Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 28 Dec 1999 03:46:40 -0800 (PST)
From:      Kris Kennaway <kris@hub.freebsd.org>
To:        Dag-Erling Smorgrav <des@flood.ping.uio.no>
Cc:        Warner Losh <imp@village.org>, Fernando Schapachnik <fpscha@via-net-works.net.ar>, freebsd-security@FreeBSD.ORG
Subject:   Re: OpenSSH vulnerable to protocol flaw?
Message-ID:  <Pine.BSF.4.21.9912280345001.63174-100000@hub.freebsd.org>
In-Reply-To: <xzpbt7b77sa.fsf@flood.ping.uio.no>

next in thread | previous in thread | raw e-mail | index | archive | help
On 28 Dec 1999, Dag-Erling Smorgrav wrote:

>   Note that the new revision for the SSH protocol, proposed and
>   published as Internet Drafts [2],[3],[4] [5] makes use of
>   cryptographycally strong message authentication codes for
>   integrity checks that wont fail to these attacks.

Correct me if I'm wrong, but these describe the SSH v2 protocol, which is
implemented in ssh 2.x, not sh 1.x (and hence openssh 1.x).

Kris



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.9912280345001.63174-100000>