Berkeley CSUA MOTD:Entry 10293
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/24 [General] UID:1000 Activity:popular
5/24    

2003/9/23-25 [Computer/SW/Security] UID:10293 Activity:kinda low
9/22    OpenSSH 3.7.1p2 (portable, ie non-OpenBSD) has been released.
        There are multiple vulnerabilities with the PAM auth code in
        3.7.1p1, so if you use PAM (Solaris/Linux) you should upgrade.

        http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=106432248411636&w=2
        \_ Is there an sshd that just works?  I'd be happy with a v2 sshd
           without holes that just allows simple logins.  Any other features
           after that would be a bonus.  Any suggestions?  Please?
           \_ Sigh.  OpenSSH "just works".  It's just that its vulnerabilities
              are declared and found more frequently than commercial SSH
              daemons.  Not saying those are any better or worse, but you are
              deluding yourself if you think that any piece of cryptographic
              software is "secure" just because no bugs are ever publicly
              announced.  Patching system components is a part of life as a
              sysadmin, get used to it.  -John
              \_ I am all for opensource but doesn't it bring as much harm
                 as benefit in terms of security?  Sure patchs are made on
                 more frequently, but isn't it much easier in theory to find a
                 bug to exploit when the source is available than otherwise?
                 \_ Do you occasionally look at Bugtraq?  I suggest you do,
                    if only to make it clear that having a commercial program
                    doesn't add much in the way of security.  Ask Microsoft.
                    "Better the devil you know"...  -John
                    \_ I'm not making my point.  I can see that.  I don't care
                       who wrote it or why or where it comes from.  I just want
                       an sshd with minimal features and fewer holes than what
                       openssh has.  If you don't know of one, thanks, that's
                       ok.
                 \_ would you prefer to know that holes are being found and
                    patched at the cost of having to upgrade, or instead
                    not know about holes and ignore upgrades in ignorant bliss?
                    \_ I'm not making my point.  I can see that.  I don't care
                       who wrote it or why or where it comes from.  I just want
                       an sshd with minimal features and fewer holes than what
                       openssh has.  If you don't know of one, thanks, that's
                       ok.
                        \_ You're very clear--I'm simply saying that OpenSSH
                           is pretty much "it" for open-souce sshd, and with
                           the non-open source ones, no, you probably won't be
                           patching so often, but that says nothing about the
                           amount of holes in them.  -John
              \_ I don't care if the alternative is commercial or not.  I just
                 want something I won't be patching three times in a week.  I'm
                 not concerned with open vs commercial philosophy.
                 \_ It's nothing to do with commercial or open source.  It's
                    a question of security.  If all you care about is not
                    patching something, then don't run OpenSSH.  This is
                    what's known as 'sticking your head in the sand'.  And
                    yes, what you don't know _can_ hurt you.  Your call. -John
                    \_ I'm not making my point.  I can see that.  I don't care
                       who wrote it or why or where it comes from.  I just want
                       an sshd with minimal features and fewer holes than what
                       openssh has.  If you don't know of one, thanks, that's
                       ok.
        \_ Argh! Nooo! Is this a joke? I had already had to upgrade OpenSSH
           on nearly 200 hosts -twice- during last week.
           What the #$(@)@*!!
           \_ Pride goeth before a fall.
              \_ Pride goes before destruction, a haughty spirit
                 before a fall. Proverbs 16:18
           \_ That's why it makes sense to wait to upgrade. OpenSSH
              *always* has one or two patches out within a week. --dim
              \_ wait a week to upgrade while getting hacked in the meantime?
                 swell idea, i wish i'd thought of it.
                 \_ There are no known exploits for this vulnerability, nor for
                    most of the ones being found lately. "It is uncertain
                    whether these errors are potentially exploitable,
                    however, we prefer to see bugs fixed proactively." --dim
                    \_ so says them. securityfocus paints a different picture.
                       in any case, better safe than sorry.
                       \_ More than once the "new" OpenSSH has been more flawed
                          than the original. An example was when the privilege
                          separation code was first added. It is common for
                          the OpenSSH folks to fix a bug and then have to
                          fix their fix. Hence, we are at p2 already. Just wait
                          for the bozos to figure it out unless the bug is
                          easily exploited. --dim
                          \_ they're not exactly fixing their fix. they somewhat
                             hastily made a release with *new* functionality,
                             which was probably not well-tested. so just patch
                             the old 3.6.1p2 and you're fine.
        \_ Jesus fucking Christ!  Is there a simple v2 sshd out there that
           just works?!  I don't need all the whiz bang features, just a
           login shell.  If it could port forward that would be a bonus
           but I could survive without it if it meant I could stop the
           upgrade madness.
           \_ what's this whole upgrade madness? it's been a while since
              the last major openssh scare. fwiw, maybe you should've just
              patched 3.6.1 and been done with it.
           \_ lsh might be what you are looking for. Keep in mind that
              OpenSSH has a larger user base, developer base and h4x0r
              base so gets more auditing.
              \_ and lsh had its own remote exploitable bug days later.
                 so what's the difference.

