Is there any add'l info on the compromise discussed at the following link? Does it apply to 2.9.9p2 of openssh? If I use the from="" option of $HOME/.ssh/authorized_keys2 and restrict connections to addresses I trust, will that be effective, or does the exploit occur before that check is made?
http://www.newsalert.com/bin/story?StoryId=Co85tWc4bmdaWmZC --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
