Date: Thu, 23 Sep 2004 09:29:12 +0200 From: Nick Cleaton <nick@cleaton.net> To: Chris Ryan <chrisryanemail@yahoo.com.au> Cc: freebsd-security@freebsd.org Subject: Re: Attacks on ssh port Message-ID: <20040923072912.GK5340@lt1.cleaton.net> In-Reply-To: <20040923070809.14655.qmail@web51010.mail.yahoo.com> References: <20040923045229.GJ5340@lt1.cleaton.net> <20040923070809.14655.qmail@web51010.mail.yahoo.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Sep 23, 2004 at 05:08:09PM +1000, Chris Ryan wrote: > [SNIP] > > I've patched my sshd so [SNIP] > > so does that mean you have to rebuild ssh everytime > there is a security update for sshd? Yup. An alternative that avoids that would be to run something out of inetd that reads the token and then execs sshd. Nick -- $_='YN8KuE*** http://www.exonetric.com/ Telehouse UK colo ***HARQr**' .'NfzV0YrC1*** GBP40/month +VAT 40G BW no setup fee ***MnjJ**' .'6QvtcPgQ20*** ***nlS**' ;s/(.)(.*(.))/$2.chr(32+(ord($1)+ord$3)%89)/euntil/Foo/;eval#****'
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040923072912.GK5340>