If I understand correctly, the next opportunity after 5.0R to make a
change of such significance is FreeBSD 6.0. Since I suspect that few
folks will want to have ssh1 enabled by the time 6.0 is released, I
would like to request for the team to please consider disabling ssh1
fallback prior to 5.0R.

Ssh1 is fundamentally broken. It uses a CRC where a MAC is required.
While the attack detection logic in the code looks good, I don't know of
many cryptographers that would be willing to bet that no further attacks
exploiting ssh1's design flaws will be found. Ssh1 is a potential
security hole with very little utility remaining given that ssh2-capable
versions of ssh are readily available for a host of platforms and in
fact have been so for some time.

I therefore believe that the 5.0 release represents a perfect
opportunity to remove ssh1 fallback from the default distribution of
FreeBSD and hope the FreeBSD team will consider this change.

Thanks,
--Lucky Green


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message

Reply via email to