Summary
The SSH server running inside the sandbox pod accepts both password-less (auth_none) and public-key authentication without checking the user or key. Every request is accepted. The design assumes authorization is enforced at the gateway (token + sandbox_id) and that the HMAC handshake proves the connection came from the gateway. If the gateway were bypassed or the handshake weakened, the SSH server would accept any connection.
Source Code
- In
crates/navigator-sandbox/src/ssh.rs, the SshHandler implementation of russh::server::Handler has auth_none (lines 202-203) returning Ok(Auth::Accept) and auth_publickey (lines 206-211) also returning Ok(Auth::Accept) for any user and any public key.
Originally by @drew on 2026-02-19T08:59:43.265-08:00
Summary
The SSH server running inside the sandbox pod accepts both password-less (
auth_none) and public-key authentication without checking the user or key. Every request is accepted. The design assumes authorization is enforced at the gateway (token + sandbox_id) and that the HMAC handshake proves the connection came from the gateway. If the gateway were bypassed or the handshake weakened, the SSH server would accept any connection.Source Code
crates/navigator-sandbox/src/ssh.rs, theSshHandlerimplementation ofrussh::server::Handlerhasauth_none(lines 202-203) returningOk(Auth::Accept)andauth_publickey(lines 206-211) also returningOk(Auth::Accept)for any user and any public key.Originally by @drew on 2026-02-19T08:59:43.265-08:00