[30017] in bugtraq

home help back first fref pref prev next nref lref last post

Re: OpenSSH/PAM timing attack allows remote users identification

daemon@ATHENA.MIT.EDU (Michael Shigorin)
Fri May 2 16:43:02 2003

Date: Fri, 2 May 2003 16:15:59 +0300
From: Michael Shigorin <mike@osdn.org.ua>
To: Marco Ivaldi <raptor@mediaservice.net>
Message-ID: <20030502131559.GY11315@osdn.org.ua>
Mail-Followup-To: Marco Ivaldi <raptor@mediaservice.net>,
	bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="GD+uNaHYxbVPHaQt"
Content-Disposition: inline
In-Reply-To: <Pine.LNX.4.30L2.0304301358220.9889-200000@dns.mediaservice.net>

--GD+uNaHYxbVPHaQt
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

On Wed, Apr 30, 2003 at 04:34:27PM +0200, Marco Ivaldi wrote:
> NOTE. FreeBSD uses both a different PAM implementation and a
> different PAM support in OpenSSH: it doesn't seem to be
> vulnerable to this particular timing leak issue.

Are you talking of CURRENT branch?  4.x use linux-PAM as well.

-- 
 ---- WBR, Michael Shigorin <mike@altlinux.ru>
  ------ Linux.Kiev http://www.linux.kiev.ua/

--GD+uNaHYxbVPHaQt
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+sm+PbsPDprYMm3IRAs8HAJ4noGRkheWX2bEz4vERmWmtYn+DmQCfQcFZ
3wZ4AfHnpcM8Q52WD/g0cvE=
=4tp9
-----END PGP SIGNATURE-----

--GD+uNaHYxbVPHaQt--

home help back first fref pref prev next nref lref last post