I read an interesting article last night which highlited some problems with the way SSH process communication happens. I am writing a post about it because it is so simple and yet so effective.

Here is the scenario:
Let’s say that you have a linux system running the latest set of patches/OpenSSH. You have multiple users on the system, and one or more of them have sudo/su/escalated privileges. The idea is that when user ‘A’ connects to the system, user ‘C’ will be able to sniff out their password.

The details:
The idea is that almost all ssh daemons by default are configured to use “Privilege Separation”. This means that sshd spawns a process (child) that is unprivileged to listen for incoming network requests. After the user authenticates, another process gets created running as the authenticated user. The magic happens in between these two processes.

A simple example:
User ‘C’ ssh-es into the system, escalates their privledges (either by legitimate or non-legitimate means) and starts listening for newly created ssh ‘net’ processes. As soon as user ‘C’ sees a process being crated, they immediately attach strace to it.

A simple way to do it is by:

or even better:

 

Now, when user ‘A’ ssh-es in, as soon as they type their password and hit enter, user ‘C’ will see something like this:

Process 17681 attached – interrupt to quit
write(4, “\0\0\0 \v”, 5) = 5
write(4, “\0\0\0\33thisismysupersecretpassword“, 31) = 31
write(3, “\345+\275\373q:J\254\343\300\30I\216$\260y\276\302\353″…, 64) = 64
Process 17681 detached

 

This could easily be fixed by simply setting ‘UsePrivilegeSeparation’ to ‘no’ in your sshd config. This is NOT recommended.
The result will be far worse if you do this. Imagine a 0-day exploit or some other remote buffer overflow gaining an attacker root to your system.

The correct solution, in my opinion, would be to hash the password.

 

What makes this scary is not that someone who is root can do something like attaching strace — it’s the fact that they can get your password, without modifying a single binary on the system. An attacker could always swap out sshd or another binary with something that logs your password, but this is almost untraceable.

2 Thoughts on “Sniffing SSH Password from the Server Side

  1. The correct solution is to stop using passwords for authentication, or rely on more than a single authentication factor.

    There are a number of ways that someone with root access on your system could obtain your ssh password, including, as you say, simply replacing the sshd binary. There are ways of doing this that would be hard to detect (e.g., running sshd from an isolated mount namespace in which a trojan sshd has been bind-mounted onto the system sshd).

    The Unix security model generally assumes that root can be trusted. I’m not suggesting that this is an ideal situation, but it is the existing situation, and you should generally assume that someone with root access to your system will be able to see any password that you’re typing while connected.

Leave a Reply

Your email address will not be published. Required fields are marked *

>> NOTE: Please use <code>...</code> to post code/configs in your comment.

Post Navigation