From owner-freebsd-ports Mon Nov 9 12:36:05 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id MAA18242 for freebsd-ports-outgoing; Mon, 9 Nov 1998 12:36:05 -0800 (PST) (envelope-from owner-freebsd-ports@FreeBSD.ORG) Received: from B1FF.nas.nasa.gov (b1ff.nas.nasa.gov [129.99.34.135]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id MAA18237 for ; Mon, 9 Nov 1998 12:36:02 -0800 (PST) (envelope-from rone@B1FF.nas.nasa.gov) Received: (from rone@localhost) by B1FF.nas.nasa.gov (8.8.8/8.8.8) id MAA29616; Mon, 9 Nov 1998 12:35:19 -0800 (PST) (envelope-from rone) From: Ron Echeverri Message-Id: <199811092035.MAA29616@B1FF.nas.nasa.gov> Subject: Re: SSH admits exploit in 1.2.26 client (fwd) In-Reply-To: from Dean Hollister at "Nov 8, 98 11:08:25 am" To: dean@odyssey.apana.org.au (Dean Hollister) Date: Mon, 9 Nov 1998 12:35:19 -0800 (PST) Cc: ports@FreeBSD.ORG X-Mailer: ELM [version 2.4ME+ PL38 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-freebsd-ports@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Dean Hollister writes: Has version 2 been ported yet? ssh 2.x has a severely stupid license that inhibits its use. Also, please notice the security hole in ssh 1.2.26 ONLY occurs if you are also using Kerberos V. rone -- Ron Echeverri Numerical Aerospace Simulation Facility DSS/Usenet Administrator NASA Ames Research Center Internet Sysop Mountain View, CA x42771 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message