Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 9 Feb 2001 10:41:23 -0800 (PST)
From:      Matt Dillon <dillon@earth.backplane.com>
To:        "Mason Harding" <mharding@marketnews.com>
Cc:        <security@FreeBSD.ORG>
Subject:   How to rebuild ssh w/ latest sources (was Re: SSH Vulnerability)
Message-ID:  <200102091841.f19IfNQ84385@earth.backplane.com>
References:   <BGENLPKDCIBENFNNNAIDMEIDCAAA.mharding@marketnews.com>

next in thread | previous in thread | raw e-mail | index | archive | help
:I am guessing this OpenSSH vulnerability applies to FreeBSD...does anyone
:know?
:Also thought others might like to know about it.
:http://razor.bindview.com/publish/advisories/adv_ssh1crc.html
:
:Mason

    Yes.  If your sources are reasonably up to date (since Jan 23),
    just rebuild it:

    cd /usr/src/secure/lib/libssh
    make clean obj all
    cd /usr/src/secure/usr.sbin/sshd
    make clean obj all install
    cd /usr/src/secure/usr.bin/ssh
    make clean obj all install

    (kill your old sshd daemon, start a new one)

    Verify you are running the new version of the daemon:

% ssh -v localhost
earth:/home/dillon> ssh -v localhost
SSH Version OpenSSH_2.3.0, protocol versions 1.5/2.0.
Compiled with SSL (0x0090600f).
debug: Reading configuration data /etc/ssh/ssh_config
debug: ssh_connect: getuid 101 geteuid 101 anon 1
debug: Connecting to localhost [127.0.0.1] port 22.
debug: Connection established.
debug: Remote protocol version 1.99, remote software version OpenSSH_2.3.0
						^^^^^^^^^^^^^^^^^^^^^^^^^^^^
debug: match: OpenSSH_2.3.0 pat ^OpenSSH[-_]2\.3

debug: Local version string SSH-1.5-OpenSSH_2.3.0




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200102091841.f19IfNQ84385>