Date: Thu, 15 Jun 1995 13:34:21 +0800 (CST) From: Brian Tao <taob@gate.sinica.edu.tw> To: ywliu@beta.wsl.sinica.edu.tw Cc: security@freebsd.org Subject: Re: FreeBSD vulnerability in S/Key Message-ID: <Pine.BSI.3.91.950615133243.632Q-100000@aries> In-Reply-To: <199506150128.SAA14137@freefall.cdrom.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 15 Jun 1995 ywliu@beta.wsl.sinica.edu.tw wrote: > > I am not familiar with S/Key, so my question is : I am using MD5 rather than > DES, is this relevent ? Am I supposed to patch my system ? Only if you use the S/Key one-time password system (which isn't enabled by default). If you don't know what S/Key is, then chances are your system isn't using them either. > Also, is this fixed in 2.0.5 ? Yes, it is: > FreeBSD current users: > ====================== > Update your /usr/src/lib/libskey sources and rebuild and > install libskey (both shared and non-shared versions). > > The vulnerability has been fixed with FreeBSD 2.0.5. -- Brian ("Though this be madness, yet there is method in't") Tao taob@gate.sinica.edu.tw <-- work ........ play --> taob@io.org
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSI.3.91.950615133243.632Q-100000>