From owner-freebsd-security@FreeBSD.ORG Tue Nov 19 15:44:43 2013 Return-Path: Delivered-To: FreeBSD-security@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id C329D406 for ; Tue, 19 Nov 2013 15:44:43 +0000 (UTC) Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id A04AA28DD for ; Tue, 19 Nov 2013 15:44:43 +0000 (UTC) Received: from [10.20.30.90] (50-0-66-41.dsl.dynamic.sonic.net [50.0.66.41]) (authenticated bits=0) by hoffman.proper.com (8.14.7/8.14.7) with ESMTP id rAJFifms082377 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for ; Tue, 19 Nov 2013 08:44:42 -0700 (MST) (envelope-from phoffman@proper.com) X-Authentication-Warning: hoffman.proper.com: Host 50-0-66-41.dsl.dynamic.sonic.net [50.0.66.41] claimed to be [10.20.30.90] From: Paul Hoffman Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Subject: Question about "FreeBSD Security Advisory FreeBSD-SA-13:14.openssh" Date: Tue, 19 Nov 2013 07:44:40 -0800 References: <20131119102130.90E5C1A3B@nine.des.no> To: FreeBSD-security@FreeBSD.org Message-Id: Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1822\)) X-Mailer: Apple Mail (2.1822) X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.16 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 19 Nov 2013 15:44:43 -0000 Greetings again. Why does this announcement only apply to:=20 > Affects: FreeBSD 10.0-BETA That might be the only version where aes128-gcm and aes256-gcm are in = the defaults, but other versions of FreeBSD allow you to specify cipher = lists in /etc/ssh/sshd_config. I would think that you would need to = update all systems running OpenSSH 6.2 and 6.3, according to the CVE. = FWIW, when I did a freebsd-update on my 9.2-RELEASE system, sshd (6.2) = was not updated. --Paul Hoffman=