Iain Tatch wrote:

> 
>>AFAIK, all SSH1 connections are vulnerable to the CRC32 attack. Thus you need
>>to use SSH2 protocol. OpenSSH supports SSH2. You need different keys though,
>>as SSH2 so far does not support RSA keypairs and needs DSA keys.  
>>
> That's the impression I was under, too. In which case the current stable
> release of Debian comes with an sshd which uses protocol 1 and is
> therefore open to allowing remote root compromises.

Just a quick precision here : you have to _disable_ v1 in order to be 
protected from that vulnerability. The point here is not that you have to 
support v2, it's that you have to disallow v1. A recent daemon allowing ssh1 
connections is vulnerable.

--
Daniel


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to