Date: Wed, 1 Feb 2017 13:11:21 +0100 From: Piotr Kubaj <pkubaj@anongoth.pl> To: freebsd-security@freebsd.org Subject: Re: fbsd11 & sshv1 Message-ID: <20170201121121.GA75931@chujemuje> In-Reply-To: <mailman.41.1485950400.51630.freebsd-security@freebsd.org> References: <mailman.41.1485950400.51630.freebsd-security@freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--GvXjxJ+pjyke8COw Content-Type: text/plain; charset=utf-8 Content-Disposition: inline > You mean like net/tcpdump398, which was forked from net/tcpdump because > some people liked its output format better than that of tcpdump 4, and > then forgotten, and is known to have dozens of security vulnerabilities? We shouldn't forbid people to shoot themselves in their heads. If someone needs it, they should get, especially since it won't require much maintainance. Just repocopy the port and mark as deprecated and vulnerable next time there's a CVE in OpenSSH. --GvXjxJ+pjyke8COw Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEEycyIeNkkgohzsoorelmbhSCDnJ0FAliR0GkACgkQelmbhSCD nJ0ueRAAhPXI4wgHZ4YNKsnh+IMbpMC27S2ERzTlvUwBqYe+lnurleCD7K7sKJ7c 1+eZjWregBW/NcW536MJIeLQSbRqpfHs8Yj6htdTQrBGYA2fL9qdXvMiDJMtnWaA OLnxdV+vjjZB63Xs4Td+a+F2xE/+UqDYYXOQYZBGc0yW19m69JCmNI3NY2+qhCT/ scUQ5ukp8xvY/QxrvIhMAosNx8jXJ64RDZAgjL61CjNiKkuaKC8TJiHHAZhy4ud3 2lKpGCcdJDVgm0oBPhNiD7JYiaBfT+6p7FJiNHMZEtCVi9IR/1oxA7k6PjZBHZSw ZazIxNsCZuDNgeasMj0FZWyy4g0YCZUyMr/MjO6bG7fSpAnTYCLVYCga+gxb6btk jBJu4/jxExf5Ua5Ktn3oNTbzSJAFIZV28TsUP3+80VvMmdmDwxCGXwB9CS251em2 pQAIOQf26japywRn9BrduUiuEpx3Wr5Wfls4jvum8F3EmDsoDzlTl6dA/hZbWW3B uMaFaSTtS3oNaGBAFBgXeajcUNEoAgTF9CsZ08OBhnOdbfQk+rnwIyjs3Wfc2qft 5F0VdHRDVBLlpOXMi6uwcoLjv6Jz1pF4B70BlD3zz5Zv2dUTk9/Va5P0QY8CCUXN Ktt3n1WQVmcCTACZr2Q4AsuAjYSI7GlLSLRR+LIJeDWIUoq93Sk= =s1z0 -----END PGP SIGNATURE----- --GvXjxJ+pjyke8COw--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20170201121121.GA75931>