Thu, 31 Mar 2011 15:09:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Joel Smith <js-debianbugs3@jk1.net>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>.
(Thu, 31 Mar 2011 15:09:03 GMT) (full text, mbox, link).
Message #15 received at 607602@bugs.debian.org (full text, mbox, reply):
Sorry for the bad subject line in my last reply. I really was talking
about this bug, not the one I mentioned in my last subject line.
Merged 607602 659000.
Request was from Sergio Gelato <Sergio.Gelato@astro.su.se>
to control@bugs.debian.org.
(Sun, 19 Feb 2012 15:03:06 GMT) (full text, mbox, link).
Added tag(s) fixed-upstream.
Request was from Sergio Gelato <Sergio.Gelato@astro.su.se>
to control@bugs.debian.org.
(Sun, 19 Feb 2012 15:03:08 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>:
Bug#607602; Package openssh-server.
(Sat, 19 Jan 2013 13:06:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Richard Hector <richard@catalyst.net.nz>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>.
(Sat, 19 Jan 2013 13:06:03 GMT) (full text, mbox, link).
Message #24 received at 607602@bugs.debian.org (full text, mbox, reply):
This seems to apply with only one key in authorized_keys, if someone
genuinely is attempting to ssh into my box from a non-permitted host.
Unless they really have got hold of my key ... which makes this log
message kind of scary.
Richard
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Sat Mar 25 17:35:33 2023;
Machine Name:
bembo
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.