Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 07 Jan 2000 00:35:31 +0800
From:      Peter Wemm <peter@netplex.com.au>
To:        Dag-Erling Smorgrav <des@flood.ping.uio.no>
Cc:        Brian Fundakowski Feldman <green@FreeBSD.ORG>, security@FreeBSD.ORG
Subject:   Re: OpenSSH protocol 1.6 proposal 
Message-ID:  <20000106163531.1A79D1CA0@overcee.netplex.com.au>
In-Reply-To: Message from Dag-Erling Smorgrav <des@flood.ping.uio.no>  of "06 Jan 2000 14:50:39 %2B0100." <xzpu2krs40g.fsf@flood.ping.uio.no> 

next in thread | previous in thread | raw e-mail | index | archive | help
Dag-Erling Smorgrav wrote:
> Brian Fundakowski Feldman <green@FreeBSD.ORG> writes:
> > I've been thinking what the best way to make OpenSSH more secure would be,
> > and now it seems to be a change in the protocol.  What change?  Well,
> > SSH version 1.5 and below (all versions so far) have been vulnerable to
> > attacks based upon properties of the highly insecure CRC32 hash used.
> 
> Which part of "ssh 1.2.25 fixes the problem" did you not understand?

Well, the 'crc compensation attack detection' is an *attempt* to detect
likely insertion attacks.  It would be far better to not have to try and
detect hints of this this and to *know* if it was valid or not without a
doubt.

Cheers,
-Peter



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000106163531.1A79D1CA0>