If you don't use have any password-less logins set up, no need to
worry (unless you generated your own SSL certs on these systems, which
is also affected, so regenerate those too.)

http://isc.sans.org/diary.html?storyid=4420

The meat of it:

"It is obvious that this is highly critical – if you are running a
Debian or Ubuntu system, and you are using keys for SSH authentication
(ironically, that's something we've been recommending for a long
time), and those keys were generated between September 2006 and May
13th 2008 then you are vulnerable. In other words, those secure
systems can be very easily brute forced. What's even worse, H D Moore
said that he will soon release  a brute force tool that will allow an
attacker easy access to any SSH account that uses public key
authentication."

Whoops!  If your SSH port faces the outside world and you have a
vulnerable key, this basically means that all someone has to do is
guess your username and a flurry of connection attempts later...
owned!  (And may $deity help you if you have a key set up for root!)

Do not delay.  Get the updated version and regenerate your keys NOW!

-Mark C.

_______________________________________________
clug-talk mailing list
[email protected]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying

Reply via email to