ClearFoundation Tracker - ClearOS
View Issue Details
0005491ClearOSapp-ssh-server - SSH Serverpublic2015-10-07 12:082016-12-22 09:30
bchambers 
user2 
normalminorsometimes
closedfixed 
7.1.0 RC1 
7.3.0 Beta 17.3.0 Beta 1 
0005491: Users with weak passwords and no shell can become mail relays
Customer was using Active Directory connector. A user in the AD had a weak username/password combo...very weak. Not limited to AD connector...LDAP user with weak user/pass would also be susceptible.

Looks like this hack was used that we've seen once or twice before to become a spam relay:

https://www.rackaid.com/blog/spam-ssh-tunnel/ [^]

As per doc, we should really ship SSH with default:

AllowTCPForwarding no

And expose this variable in Webconfig.
Why am I having Deja vu? No tracker was ever submitted?
No tags attached.
Issue History
2015-10-07 12:08bchambersNew Issue
2015-10-07 12:33user2Statusnew => confirmed
2016-09-20 14:58user2Statusconfirmed => resolved
2016-09-20 14:58user2Fixed in Version => 7.3.0 Beta 1
2016-09-20 14:58user2Resolutionopen => fixed
2016-09-20 14:58user2Assigned To => user2
2016-09-20 14:58user2Target Version => 7.3.0 Beta 1
2016-11-16 09:12user2Target Version7.3.0 Beta 1 => 7.3.0 Beta 1
2016-11-16 09:12user2Fixed in Version7.3.0 Beta 1 => 7.3.0 Beta 1
2016-12-20 11:40user2Issue cloned: 0012021
2016-12-20 11:40user2Relationship addedrelated to 0012021
2016-12-22 09:30user2Statusresolved => closed

There are no notes attached to this issue.