Date: Tue, 25 Jun 2002 23:41:03 -0400 From: Lord Raiden <raiden23@netzero.net> To: Christopher Schulte <schulte+freebsd@nospam.schulte.org>, Christopher Schulte <schulte+freebsd@nospam.schulte.org>, Marco Radzinschi <marco@radzinschi.com>, FreeBDS-Questions <freebsd-questions@freebsd.org> Subject: Re: Upcoming OpenSSH vulnerability (fwd) Message-ID: <4.2.0.58.20020625234040.009bd450@pop.netzero.net> In-Reply-To: <5.1.1.6.2.20020625124040.041c50f0@pop3s.schulte.org> References: <4.2.0.58.20020625134233.009992b0@pop.netzero.net> <5.1.1.6.2.20020624224948.02923518@pop3s.schulte.org> <20020624234646.G22328-100000@mail.radzinschi.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Ok, one last silly question. Is the current 3.3 in the ports? If it is I'll have to CVsup to get it. At 12:45 PM 6/25/02 -0500, Christopher Schulte wrote: >At 01:43 PM 6/25/2002 -0400, Lord Raiden wrote: >> Ok, well we're still running OpenSSH 3.1 from the last security >> upgrade recommendation. Should we go straight to 3.3 or wait for the >> final fix? > >I believe the idea is to offer an upgrade to 3.3 now with privsep enabled >( 'UsePrivilegeSeparation yes' in sshd_config ) and be immune to the bug, >then update to 3.3.1 (3.4?) when the full disclosure happens early next week. > >> Secondly how do you enable this priv separation thing in the >> config file? I'm unfamiliar with that. > >See above. > >-- >Christopher Schulte >http://www.schulte.org/ >Do not un-munge my @nospam.schulte.org >email address. This address is valid. > - The Raiden Knows "Remember amateurs built the ark -- professionals built the Titanic." - Unknown "Just when you think you have life figured out and all is going well, watch your step, for you are about to fall." - Ancient Proverb To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.2.0.58.20020625234040.009bd450>