        http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=106432248411636&w=2
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/05/24 [General] UID:1000 Activity:popular
5/24    

You may also be interested in these entries...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/9/24-11/7 [Computer/SW/Languages, Computer/SW/Unix] UID:54484 Activity:nil
9/24    How come changing my shell using ldapmodify (chsh doesn't work) doesn't
        work either? ldapsearch and getent show the new shell but I still get
        the old shell on login.
        \_ Scratch that, it magically took my new shell now. WTF?
           \_ probably nscd(8)
	...
2011/4/27-7/30 [Computer/SW/Security, Computer/SW/Unix] UID:54096 Activity:nil
4/28    Will wall be fixed?   - jsl
        \_ What's wall?
           \_ An anachronism from a bygone era, when computers were hard to
              comeby, the dorms didn't have net, there was no airbears, and
              when phones didn't come standard with twitter or sms.
           \_ A non useful implementation of twitter.
	...
2011/5/19-7/30 [Computer/SW/Security] UID:54110 Activity:nil
5/19    Uh, is anyone still using this? Please mark here if you post and
        haven't added this yet. I'll start:
        \_ person k
        \_ ausman, I check in about once a week.
        \_ erikred, twice a week or so.
        \_ mehlhaff, I login when I actually own my home directory instead of
	...
2009/10/1-21 [Computer/SW/WWW/Browsers] UID:53417 Activity:moderate
10/1    I am thinking of installing firefox on soda under my home directory.
        Will this make me a hozer?
        \_ Possibly. I wonder if we should have another VM for that...btw,
           I remember someone saying they're glad we're not on FreeBSD
           anymore, but last I checked, a bunch of our stuff is on FreeBSD,
           but our login server is not.
	...
2009/7/8-16 [Computer/SW/OS/Linux, Computer/SW/Unix] UID:53124 Activity:nil
7/7     what happened to our web presence? http://www.csua.berkeley.edu
        not working
    \_ That would be because we've yet to set them up afaik. Steven *does* have
    a job after all. The idea is that we want a separate computer mounting the
    web directories, so that if an exploit compromises the webserver, the shell
    server (soda) itself will be insulated from the attack.
	...
2009/6/29-7/3 [Computer/SW/Security] UID:53083 Activity:low 53%like:53089
6/28    Hello everyone,
Logins to soda are back open.  The new ssh key is
2048 4b:96:67:18:27:da:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX
Please allow public key authentication since it is more secure
than plain password. Also if you see this posting, it means
anybody could have posted the annoucement.  Because  the
	...
2009/6/29-7/3 [Computer/SW/Security] UID:53089 Activity:nil 53%like:53083
6/29    Please allow public key authentication since it is more
        secure than plain password.  If you see this posting, it
        means anybody could have posted the annoucement.  Because
        the official csua web site is still down., this makes it a
        little suspicious to the truly paranoid.
        p.s.  this web entry format is counter intuitive.  And how come
	...
Cache (1088 bytes)
marc.theaimsgroup.com/?l=openssh-unix-dev&m=106432248411636&w=2
Please note that this is a release to address issues in the portable version only. OpenSSH is a 100 complete SSH protocol version 13, 15 and 20 implementation and includes sftp client and server support. We would like to thank the OpenSSH community for their continued support to the project, especially those who contributed source and bought T-shirts or posters. Due to complexity, inconsistencies in the specification and differences between vendors PAM implementations we recommend that PAM be left disabled in sshd_config unless there is a need for its use. Sites using only public key or simple password authentication usually have little need to enable PAM support. Fix compilation for versions of OpenSSL before 096 Some cipher modes are not supported for older OpenSSL versions. Fix compilation problems on systems with a missing or lacking inet_ntoa function. Workaround problems related to unimplemented or broken setresuid/setreuid functions on several platforms. Fix handling of password-less authentication PermitEmptyPasswordsyes that has not worked since the 37p1 release.