At 05:11 AM 2/1/2017, Piotr Kubaj via freebsd-security wrote:
We shouldn't forbid people to shoot themselves in their heads. If someone needs it, they should get, especially since it won't require much maintainance. Just repocopy the port and mark as deprecated and vulnerable next time there's a CVE in OpenSSH.
Perhaps it would be best if the SSHv1 code were encapsulated in a library which could be used to access perfectly good equipment for which new software/firmware is not being developed. This would keep the code, whatever its quality, out of the main SSH codebase but still make it possible to access vital gear as needed.
My company has equipment that would cost more than we could afford to replace that runs only SSHv1, and is well protected from attacks by other means (such as firewalls and VPNs). It's perfectly safe to use SSHv1 with it, and a darned sight safer than devolving to Telnet. Just as it's useful to have a way of accessing devices that use SSLv3 (we maintain browsers specifically for that purpose), it pays to have a way to get at an embedded device that will never support versions of SSH beyond v1.
--Brett Glass _______________________________________________ freebsd-security@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"