Re: 2.4.x boot floppies, was: Vulnerable SSH versions

2001-11-15 Thread Goswin Brederlow
Ethan Benson [EMAIL PROTECTED] writes: On Wed, Nov 14, 2001 at 12:42:10PM +0100, Goswin Brederlow wrote: People with such old hardware are probably better of with bo or hamm or potato. They probably need the low-mem target too. which are not (or will not in potato's case) be supported

Re: 2.4.x boot floppies, was: Vulnerable SSH versions

2001-11-15 Thread Goswin Brederlow
Ethan Benson [EMAIL PROTECTED] writes: On Wed, Nov 14, 2001 at 12:42:10PM +0100, Goswin Brederlow wrote: People with such old hardware are probably better of with bo or hamm or potato. They probably need the low-mem target too. which are not (or will not in potato's case) be supported

2.4.x boot floppies, was: Vulnerable SSH versions

2001-11-14 Thread Jørgen Hermanrud Fjeld
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi. Although it might sound stupid, my question is: Will there ever come a time when making 1220 boot floppies with 2.4.x kernel will be doable? If I assume that it's the kernel size that makes it difficult, then it doesn't matter wether we use

Re: 2.4.x boot floppies, was: Vulnerable SSH versions

2001-11-14 Thread Goswin Brederlow
Jørgen Hermanrud Fjeld [EMAIL PROTECTED] writes: Hi. Although it might sound stupid, my question is: Will there ever come a time when making 1220 boot floppies with 2.4.x kernel will be doable? If I assume that it's the kernel size that makes it difficult, then it doesn't matter wether

Re: 2.4.x boot floppies, was: Vulnerable SSH versions

2001-11-14 Thread Ethan Benson
On Wed, Nov 14, 2001 at 12:42:10PM +0100, Goswin Brederlow wrote: People with such old hardware are probably better of with bo or hamm or potato. They probably need the low-mem target too. which are not (or will not in potato's case) be supported with security updates. -- Ethan Benson

2.4.x boot floppies, was: Vulnerable SSH versions

2001-11-14 Thread Jørgen Hermanrud Fjeld
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi. Although it might sound stupid, my question is: Will there ever come a time when making 1220 boot floppies with 2.4.x kernel will be doable? If I assume that it's the kernel size that makes it difficult, then it doesn't matter wether we use

Re: 2.4.x boot floppies, was: Vulnerable SSH versions

2001-11-14 Thread Goswin Brederlow
Jørgen Hermanrud Fjeld [EMAIL PROTECTED] writes: Hi. Although it might sound stupid, my question is: Will there ever come a time when making 1220 boot floppies with 2.4.x kernel will be doable? If I assume that it's the kernel size that makes it difficult, then it doesn't matter wether we

Re: 2.4.x boot floppies, was: Vulnerable SSH versions

2001-11-14 Thread Ethan Benson
On Wed, Nov 14, 2001 at 12:42:10PM +0100, Goswin Brederlow wrote: People with such old hardware are probably better of with bo or hamm or potato. They probably need the low-mem target too. which are not (or will not in potato's case) be supported with security updates. -- Ethan Benson

Re: Vulnerable SSH versions

2001-11-13 Thread Stefan Schwandter
On Mon, Nov 12, 2001 at 04:54:04PM -0900, Ethan Benson wrote: Which makes me wonder, why ship Woody with 2.2.20 at all? Oh well, not my decision. because 2.4 is not stable yet. Hmmm... I think it will take some months before woody is released. Don't you think 2.4 will have stabilized

Re: Vulnerable SSH versions

2001-11-13 Thread Ethan Benson
On Tue, Nov 13, 2001 at 09:02:46AM +0100, Stefan Schwandter wrote: On Mon, Nov 12, 2001 at 04:54:04PM -0900, Ethan Benson wrote: Which makes me wonder, why ship Woody with 2.2.20 at all? Oh well, not my decision. because 2.4 is not stable yet. Hmmm... I think it will take some

Re: Vulnerable SSH versions

2001-11-13 Thread Ethan Benson
On Tue, Nov 13, 2001 at 01:09:46PM +0100, Jørgen Hermanrud Fjeld wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tuesday 13 November 2001 09:52, Ethan Benson wrote: 2.4 is also especially problematic on i386 since you have to fit it on all these archaic 1.22MB floppies and such.

