From owner-freebsd-bugs Wed Feb 28 11:56:28 1996 Return-Path: owner-bugs Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id LAA06813 for bugs-outgoing; Wed, 28 Feb 1996 11:56:28 -0800 (PST) Received: from narq.avian.org ([199.103.168.126]) by freefall.freebsd.org (8.7.3/8.7.3) with SMTP id LAA06808 for ; Wed, 28 Feb 1996 11:56:21 -0800 (PST) Received: (from hobbit@localhost) by narq.avian.org (8.6.12/_H*) id OAA14421; Wed, 28 Feb 1996 14:56:41 -0500 Date: Wed, 28 Feb 1996 14:56:41 -0500 From: *Hobbit* Message-Id: <199602281956.OAA14421@narq.avian.org> To: eichin@cygnus.com, freebsd-bugs@freefall.freebsd.org, problems@bsdi.com Subject: Kerberos 4 rsh/rcp fixes Cc: sra@epilogue.com Sender: owner-bugs@FreeBSD.ORG Precedence: bulk As long as maintainers are in there fixing the Kerberos 4 random_key stuff, it seems appropriate that other release tree fixes could be made at the same time before new "official" releases go out. I've [finally!] completed some work on the encrypting modes of "rsh" and "rcp", and have released the patches for review. These apply to Cygnus CNS, and the built-in applications that come with BSDI 2.0 and FreeBSD 2.x. Please anonymous-FTP to ftp.epilogue.com, and do cd /pub/hobbit/crypto/f9601 get krbfix-out.tar This single tar file contains a detailed description of the problems/fixes, and patch kits for various releases. Sorry for the sort of scatter-shot mailing; please forward to the right places if I blew it.. _H*