Hello, I don't really know much about computer security, but I do have ssh installed on my computer so I'm somewhat concerned, please forgive my stupidity if I ask questions that seem stupid, ignorant or trivial.
When I read slashdot this morning, I thought the article titled "New ssh Exploit in the Wild" implied that an exploit was already out ... or does "in the Wild" generally mean it's theoretically possible, but not necessairly done yet? Also, from the sounds of the debian-security list, I get the impression that the SSH vulnerability is not as bad as it sounds -- but from the Slashdot posts (with people posting random sections of logs, links to RPMS/SRPMS, and suggesting alternatives) it seems as if the risk is most serious. Can anyone enlighten my ignorance on this? On a slightly off topic note, I'm thinking about running an ftp/http/ssh server for personal use in college. What precautionary measures should I take, or rather can I take? From reading over the various Slashdot posts, I'm thinking that beyond (1) making sure system isn't running any unnecessary servers (Debian seems pretty good in this by default) (2) making sure all software is up to date and (3) since it's a college campus, possibly being able to ask technical support for the subnet (correct word?) of all campus IP addresses, and only allowing access IP addresses on that subnet beyond all of that, there really isn't much that I can do is there? Thanks, --TongKe Xue --- Josh Carroll <[EMAIL PROTECTED]> wrote: > Actually, people have reported that there is an exploit, and in > fact even OpenBSD is vulnerable. > > I would still patch ASAP. Best not to risk it. > > It's probably a matter of time before a widely available exploit is > released. Right now it seems > it's in the hands of a select few, but that will probably change > sooner than later. > > By the way, you can grab the incoming openssh package from: > > http://incoming.debian.org/ssh_3.6.1p2-6.0_i386.deb > > if you want to patch your unstable system without building your own > package with the buffer.c > patch. (assuming i386 of course). > > I personally would like to see said exploit so I can test my > systems post-patch. But I guess > we'll have to trust the packages and/or buffer.c patch. > > Josh > > > Florian Weimer ([EMAIL PROTECTED]) wrote: > > Ted Roby <[EMAIL PROTECTED]> writes: > > > > > Does this vulnerability require a login? Is a system safe if it > does not > > > allow root login, and password logins? > > > > Nobody knows the answer at the moment. There isn't any obvious > way to > > exploit the overflow (mind that the attacker cannot write > arbitrary > > data, just a couple of zeros), and I still doubt if it is > exploitable > > at all. > > > > > > -- > > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > > with a subject of "unsubscribe". Trouble? Contact > [EMAIL PROTECTED] > > > > > -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact > [EMAIL PROTECTED] > __________________________________ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com