Re: Vulnerable SSH versions

2001-11-13 Thread Stefan Schwandter
On Mon, Nov 12, 2001 at 04:54:04PM -0900, Ethan Benson wrote: Which makes me wonder, why ship Woody with 2.2.20 at all? Oh well, not my decision. because 2.4 is not stable yet. Hmmm... I think it will take some months before woody is released. Don't you think 2.4 will have stabilized

Re: Vulnerable SSH versions

2001-11-13 Thread Ethan Benson
On Tue, Nov 13, 2001 at 09:02:46AM +0100, Stefan Schwandter wrote: On Mon, Nov 12, 2001 at 04:54:04PM -0900, Ethan Benson wrote: Which makes me wonder, why ship Woody with 2.2.20 at all? Oh well, not my decision. because 2.4 is not stable yet. Hmmm... I think it will take some

Re: Vulnerable SSH versions

2001-11-13 Thread Jørgen Hermanrud Fjeld
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tuesday 13 November 2001 09:52, Ethan Benson wrote: 2.4 is also especially problematic on i386 since you have to fit it on all these archaic 1.22MB floppies and such. Hmm, I thought the 2.4 kernel was quite compact, and sometimes smaller, when

Re: Vulnerable SSH versions

2001-11-13 Thread Ethan Benson
On Tue, Nov 13, 2001 at 01:09:46PM +0100, Jørgen Hermanrud Fjeld wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tuesday 13 November 2001 09:52, Ethan Benson wrote: 2.4 is also especially problematic on i386 since you have to fit it on all these archaic 1.22MB floppies and such.

Re: Vulnerable SSH versions

2001-11-12 Thread Ethan Benson
On Mon, Nov 12, 2001 at 11:30:49AM +0100, Michal Kara wrote: Hi there! During this weekend, there has been paper posted to bugtraq named Analysis of SSH crc32 compensation attack detector exploit. It talks about a recorded successful exploit using overflow in CRC32 compensation attack

Re: Vulnerable SSH versions

2001-11-12 Thread Henrique de Moraes Holschuh
On Tue, 13 Nov 2001, Howland, Curtis wrote: The tar file that contains the base Woody install, which is used as the jumping off point for installation. There isn't one, at least not for bootflopies. We use debootstrap to fetch the most up-to-date packages of that distribution and install them,

RE: Vulnerable SSH versions

2001-11-12 Thread Howland, Curtis
topic no matter how interesting. Thanks to everyone for their help and advice, we shall see. Curt- -Original Message- From: Henrique de Moraes Holschuh [mailto:[EMAIL PROTECTED]] Sent: Tuesday, November 13, 2001 09:53 To: Howland, Curtis Cc: [EMAIL PROTECTED] Subject: Re: Vulnerable SSH versions

Re: Vulnerable SSH versions

2001-11-12 Thread Ethan Benson
On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote: I will gladly grant that the tar file may not exist for the boot floppies, and that I do not have on hand the CD to check it. It also may have been a Potato(e) phenominon, no longer in use. However, it did exist. yes releases

Re: Vulnerable SSH versions

2001-11-12 Thread Petro
On Mon, Nov 12, 2001 at 05:54:04PM -0800, Ethan Benson wrote: On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote: I will gladly grant that the tar file may not exist for the boot floppies, and that I do not have on hand the CD to check it. It also may have been a Potato(e)

Vulnerable SSH versions

2001-11-12 Thread Michal Kara
Hi there! During this weekend, there has been paper posted to bugtraq named Analysis of SSH crc32 compensation attack detector exploit. It talks about a recorded successful exploit using overflow in CRC32 compensation attack detection code, a hole, which was discovered in February this year.

Re: Vulnerable SSH versions

2001-11-12 Thread Ethan Benson
On Mon, Nov 12, 2001 at 11:30:49AM +0100, Michal Kara wrote: Hi there! During this weekend, there has been paper posted to bugtraq named Analysis of SSH crc32 compensation attack detector exploit. It talks about a recorded successful exploit using overflow in CRC32 compensation attack

Re: Vulnerable SSH versions

2001-11-12 Thread Jö Fahlke
Am Mon, 12. Nov 2001, 11:30:49 +0100 schrieb Michal Kara: Hi there! During this weekend, there has been paper posted to bugtraq named Analysis of SSH crc32 compensation attack detector exploit. It talks about a recorded successful exploit using overflow in CRC32 compensation attack

Re: Vulnerable SSH versions

2001-11-12 Thread Ville Uski
* Michal Kara [EMAIL PROTECTED] [02 11:35]: Hi there! Hi During this weekend, there has been paper posted to bugtraq named Analysis of SSH crc32 compensation attack detector exploit. It talks about a recorded successful exploit using overflow in CRC32 compensation attack

