https://bugzilla.novell.com/show_bug.cgi?id=393186
User meissner@novell.com added comment
https://bugzilla.novell.com/show_bug.cgi?id=393186#c17
--- Comment #17 from Marcus Meissner
Not yet, but we (Openwall) are likely to have a patch within a few days, and this:
On Sat, May 17, 2008 at 04:46:30PM +0200, Robert Buchholz wrote:
There has been approval of your idea inside Gentoo's hardened team.
is one of the reasons for us to go for the effort.
Thank you. For tossing in an end-users view, it is also likely of wider interest since keys generated once may travel (floppy, USB stick, scp/rsync/ssh-add -L, you name it), or systems being cross-"updated" to other operating systems (into/out of Debian/Ubuntu) for instance, so it likely wouldn't hurt to forward the whole blacklisting or at least check tools upstream once everyone is happy with it. It may take some convincing upstream maintainers to help with working around a b0rkup issue that happend by a downstream distro, but anyways, I'd like to do some sort of "ssh-vulnkey -a" on my SUSE boxen (perhaps after some sanity checks such as making sure the file being read by this tool is actually a regular file after opening it and things like that). -- Matthias Andree -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.