Date: Tue, 18 Mar 2003 23:33:16 +0100 From: des@ofug.org (Dag-Erling =?iso-8859-1?q?Sm=F8rgrav?=) To: Julian Elischer <julian@elischer.org> Cc: re@freebsd.org, hackers@freebsd.org Subject: Re: rumour of password aging failure in 4.7/4.8RC Message-ID: <xzpznns1f0z.fsf@flood.ping.uio.no> In-Reply-To: <Pine.BSF.4.21.0303181417590.35378-100000@InterJet.elischer.org> (Julian Elischer's message of "Tue, 18 Mar 2003 14:20:11 -0800 (PST)") References: <Pine.BSF.4.21.0303181417590.35378-100000@InterJet.elischer.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Julian Elischer <julian@elischer.org> writes: > So, the fix would be to go back to an old version of ssh? Yes, but you'd have to go back to a version with known remotely exploitable vulnerabilities. Since this is a problem for you and your customers, I will look into getting password changing to work, at least for PAM authentication, when I import 3.6 (which should be out in a few weeks). DES --=20 Dag-Erling Sm=F8rgrav - des@ofug.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzpznns1f0z.fsf>