Trond Eivind Glomsrød escribió:
> 
> [EMAIL PROTECTED] (Trond Eivind Glomsrød) writes:
> 
> > [EMAIL PROTECTED] (Mike Burger) writes:
> >
> > > Does anyone know if the currently available openssh rpms contain the latest
> > > vulnerability listed in today's CERT advisory?
> >
> > They do. The advisory is mainly concerned with ssh (the nonfree
> > version) anyway, the holes fixed in openssh have been very limited.
> 
> Sorry, to clarify: They contain the latest fixes. There aren't known
> security problems with them.
> 
        that is not really true. The main problem with ssh is with ssh1
version. This protocol is insecure by itself so you don't have to use
it. Opennssh distributed with redhat is configured to use ssh2 by
default, but it still can use ssh1 if you have an ssh1 client, so you
have the problem. You have to configure openssh not to use ss1 by using
the clause:

Protocol 2

        in sshd_config (by default, this variable takes de value "2,1" so it
istill uses ssh1).

        This way, your openssh in unvulnerable.

-- 
Angel L. Mateo
Redes y Comunicaciones - ATICA       Tfo: +34 968 367590
Universidad de Murcia                Fax: +34 968 363389
Edificio D, Campus de Espinardo
CP: 30100, Murcia



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to