On Thu, Dec 16, 2010 at 04:47:27PM +0000, Colin Watson wrote:
> On Thu, Dec 16, 2010 at 11:18:09AM +0100, Arne Wichmann wrote:
> > It does not look like jpake is enabled in sid:
> 
> That's correct.  It's disabled upstream and we haven't enabled it.  I
> have no intention of enabling it until upstream say it's OK to do so
> (which will probably consist of enabling it by default).
> 
> Here's the upstream commit message:
> 
>    - d...@cvs.openbsd.org 2010/09/20 04:50:53
>      [jpake.c schnorr.c]
>      check that received values are smaller than the group size in the
>      disabled and unfinished J-PAKE code.
>      avoids catastrophic security failure found by Sebastien Martini
> 
> Michael, thanks for the heads-up, but I don't see any need to spend time
> backporting this.  Anyone who goes in, enables this against the advice
> of upstream, and deploys it on a publicly-visible system deserves what
> they get!  If you're going to use experimental authentication modes,
> then you at least need to use current CVS HEAD.
> 
> I'm closing this bug, and I recommend the security team mark it as "no
> fix needed".

I'll mark openssh as non-affected in the security tracker. (Since it's
not enabled)

Cheers,
        Moritz



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to