>>>>> "Alex" == Alex McLintock <[EMAIL PROTECTED]> writes:

    Alex> Sorry if this is old hat to everybody (I only get the digest
    Alex> of this list once or twice a day so you may already be
    Alex> discussing it) but....there is a vulnerability in recent
    Alex> versions of OpenSSH.

We haven't discussed.  Yes, it is important for anyone running versions
of OpenSSH between 3.0-3.2 who _doesn't_ have:

    Alex> ChallengeResponseAuthentication no

in their sshd_config to upgrade now.  Most sane distributions (like
Debian) install sshd with this line as Alex sent it, which means that
you aren't vulnerable to today's exploit.  If you're running a standard
Red Hat sshd_config with OpenSSH 3.0-3.2, though, get upgrading.

OpenSSH 3.4 was released today, so it's worthwhile to upgrade to that
and enable privilege separation - at least, according to Theo.  :)

Comedy point: openbsd.org now advertises 'One remote hole in the default
install, in nearly six years!' rather than the ever-present 'No remote
holes in the default install in five years!'.

- Chris.
-- 
$a="printf.net";  Chris Ball | chris@void.$a | www.$a | finger: chris@$a
 "Blessings to the chap who invented ice cream, ginger-pop and the rest!
 I'd rather invent things like that any day than rockets and bombs."
   -- Julian, "Five on Finniston Farm"


Reply via email to