RE: Vulnerable SSH versions

2001-11-12 Thread Howland, Curtis
Message- From: Jo Fahlke [mailto:[EMAIL PROTECTED] Sent: Monday, November 12, 2001 19:45 To: Michal Kara Cc: debian-security@lists.debian.org Subject: Re: Vulnerable SSH versions Am Mon, 12. Nov 2001, 11:30:49 +0100 schrieb Michal Kara: Hi there! During this weekend, there has been paper

Re: Vulnerable SSH versions

2001-11-12 Thread Wichert Akkerman
Previously Howland, Curtis wrote: I have a remote server that I do not trust myself to upgrade from Potato(e) to Woody, and such vulnerabilities do worry me a little. Is there any general expectation that such back porting will continue once Woody is released? I expect only for a limited

Re: Vulnerable SSH versions

2001-11-12 Thread Ethan Benson
On Tue, Nov 13, 2001 at 09:02:56AM +0900, Howland, Curtis wrote: A quick question concerning such things... I have a remote server that I do not trust myself to upgrade from Potato(e) to Woody, and such vulnerabilities do worry me a little. Is there any general expectation that such back

RE: Vulnerable SSH versions

2001-11-12 Thread Howland, Curtis
Subject: Re: Vulnerable SSH versions On Tue, Nov 13, 2001 at 09:02:56AM +0900, Howland, Curtis wrote: A quick question concerning such things... I have a remote server that I do not trust myself to upgrade from Potato(e) to Woody, and such vulnerabilities do worry me a little. Is there any

Re: Vulnerable SSH versions

2001-11-12 Thread Ethan Benson
On Tue, Nov 13, 2001 at 09:25:29AM +0900, Howland, Curtis wrote: Thanks. I've been keeping it up to date weekly or so, but just to be sure I changed the sources.list to be ... potato/... instead of ... stable/... for when stable changes. Even a blank-disk install of Woody wasn't straight

RE: Vulnerable SSH versions

2001-11-12 Thread Howland, Curtis
about version conflicts and missing modules. Curt- -Original Message- From: Ethan Benson [mailto:[EMAIL PROTECTED] Sent: Tuesday, November 13, 2001 09:33 To: debian-security@lists.debian.org Subject: Re: Vulnerable SSH versions On Tue, Nov 13, 2001 at 09:25:29AM +0900, Howland, Curtis

Re: Vulnerable SSH versions

2001-11-12 Thread Henrique de Moraes Holschuh
On Tue, 13 Nov 2001, Howland, Curtis wrote: The tar file that contains the base Woody install, which is used as the jumping off point for installation. There isn't one, at least not for bootflopies. We use debootstrap to fetch the most up-to-date packages of that distribution and install them,

Re: Vulnerable SSH versions

2001-11-12 Thread Ethan Benson
On Tue, Nov 13, 2001 at 09:41:54AM +0900, Howland, Curtis wrote: The tar file that contains the base Woody install, which is used as the jumping off point for installation. there is no such thing. The tar file has binary kernel, /boot, /proc and other directories, I'm not sure exactly what

RE: Vulnerable SSH versions

2001-11-12 Thread Howland, Curtis
. Thanks to everyone for their help and advice, we shall see. Curt- -Original Message- From: Henrique de Moraes Holschuh [mailto:[EMAIL PROTECTED] Sent: Tuesday, November 13, 2001 09:53 To: Howland, Curtis Cc: debian-security@lists.debian.org Subject: Re: Vulnerable SSH versions On Tue, 13

Re: Vulnerable SSH versions

2001-11-12 Thread Ethan Benson
On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote: I will gladly grant that the tar file may not exist for the boot floppies, and that I do not have on hand the CD to check it. It also may have been a Potato(e) phenominon, no longer in use. However, it did exist. yes releases

Re: Vulnerable SSH versions

2001-11-12 Thread Petro
On Mon, Nov 12, 2001 at 05:54:04PM -0800, Ethan Benson wrote: On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote: I will gladly grant that the tar file may not exist for the boot floppies, and that I do not have on hand the CD to check it. It also may have been a Potato(e)

Re: Vulnerable SSH versions

2001-11-12 Thread Oyvind A. Holm
On 2001-11-12 16:54 Ethan Benson wrote: On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote: CH Which makes me wonder, why ship Woody with 2.2.20 at all? Oh well, not CH my decision. EB because 2.4 is not stable yet. *applause* I was hoping for that. Great decision. In fact the