lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 15 May 2012 10:46:04 -0500
From: Derek Martin <code@...zashack.org>
To: bugtraq@...urityfocus.com, rssh-discuss@...rceforge.net
Subject: Re: rssh security announcement
On Tue, May 08, 2012 at 12:24:52PM -0500, Derek Martin wrote:
> Henrik Erkkonen has discovered that, through clever manipulation of
> environment variables on the ssh command line, it is possible to
> circumvent rssh. As far as I can tell, there is no way to effect a
> root compromise, except of course if the root account is the one
> you're attempting to protect with rssh...
>
> This project is old, and I have no interest in continuing to maintain
> it.
Actually, I have a patch for this. I'll be publishing it later this
week, when I can find some time to do it.
--
Derek D. Martin
http://www.pizzashack.org/
GPG Key ID: 0x81CFE75D
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists