From owner-freebsd-security Sun Nov 14 22:22:43 1999 Delivered-To: freebsd-security@freebsd.org Received: from green.myip.org (localhost [127.0.0.1]) by hub.freebsd.org (Postfix) with ESMTP id EE9D514E94 for ; Sun, 14 Nov 1999 22:22:38 -0800 (PST) (envelope-from green@FreeBSD.org) Received: from localhost ([127.0.0.1] ident=green) by green.myip.org with esmtp (Exim 3.02 #1) id 11nFWu-000EGA-00; Mon, 15 Nov 1999 01:22:20 -0500 Date: Mon, 15 Nov 1999 01:22:20 -0500 (EST) From: Brian Fundakowski Feldman X-Sender: green@green.myip.org To: John Hay Cc: freebsd-security@FreeBSD.ORG Subject: Re: ssh-1.2.27 remote buffer overflow - work around ?? In-Reply-To: <199911150602.IAA13567@zibbi.mikom.csir.co.za> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Mon, 15 Nov 1999, John Hay wrote: > Well, is there a way of not using rsh to fetch it? Our firewall don't > allow incoming tcp connections and rsh needs one. The two best ways would be to use ssh itself (should work) as CVS_RSH, or download it from somewhere outside the firewall and transfer it (by FTP/HTTP/etc) into the firewall. Know your export laws, of course... > > John > -- > John Hay -- John.Hay@mikom.csir.co.za > -- Brian Fundakowski Feldman \ FreeBSD: The Power to Serve! / green@FreeBSD.org `------------------------------' To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message