From owner-freebsd-hackers Fri Feb 9 14: 4: 7 2001 Delivered-To: freebsd-hackers@freebsd.org Received: from dell.dannyland.org (dell.dannyland.org [64.81.36.13]) by hub.freebsd.org (Postfix) with ESMTP id 3303D37B401 for ; Fri, 9 Feb 2001 14:03:50 -0800 (PST) Received: by dell.dannyland.org (Postfix, from userid 1001) id 401905C2C; Fri, 9 Feb 2001 14:03:28 -0800 (PST) Date: Fri, 9 Feb 2001 14:03:28 -0800 From: dannyman To: freebsd-hackers@freebsd.org Message-ID: <20010209140139.D76316@dell.dannyland.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 1.0.1i Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Has anyone patched 4.x OpenSSH and/or the relevant ports to deal with the CRC checksum exploit? I've got to get 2.3 working on my 3.x box, but just incrementing the number in the Makefile causes patch-aa to go rejected ... -d -- http://dannyman.toldme.com/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message