Date: Mon, 24 Jun 2002 21:35:06 -0400 (EDT) From: Chris BeHanna <behanna@zbzoom.net> To: FreeBSD Security <security@freebsd.org> Cc: deraadt@cvs.openbsd.org Subject: Re: [openssh-unix-announce] Re: Upcoming OpenSSH vulnerability (fwd) Message-ID: <20020624212557.R7245-100000@topperwein.dyndns.org> In-Reply-To: <20020624163538.H10398-100000@yez.hyperreal.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Although I sympathize with the desire to be able to make informed
decisions regarding older versions of supported software that's in the
field, I have to say that I side with Theo here: We're being warned that
a critical exploit will be published in a few days, along with the
simultaneous release of a version of the software that fixes the bug
that leads to the exploit, AND we're being told how to immunize
ourselves against the exploit--using currently-available
software--several days in advance of the announcement.
Result: it's possible to completely prevent the window of
vulnerability that usually exists between the announcement of an
exploit and the availability of a fix for same. Any other way
*guarantees* that there will be a leak prior to the bugfix release,
causing more than a few folks to get burned by the exploit before they
get a chance to read their mail and learn how to enable the workaround.
In a perfect world, Theo could publicize the exploit without fear of
it being used to burn people prior to their learning how to use the
workaround. But in a perfect world, we wouldn't need OpenSSH.
Thank you, Theo.
--
Chris BeHanna
Software Engineer (Remove "bogus" before responding.)
behanna@bogus.zbzoom.net
Turning coffee into software since 1990.
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020624212557.R7245-100000>
