From owner-freebsd-security Sun Nov 14 22: 2:48 1999 Delivered-To: freebsd-security@freebsd.org Received: from zibbi.mikom.csir.co.za (zibbi.mikom.csir.co.za [146.64.24.58]) by hub.freebsd.org (Postfix) with ESMTP id 3C92014CAD; Sun, 14 Nov 1999 22:02:40 -0800 (PST) (envelope-from jhay@zibbi.mikom.csir.co.za) Received: (from jhay@localhost) by zibbi.mikom.csir.co.za (8.9.3/8.9.3) id IAA13567; Mon, 15 Nov 1999 08:02:38 +0200 (SAT) (envelope-from jhay) From: John Hay Message-Id: <199911150602.IAA13567@zibbi.mikom.csir.co.za> Subject: Re: ssh-1.2.27 remote buffer overflow - work around ?? In-Reply-To: from Brian Fundakowski Feldman at "Nov 14, 1999 11:12:19 pm" To: green@FreeBSD.ORG (Brian Fundakowski Feldman) Date: Mon, 15 Nov 1999 08:02:38 +0200 (SAT) Cc: freebsd-security@FreeBSD.ORG X-Mailer: ELM [version 2.4ME+ PL54 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org > reason. I can't condone this technically illegal action. The better > question is why aren't you using OpenSSH? > Well, is there a way of not using rsh to fetch it? Our firewall don't allow incoming tcp connections and rsh needs one. John -- John Hay -- John.Hay@mikom.csir.co.za To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message