Rogue or compromised OpenSSH servers can read priv

Saw the following on Computer World:

 

If you're connecting to servers over the secure shell (SSH) protocol using an OpenSSH client, you should update that client immediately. The latest version patches a flaw that could allow rogue or compromised servers to read users' private authentication keys.

 

The vulnerability stems from an experimental feature known as roaming that allows SSH connections to be resumed. This feature has been enabled by default in OpenSSH clients since version 5.4, released in March 2010, but is not present in the OpenSSH server implementation. As a result only clients are affected.

The vulnerability allows a server to read information from a connecting client's memory, including its private keys. It has been fixed in OpenSSH 7.1p2, released Thursday.

Geeks, making the world a better place
Quote · 15 Jan 2016

Laughing

Quote · 16 Apr 2016
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.