From owner-freebsd-security Mon Sep 14 07:58:09 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id HAA15144 for freebsd-security-outgoing; Mon, 14 Sep 1998 07:58:09 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from relay.ripco.com (relay.ripco.com [209.100.227.3]) by hub.freebsd.org (8.8.8/8.8.8) with SMTP id HAA15137 for ; Mon, 14 Sep 1998 07:58:07 -0700 (PDT) (envelope-from rezidew@rezidew.net) Received: (qmail 22854 invoked from network); 14 Sep 1998 14:57:53 -0000 Received: from soap.rezidew.net (HELO rezidew.net) (209.100.228.86) by relay.ripco.com with SMTP; 14 Sep 1998 14:57:53 -0000 Message-ID: <35FD30D3.E2ABACB1@rezidew.net> Date: Mon, 14 Sep 1998 10:05:55 -0500 From: Graphic Rezidew Organization: rezidew.net X-Mailer: Mozilla 4.04 [en] (X11; I; FreeBSD 2.2.7-RELEASE i386) MIME-Version: 1.0 To: FreeBSD-security-List Subject: version of sshd Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org First off, thanks to everyone that responded to my earlier plea for assistance, regarding SSH. Now I have a new question; does anyone know if version 1.2.26 of ssh has any currently known exploits? I ask because that's the version availible from the ports/packages, and I don't want to install potentially hazardous software. I know that version 2.0.x is availible but since all of the clients that I'll be using are 1.x I don't see any reason to install a 2.0.x server unless it's decidedly more secure. -thanks in advance. -- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Real programmers don't comment their code. It was hard to write, it should be hard to understand. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Graphic Rezidew Graphic@rezidew.net http://Graphic.Rezidew.net To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message