Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Upgrades Announcements Security News

OpenSSH 4.2 released 183

BSDForums writes "OpenSSH 4.2 has been released. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. Changes since OpenSSH 4.1 include security bug fixes relating to GatewayPorts, and GSSAPI, which eliminates the risk of credentials being inadvertently exposed to an untrusted user/host. A new compression method, proactive changes for signed vs. unsigned integer bugs, and many additional bugfixes and improvements highlight this release."
This discussion has been archived. No new comments can be posted.

OpenSSH 4.2 released

Comments Filter:
  • by nurb432 ( 527695 ) on Monday September 05, 2005 @12:07PM (#13483545) Homepage Journal
    That might make remote X11 useable on a cable modem..
  • by CyricZ ( 887944 ) on Monday September 05, 2005 @12:17PM (#13483602)
    There is no question that Mr. deRaadt is quite outspoken. But he can produce some damn fine and mighty secure code. I have nothing but the utmost respect for his coding abilities, even if his public relations skill are lacking.

    Frankly, I'd rather put up with arrogance and have access to amazing code, rather than dealing with a nice person who can't write code worthy of a cockfool.

  • by CyricZ ( 887944 ) on Monday September 05, 2005 @12:23PM (#13483629)
    No problem, Bill. After all, open source software (especially that under the BSD license) is meant to be shared and used by all, basically however they see fit. That's the name of the game, Mr. Gates.

  • by GeekBoy ( 10877 ) on Monday September 05, 2005 @12:32PM (#13483665)
    Sigh. Back to my commercial (vandyke vshelld) implementation....
  • by Yaa 101 ( 664725 ) on Monday September 05, 2005 @12:35PM (#13483683) Journal
    Theo de Raadt is ok really, he puts his coding where his mouth is. And at least he's not a corporate ass-licker like a lot of others. He does not corrupt his vision with corporate goodies.
  • by slavemowgli ( 585321 ) on Monday September 05, 2005 @12:41PM (#13483713) Homepage
    Admittedly, yes, Theo is (or at least can be) quite an asshole. But what does that have to do with the quality of OpenSSH (or OpenBSD)?

    Like him or not, but it's a great program, and not using it just because you don't like the lead developer, when there are no actual reasons not to, is stupid.
  • by Yaa 101 ( 664725 ) on Monday September 05, 2005 @12:41PM (#13483714) Journal
    So we must stop using one of the worlds best security software because somebody does not like Theo de Raadt?

    Are you mod fucking insane?
  • by Ann Elk ( 668880 ) on Monday September 05, 2005 @12:43PM (#13483722)

    As a friend of mine says, "It's OK if they call you an asshole, if they say it with awe."

    Theo is certainly opinionated, and he may or may not be an asshole, but his group produces some damn fine software. You may not like his methods, but it's difficult to argue with his results.

  • by ArbitraryConstant ( 763964 ) on Monday September 05, 2005 @12:43PM (#13483724) Homepage
    The BSD licensing has made it possible for commercial OSes to have an SSH implementation by default. That ubiquity is what killed telnet. By helping companies like Microsoft, Sun, and Apple, the OpenSSH project has helped everyone.
  • by ArbitraryConstant ( 763964 ) on Monday September 05, 2005 @12:51PM (#13483764) Homepage
    I've met Stallman and de Raadt and they're both assholes. But the world needs a few people that are willing to be assholes.

    He gets results. For example, giving out contact information isn't the nicest way to get hardware docs and firmware, but it works.
  • by Elektroschock ( 659467 ) on Monday September 05, 2005 @01:01PM (#13483823)
    Talented people, real genius, think of Mozart and others... they are usually a little bit mad and they deserve tolerance.

    They can take the freedom to be different and we have to understand that we have to adopt to them.
  • by RAMMS+EIN ( 578166 ) on Monday September 05, 2005 @01:04PM (#13483844) Homepage Journal
    As far as I understand, both scp and sftp are actually implemented by separate binaries on the server side. Why don't you just replace those binaries with ones that do your logging and defer the actual work to the original binaries?
  • by Kynde ( 324134 ) <kynde@iki.COWfi minus herbivore> on Monday September 05, 2005 @01:06PM (#13483861)
    Bloody hell. I've been using openssh ever since it came out and quite a while the old Tatu Ylönen's ssh before that and type all those lengthy user@hostname.domainname.whatever: prefixes day in day out without knowing about those aliases.

    The fact is that in OSS world one should, atleast once a month raise fingers from the keyboard and stop to think "What am I missing from my daily environment? Are stupid, repetetive or borings things that I do all too frequently?". The odds are that I could easily fix most of them swiftly and the ones that might require moderate amounts of work to happen it's quite likely that someone hast stumbled on those very same issues before me and fixed them. (and experience in *nix world teaches me that frequently the fix is quite brilliant)
  • by RAMMS+EIN ( 578166 ) on Monday September 05, 2005 @01:23PM (#13483975) Homepage Journal
    ``UNIX has had exponential backoffs forever. Mess up one time, you get a 1 second delay. Mess up twice, you get to wait 2 seconds, etc. I wonder why that couldn't be done in an ssh context.''

    This exponential backoff system works when you're trying to log in from a tty. When SSH, the system doesn't know whether this is the same user trying to authenticate. It's similar to sitting in front of a Linux box, trying to log in on VT 1, and when it backs off, switch to VT 2, and so on.

    The situation could be improved somewhat by sshd tracking failed logins by IP address, and disallowing that IP address from logging in for a while. However, this complicates sshd and isn't really bullet proof, what with NAT making any number of machines appear to have the same IP address.
  • by Malor ( 3658 ) on Monday September 05, 2005 @01:57PM (#13484174) Journal
    As far as I know, the computational overhead of the higher-bit keys isn't that significant, so it's probably not doing any actual harm. It'll slow down initial key negotiation and session setup, but it shouldn't affect traffic overhead, because that's encrypted with a symmetric cipher that was negotiated with the (very slow) public-key protocol. You'd probably only notice the overhead if you were running a server with many, many session setups. If it impacted you, generating a smaller key would be trivial.

    The larger key will make your data more secure on the wire, in transit, but the weakest point has always been the key's passphrase. A 32768-bit key is just as crackable as a 256-bit key if you have physical access to the encrypted keyfile.

    Improving transit security isn't an inherently bad idea, but it's making the strongest link in the chain even stronger. It probably won't do that much to increase overall security.
  • by h4rm0ny ( 722443 ) on Monday September 05, 2005 @03:24PM (#13484668) Journal

    Cracking it on the first attempt and cracking it on the 10^50th attempt have equal probabilities.

    True, but both probabilities are minute. The median of that range is 5*10^49 meaning that's the average number of tries you need. If you got lucky and found it in the first 10%, that's 10^49. If someone wanting to spy on you can muster the resources to crack that in a human lifetime, you've made an enemy of God!

    Quantum computing opens up some interesting possibilities, but if a hypothetical Quantum computer in the year 2015 could search 1x10^23 keys per second (more than that massive distributed Internet project a while ago), it would still take millions of years on average.

    10^50 is a big number.
  • Re:Proactive? (Score:0, Insightful)

    by glitch23 ( 557124 ) on Monday September 05, 2005 @07:55PM (#13486098)
    Proactive in this case means "before a cracker finds the bugs and exploits them" and not "before they were created to begin with". So it depends on what their point of view was when they wrote it as to whether or not they used the word correctly.

For large values of one, one equals two, for small values of two.

Working...