Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 7 Jan 2000 16:40:31 +0100
From:      Markus Friedl <markus.friedl@informatik.uni-erlangen.de>
To:        Dag-Erling Smorgrav <des@flood.ping.uio.no>
Cc:        security@FreeBSD.ORG, Markus Friedl <markus.friedl@informatik.uni-erlangen.de>
Subject:   Re: OpenSSH protocol 1.6 proposal
Message-ID:  <20000107164031.A9346@folly.informatik.uni-erlangen.de>
In-Reply-To: <xzpu2krs40g.fsf@flood.ping.uio.no>
References:  <Pine.BSF.4.10.10001011324420.756-100000@green.dyndns.org> <xzpu2krs40g.fsf@flood.ping.uio.no>

next in thread | previous in thread | raw e-mail | index | archive | help
1.2.25 et al do not fix the problem, they just make
attacks a little bit harder.

On Thu, Jan 06, 2000 at 02:50:39PM +0100, Dag-Erling Smorgrav wrote:
> Brian Fundakowski Feldman <green@FreeBSD.ORG> writes:
> > I've been thinking what the best way to make OpenSSH more secure would be,
> > and now it seems to be a change in the protocol.  What change?  Well,
> > SSH version 1.5 and below (all versions so far) have been vulnerable to
> > attacks based upon properties of the highly insecure CRC32 hash used.
> 
> Which part of "ssh 1.2.25 fixes the problem" did you not understand?
> 
> From the advisory:
> 
> Fix Information:
> ~~~~~~~~~~~~~~~~
> 
>    Upgrade to the upcoming SSH protocol version 2.
> 
>    Commercial F-Secure SSH users contact Data Fellows Inc. for
>    information on how to upgrade to F-Secure 2.0
> 
>    Notice that version 2 of the SSH protocol is not
>    compatible with the previous version, thus you
>    will need to upgrade all the SSH clients as well.
> 
>    In the meantime, upgrade to version 1.2.25 of SSH, which
>    fixes the problem. The SSH 1.2.25 distribution can be
>    obtained from:
> 
>     <ftp://ftp.cs.hut.fi/pub/ssh/ssh-1.2.25.tar.gz>;
> 
>    F-Secure SSH version 1.3.5 fixes this security problem.
>    If you are using the commercial Data Fellows SSH package and you
>    have a support contract, you can obtain the 1.3.5 from your local
>    retailer.
> 
>    Users without a support contract can obtain a patch which fixes
>    this problem from:
> 
>     <http://www.DataFellows.com/f-secure/support/ssh/bug/su134patch.html>.
> 
>    A patch for the free SSH 1.2.23 distribution and the complete
>    SSH 1.2.23 package, with the patch applied, can be obtained at:
> 
>             <http://www.core-sdi.com/ssh>;
> 
>   Below  are the MD5 hashes for the provided files
> 
>    MD5 (ssh-1.2.23.patch) = 6bdb63d57f893907191986c5ced557ab
>    MD5 (ssh-1.2.23-core.tar.Z) = fffb52122aae26c1f212c051a305a310
>    MD5 (ssh-1.2.23-core.tar.gz) = f9509ba0f0715637805c6b116adc0869
> 
> 
> DES
> --
> Dag-Erling Smorgrav - des@flood.ping.uio.no
> 
> 
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
> 


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000107164031.A9346>