https://bugzilla.novell.com/show_bug.cgi?id=393186
User meissner@novell.com added comment
https://bugzilla.novell.com/show_bug.cgi?id=393186#c45
--- Comment #45 from Marcus Meissner
Thanks for the "bug" reference. FWIW, the shell script in this comment is vulnerable itself, in more than one way:
http://bugs.gentoo.org/show_bug.cgi?id=221759#c9
For example, it lets a user have any other user's or root's authorized_keys removed, by replacing .ssh with a symlink to someone else's .ssh directory. It's just bad practice to access users' files as root (or as another user); this is difficult to do safely.
Also, it misses authorized_keys2.
while the issues you raise are certainly valid in the general case, i wrote it for use on a constrained system -- users are not allowed login nor are they allowed to control any files directly. it's a gforge system, so all keys are managed via a web interface and the ssh backend is only for committing to svn/cvs/git repositories. so in this setup, none of the concerns you raise need to be accounted for. i leave it up to others to extend it for their own safe use ;). -mike -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.