[21791] in bugtraq

home help back first fref pref prev next nref lref last post

Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0

daemon@ATHENA.MIT.EDU (Brandon S. Allbery KF8NH)
Mon Jul 23 15:03:37 2001

Date: Fri, 20 Jul 2001 23:08:33 -0400
From: "Brandon S. Allbery KF8NH" <allbery@ece.cmu.edu>
To: Dan Kaminsky <dankamin@cisco.com>,
        Stephanie Thomas <customer.service@ssh.com>, bugtraq@securityfocus.com
Message-ID: <70920000.995684910@vpn88.ece.cmu.edu>
In-Reply-To: <007b01c1118a$64bb2570$1900010a@na.cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

On Friday, July 20, 2001 19:11:02 -0700, Dan Kaminsky <dankamin@cisco.com> 
wrote:
+-----
| The big issue here, of course, is not that sshd incorrectly checks the
| cryptographic hash of an inadequately sized password but that it checks it
| at all.  NP, as far as I know, specifically stands for No Password
| (acceptable, *not* needed), and !! I believe has the same meaning for
| Linux(! for "no").  SSHD has traditionally when possible directly tested
+--->8

Is it me, or is this the *same* bug that was found in the 1.2.x code some 
time back?


-- 
brandon s. allbery  [os/2][linux][solaris][freebsd]   allbery@kf8nh.apk.net
system administrator   [JAPH][WAY too many hats]        allbery@ece.cmu.edu
electrical and computer engineering                                   KF8NH
carnegie mellon university     [linux: proof of the million monkeys theory]


home help back first fref pref prev next nref lref last post