On Wednesday 18 December 2002 09:40 am, J.Francois wrote: > I was pretty busy yesterday so if this was posted just ignore me. > If it wasn't posted, then its a good heads up. > > Cert SSH Advisory - All Versions on All Platforms: > http://www.cert.org/advisories/CA-2002-36.html > http://www.kb.cert.org/vuls/id/389665 This is basically a man-in-the-middle attack at initial key chat. Anybody who knows anything about cryptography and how SSH handles initial key chat knows that there is a vulnerability there. That's why Red Hat has SSH configured to tell you when you're doing initial key chat. This is not exploitable except during the narrow window of vulnerability that you're establishing the initial keys with a target, and in my opinion is an acceptable risk on the typical network. In short, it's not news -- those of us in the security industry have known of this issue for decades (ever since the original Diffie-Hellman public key exchange algorithm was introduced in the late 70's), and thus why it's not getting much press. -- Eric Lee Green GnuPG public key at http://badtux.org/eric/eric.gpg mailto:eric@badtux.org Web: http://www.badtux.org