Bug#539030: openssh-server: 'unpredictable' umask for remote users / depending on umask during (re)start
Package: openssh-server
Version: 1:5.1p1-5
Severity: important
Problem:
It's difficult to create a predictable environment for restricted users
(e.g. upload account for shared hosting).
Explanation:
You are root. For some reason your current umask is e.g. 563. You don't pay
attention to your current umask. You restart the OpenSSH Server by invoking
"/etc/init.d/sshd restart". Now your weird umask applies to new remote
users even if they are chrooted and restricted to internal-sftp. (E.g. some
user connects with WinSCP, creates a folder and now its permissions are
-w- --x r--).
Configuration (/etc/ssh/sshd_config):
| [...]
| Match Group sftponly
| ChrootDirectory /home-restricted/%u
| X11Forwarding no
| AllowTcpForwarding no
| ForceCommand internal-sftp
Suggestion:
Add "umask 022" to the init-script or ask the OpenSSH team to provide
an 'default umask' option.
-- System Information:
Debian Release: 5.0.1
APT prefers stable
APT policy: (990, 'stable')
Architecture: i386 (i686)
Kernel: Linux 2.6.22-4-686 (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash
Versions of packages openssh-server depends on:
ii adduser 3.110 add and remove users and groups
ii debconf [debcon 1.5.24 Debian configuration management sy
ii dpkg 1.14.25 Debian package management system
ii libc6 2.7-18 GNU C Library: Shared libraries
ii libcomerr2 1.41.3-1 common error description library
ii libkrb53 1.6.dfsg.4~beta1-5lenny1 MIT Kerberos runtime libraries
ii libpam-modules 1.0.1-5+lenny1 Pluggable Authentication Modules f
ii libpam-runtime 1.0.1-5+lenny1 Runtime support for the PAM librar
ii libpam0g 1.0.1-5+lenny1 Pluggable Authentication Modules l
ii libselinux1 2.0.65-5 SELinux shared libraries
ii libssl0.9.8 0.9.8g-15+lenny1 SSL shared libraries
ii libwrap0 7.6.q-16 Wietse Venema's TCP wrappers libra
ii lsb-base 3.2-20 Linux Standard Base 3.2 init scrip
ii openssh-blackli 0.4.1 list of default blacklisted OpenSS
ii openssh-client 1:5.1p1-5 secure shell client, an rlogin/rsh
ii procps 1:3.2.7-11 /proc file system utilities
ii zlib1g 1:1.2.3.3.dfsg-12 compression library - runtime
Versions of packages openssh-server recommends:
ii openssh-blacklist-extra 0.4.1 list of non-default blacklisted Op
ii xauth 1:1.0.3-2 X authentication utility
Versions of packages openssh-server suggests:
pn molly-guard <none> (no description available)
pn rssh <none> (no description available)
pn ssh-askpass <none> (no description available)
-- debconf information:
ssh/vulnerable_host_keys:
ssh/new_config: true
* ssh/use_old_init_script: true
ssh/disable_cr_auth: false
ssh/encrypted_host_key_but_no_keygen:
Reply to: