Debian Bug Tracking System schrieb:

> On Thu, Jul 10, 2008 at 05:28:19PM +0200, Christoph Martin wrote:
>> The openssh client and openssh-vulnkey do not check for 4096 bit
>> comprimised keys as the sid version does. So the user will not find
>> these compromised keys when checking with openssh-vulnkey and the ssh
>> server will accept connections with these keys.
>>
>> Please supply a package like in sid which also checks for 4096 (and
>> other?) bit keys.
> 
> Install the openssh-blacklist-extra package.

I checked that. It is useful if you have the unstable/testing version of
openssh-client. The stable openssh-client includes a version of
ssh-vulnkey which does not use the 4096 bit blacklists.

Please reopen the bug

-- 
============================================================================
Christoph Martin, Leiter der EDV der Verwaltung, Uni-Mainz, Germany
 Internet-Mail:  [EMAIL PROTECTED]
  Telefon: +49-6131-3926337
      Fax: +49-6131-3922856

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to