Mailing List Archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [tlug] Upcoming OpenSSH vulnerability (fwd)



> However, everyone should update to OpenSSH 3.3 immediately, and enable
> priv seperation in their ssh daemons, by setting this in your
> /etc/ssh/sshd_config file:
> 
> 	UsePrivilegeSeparation yes

Put security servers in your sources.list and upgrade

Debian stable (potato): 
deb http://security.debian.org/  stable/updates main contrib non-free

Debian testing (woody):
deb http://http.us.debian.org/debian woody main contrib non-free
deb http://non-us.debian.org/debian-non-US woody/non-US main contrib non-free
deb http://security.debian.org/ woody/updates main contrib non-free
deb ftp://ftp.jp.debian.org/debian dists/proposed-updates/ 
deb ftp://ftp.jp.debian.org/debian woody-proposed-updates main contrib non-free

OpenBSD:  http://www.openssh.com/openbsd.html

FreeBSD: just upgrade your ports: 
cvsup -g -L 2 ./cfg_file
portupgrade -ra


-- 
________  Stoyan Zhekov <sto [AT] zhware [DOT] net>  ________
OpenPGP:                http://www.zhware.net/keys/zhware.asc
fpr:        2A61 58D0 A69C FF68 4785 A0A3 89DE AEC0 3CA6 41A8
____________ Is there life after /sbin/halt -p? _____________ 

Attachment: pgp00020.pgp
Description: PGP signature


Home | Main Index | Thread Index

Home Page Mailing List Linux and Japan TLUG Members Links