Date: Fri, 9 Feb 2001 10:41:23 -0800 (PST) From: Matt Dillon <dillon@earth.backplane.com> To: "Mason Harding" <mharding@marketnews.com> Cc: <security@FreeBSD.ORG> Subject: How to rebuild ssh w/ latest sources (was Re: SSH Vulnerability) Message-ID: <200102091841.f19IfNQ84385@earth.backplane.com> References: <BGENLPKDCIBENFNNNAIDMEIDCAAA.mharding@marketnews.com>
next in thread | previous in thread | raw e-mail | index | archive | help
:I am guessing this OpenSSH vulnerability applies to FreeBSD...does anyone :know? :Also thought others might like to know about it. :http://razor.bindview.com/publish/advisories/adv_ssh1crc.html : :Mason Yes. If your sources are reasonably up to date (since Jan 23), just rebuild it: cd /usr/src/secure/lib/libssh make clean obj all cd /usr/src/secure/usr.sbin/sshd make clean obj all install cd /usr/src/secure/usr.bin/ssh make clean obj all install (kill your old sshd daemon, start a new one) Verify you are running the new version of the daemon: % ssh -v localhost earth:/home/dillon> ssh -v localhost SSH Version OpenSSH_2.3.0, protocol versions 1.5/2.0. Compiled with SSL (0x0090600f). debug: Reading configuration data /etc/ssh/ssh_config debug: ssh_connect: getuid 101 geteuid 101 anon 1 debug: Connecting to localhost [127.0.0.1] port 22. debug: Connection established. debug: Remote protocol version 1.99, remote software version OpenSSH_2.3.0 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ debug: match: OpenSSH_2.3.0 pat ^OpenSSH[-_]2\.3 debug: Local version string SSH-1.5-OpenSSH_2.3.0 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200102091841.f19IfNQ84385>