From owner-freebsd-security Thu Feb 29 08:01:47 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id IAA19228 for security-outgoing; Thu, 29 Feb 1996 08:01:47 -0800 (PST) Received: from grumble.grondar.za (root@grumble.grondar.za [196.7.18.130]) by freefall.freebsd.org (8.7.3/8.7.3) with ESMTP id IAA19220 for ; Thu, 29 Feb 1996 08:01:35 -0800 (PST) Received: from grumble.grondar.za (mark@localhost [127.0.0.1]) by grumble.grondar.za (8.7.3/8.7.3) with ESMTP id SAA04923; Thu, 29 Feb 1996 18:01:04 +0200 (SAT) Message-Id: <199602291601.SAA04923@grumble.grondar.za> To: Guy Helmer cc: freebsd-security@freebsd.org Subject: Re: Kerberos Insecurities (COAST Announcement) Date: Thu, 29 Feb 1996 18:01:03 +0200 From: Mark Murray Sender: owner-security@freebsd.org Precedence: bulk Guy Helmer wrote: > On Sun, 18 Feb 1996, Mark Murray wrote: > > Paul Danckaert wrote: > > > Does anybody know if this effects the ebones-based kerberos package? If > > > so, is there any info on a bug-fix? > > > > Too early to tell. We are eagerly awaiting the follow-up. > > Has anyone tried merging MIT's patches into the eBones kerberos? A > cursory examination of the eBones kerberos.c indicates that it doesn't > use des_new_random_key & friends... Its in CURRENT, not yet in STABLE. M -- Mark Murray 46 Harvey Rd, Claremont, Cape Town 7700, South Africa +27 21 61-3768 GMT+0200 Finger mark@grondar.za for PGP key