Date: Fri, 13 Jul 2001 11:12:14 -0700 (PDT) From: Jacques Vidrine <nectar@FreeBSD.org> To: cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: src/crypto/openssh sshconnect.c Message-ID: <200107131812.f6DICEJ43638@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
nectar 2001/07/13 11:12:14 PDT
Modified files:
crypto/openssh sshconnect.c
Log:
Bug fix: When the client connects to a server and Kerberos
authentication is enabled, the client effectively ignores any error
from krb5_rd_rep due to a missing branch.
In theory this could result in an ssh client using Kerberos 5
authentication accepting a spoofed AP-REP. I doubt this is a real
possiblity, however, because the AP-REP is passed from the server to
the client via the SSH encrypted channel. Any tampering should cause
the decryption or MAC to fail.
Approved by: green
MFC after: 1 week
Revision Changes Path
1.18 +2 -1 src/crypto/openssh/sshconnect.c
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200107131812.f6DICEJ43638>
