Previously Phillip Hofmeister wrote: > Does this effect the daemon or the client?
Again we really have no information to base this on, but everything points to a problem in the daemon (privsep does not help in the client). > If it effects the daemon, is the potato version vulnerable? I suspect so, we do not have the information to really confirm or deny this. I would recommend restricting ssh access if possible and/or look into an alternative like telnetd-ssl (make sure you use the -z secure option to only allow SSL connections). Wichert. -- _________________________________________________________________ /[EMAIL PROTECTED] This space intentionally left occupied \ | [EMAIL PROTECTED] http://www.liacs.nl/~wichert/ | | 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0 2805 3CB8 9250 2FA3 BC2D | -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]