On Mon, 24 Jun 2002 23:00:46 -0500 Paul Baker <[EMAIL PROTECTED]> wrote: > In other words, if a malicious ssh request comes from an ip that is > already denied via tcp_wrapper support in ssh, will it still be able > to exploit OpenSSH < 3.3?
We have no way of being sure, since the nature of the exploit and the specifics aren't being told. However, supposedly, you need to be able to talk to the sshd in order to exploit it. So if nothing (or nothing malicious) can open a connection, you're fine. -- ________________________________________________________________________ \ David B. Harris, Systems administrator | http://www.terrabox.com / / [EMAIL PROTECTED], [EMAIL PROTECTED] | http://eelf.ddts.net \ \======================================================================/ / Clan Barclay motto: Aut agere, aut mori. (Either action, or death.) \ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
pgpINoqw3g2tj.pgp
Description: PGP signature