I saw that problem even with 2.9 version. At any rate, it is probably a moot 
point if you are using protocol version 2.

On Monday 28 January 2002 08:15 pm, you wrote:
> Rilindo Foster wrote:
> >Yes. Upgrade immediately.
>
> Could you please provide support for that?  According to these details
> from the developers:
>
> http://www.openssh.com/security.html
>
> this was a dead issue as of 2.3.0.  Please correct me if I ve missed
> something.
>
> OP, in any case, regardless of version, if you don't allow ssh
> protocol 1 connections (which you shouldn't, unless you're providing a
> public service and have no choice), you are not vulnerable.
>
> -d
>
> >-------begin signature---------
> >Rilindo Foster
> >http://monzell.com
> >AIM: rilindo
> >---------end signature---------
> >
> >-----Original Message-----
>
> From: [EMAIL PROTECTED]
>
> >[mailto:[EMAIL PROTECTED]]On Behalf Of JW
> >Sent: Tuesday, January 15, 2002 4:38 PM
> >To: [EMAIL PROTECTED]
> >Subject: OpenSSH security
> >
> >
> >Does anyone know if openssh-2.5.2p2-1 is vulnerable the "crc32
> > compensation attack" that's going around?
> >
> >Thanks.
> >
> >----------------------------------------------------
> >Jonathan Wilson
> >System Administrator
> >
> >Cedar Creek Software     http://www.cedarcreeksoftware.com
> >Central Texas IT     http://www.centraltexasit.com
> >
> >
> >
> >_______________________________________________
> >Redhat-list mailing list
> >[EMAIL PROTECTED]
> >https://listman.redhat.com/mailman/listinfo/redhat-list
> >
> >
> >
> >_______________________________________________
> >Redhat-list mailing list
> >[EMAIL PROTECTED]
> >https://listman.redhat.com/mailman/listinfo/redhat-list

-- 
Rilindo Foster
http://monzell.com
AIM: rilindo



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to