Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 15 Jun 1995 13:34:21 +0800 (CST)
From:      Brian Tao <taob@gate.sinica.edu.tw>
To:        ywliu@beta.wsl.sinica.edu.tw
Cc:        security@freebsd.org
Subject:   Re: FreeBSD vulnerability in S/Key
Message-ID:  <Pine.BSI.3.91.950615133243.632Q-100000@aries>
In-Reply-To: <199506150128.SAA14137@freefall.cdrom.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 15 Jun 1995 ywliu@beta.wsl.sinica.edu.tw wrote:
> 
> I am not familiar with S/Key, so my question is : I am using MD5 rather than
> DES, is this relevent ? Am I supposed to patch my system ?

    Only if you use the S/Key one-time password system (which isn't
enabled by default).  If you don't know what S/Key is, then chances
are your system isn't using them either.

> Also, is this fixed in 2.0.5 ?

    Yes, it is:

>     FreeBSD current users:  
>     ======================
>        Update your /usr/src/lib/libskey sources and rebuild and
>        install libskey (both shared and non-shared versions).
>
>        The vulnerability has been fixed with FreeBSD 2.0.5.

-- 
Brian ("Though this be madness, yet there is method in't") Tao
taob@gate.sinica.edu.tw <-- work ........ play --> taob@io.org




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSI.3.91.950615133243.632Q-100000>