On Mon, 24 Jun 2002 23:39:04 -0500
Paul Baker <[EMAIL PROTECTED]> wrote:
> Does the tcp_wrapper use in openssh work that way? It's not like ssh
> is running from inetd first being passed through tcpd. I'm just using
> the builtin tcpwrapper support of openssh, so I would guess that that
> means technically, sshd is handling the request long enough to at
> least see what ip it is coming from. May be time to modify my firewall
> rules. argh! Of course maybe that won't even help. Of course we don't
> know because openbsd is keeping a tight lip, but potentially maybe
> someone could craft a malicious packet that appears to come from one
> of the trusted ips??

I honestly couldn't tell you.

If it's sane, you're fine. TCP_WRAPPERS are supposed to be the first
thing that's checked, and given what we know of the nature of the
exploit, it seems like the code involved is further on.

I could be wrong, though. :)

-- 
________________________________________________________________________
\ David B. Harris, Systems administrator   |   http://www.terrabox.com /
/  [EMAIL PROTECTED], [EMAIL PROTECTED]     |     http://eelf.ddts.net  \
\======================================================================/
/ Clan Barclay motto: Aut agere, aut mori.  (Either action, or death.) \
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Attachment: pgpLUEH8f2y23.pgp
Description: PGP signature

Reply via email to