Hi There
I got following report from after the vulneraboility scanning. Now first we
don`t use IPv6 and secondly how we can check on Juniper that versio is SSH 4?
Synopsis: The remote SSH service is prone to an X11 session
hijacking\nvulnerability.
Description: According to its banner, the
I've checked in with Juniper CERT a couple of times after SSH
vulnerabilities get made public and given the fact they run such older ssh
binaries.
The answer i've received every time is they run a modified version of
OpenSSH 4.4, and disallow unsigned, third party or modified binaries to run
Thank you very much for an update Tim. Much appreciated.
From: Tim Eberhard xmi...@gmail.com
To: Harri Makela harri_mak...@yahoo.com
Cc: juniper-nsp@puck.nether.net juniper-nsp@puck.nether.net
Sent: Monday, 9 September 2013, 17:45
Subject: Re: [j-nsp] SSH
Hello,
IMHO there is mess with docs/terms. FEC 128 multihoming as described has
nothing to do with ldp. It's bgp signaling and autodiscovery.
Krasi
On 8 September 2013 22:37, Darren O'Connor darre...@outlook.com wrote:
Hi list.
I'm going over the VPLS multihoming options on Juniper's
4 matches
Mail list logo