On Thu, 2008-05-15 at 10:02 +0100, Dave Ewart wrote:

> Debian (and thus also Ubuntu) have released updated openssh packages
> which include a new tool called ssh-vulnkey which can be used to check
> the running system[1] for vulnerable keys: ssh-vulnkey works similarly
> to the Perl script in the Debian announcement. 

That is not 100% effective (afiak). Its still advised that you toss any
key that you are not 100% certain came from a non-effected system for
every user.

They can always go back in once your sure that they are safe.

> I believe the original assessment was correct: *all* systems running SSH
> ought to check for these vulnerable keys, not just those systems running
> Debian or derivatives. 

Correct, It is a user propagated issue. Its best to just chuck all keys
for now and put them back as you're sure that they did not come from a
buggy keygen.

>  Yes, it's Debian's "fault", but we all have to
> manage the consequences.

Shit happens :)

-- 
Monkey + Typewriter = Echoreply ( http://echoreply.us )

Reply via email to