[62182] in North American Network Operators' Group
Re: new openssh issue
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Tue Sep 16 15:50:54 2003
To: Richard A Steenbergen <ras@e-gerbil.net>
Cc: William Allen Simpson <wsimpson@greendragon.com>, nanog@nanog.org
In-Reply-To: Your message of "Tue, 16 Sep 2003 15:33:03 EDT."
<20030916193303.GT79329@overlord.e-gerbil.net>
From: Valdis.Kletnieks@vt.edu
Date: Tue, 16 Sep 2003 15:50:04 -0400
Errors-To: owner-nanog-outgoing@merit.edu
--==_Exmh_-780276356P
Content-Type: text/plain; charset=us-ascii
On Tue, 16 Sep 2003 15:33:03 EDT, Richard A Steenbergen said:
> > patched, but does anybody know whether there's a problem with the
> > criscos? (as in "how do I configure my router for that?" ;-)
>
> Or better yet, the OpenSSH running on Junipers? Nothing on Juniper's site
> about a vulnerability so far.
A posting to full-disclosure quotes Theo as saying HP and Cisco are affected,
and I don't see any reason that Juniper would *NOT* be, given the common code
base of the OpenSSH implementations. I'm not going to say the routers are
vulnerable, but I *would* say that ACLs blocking port 22 to the router might
be a good idea.....
--==_Exmh_-780276356P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001
iD8DBQE/Z2lscC3lWbTT17ARAj/PAKCzNEWfQ4Iwh6hCuyEBgC9PZH1+ogCg60hg
u/pWeo60dbv1m3XHogBII2g=
=LBvE
-----END PGP SIGNATURE-----
--==_Exmh_-780276356P--