Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 1 Jan 2000 21:44:42 -0500
From:      Dan Moschuk <dan@FreeBSD.ORG>
To:        Brian Fundakowski Feldman <green@FreeBSD.ORG>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: OpenSSH protocol 1.6 proposal
Message-ID:  <20000101214442.A1127@spirit.jaded.net>
In-Reply-To: <Pine.BSF.4.10.10001011324420.756-100000@green.dyndns.org>; from green@FreeBSD.ORG on Sat, Jan 01, 2000 at 01:49:22PM -0500
References:  <Pine.BSF.4.10.10001011324420.756-100000@green.dyndns.org>

next in thread | previous in thread | raw e-mail | index | archive | help

| Let me know what you all think!  I still haven't quite decided, but I
| think packets which fail the SHA-1 test should be silently dropped, or
| have a counter of them, rather than dropping the connection.  Currently,
| the connection is dropped and error messages displayed/transmitted.  I
| welcome input on that and all parts of this proposal :)

Hi Brian,

Forgive my ignorance of the SSH protocol, but what would happen if two
projects forked the OpenSSH code and also bumped the minor version number
up with their own expansions and modifications?  

-- 
Dan Moschuk (TFreak!dan@freebsd.org)
"No good deed goes unpunished."


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000101214442.A1127>