FAQ Search Today's Posts Mark Forums Read
» Video Reviews

» Linux Archive

Linux-archive is a website aiming to archive linux email lists and to make them easily accessible for linux users/developers.


» Sponsor

» Partners

» Sponsor

Go Back   Linux Archive > 64 Studio > 64 Studio User

 
 
LinkBack Thread Tools
 
Old 05-15-2008, 07:54 PM
Ralf Mardorf
 
Default My question about "Major security flaw in Etch SSL packages" is solved

Ralf Mardorf wrote:
> Hi
>
> I'm clueless but maybe not the only one .
>
>
>> All 64 Studio users who ever use SSH to allow remote access
>>
>
> On my system SSH and SSL are already upgraded. I don't understand what
> kind of remote access you mean.
> I think that I don't use or allow any kind of remote access.
>
>
>> $ ssh-vulnkey
>>
>> to find out if you have any of the known vulnerable keys on your
>> machine. Even if you don't have any known vulnerable keys, you should
>> delete all keys on your system and generate fresh keys.
>>
>>
>
> spinymouse@64studio:~$ ssh-vulnkey
> Not blacklisted: 2048 bb:39:83:82:1b:31:77:20:8c:bd:4e:14:95:b3:13:9a
> /etc/ssh/ssh_host_rsa_key
> Not blacklisted: 1024 e7:a7:8c:c4:a9:56:0a:e7:b6:eb:43:5a:90:61:b3:eb
> /etc/ssh/ssh_host_dsa_key
>
> I only use https for online banking etc. and openPGP for encryption as
> far as I know.
>
> Is your advice relevant for users like me?
>

Ok, it's not relevant for people like me. I'm not sure if I understand
SSH, SSL, TCP/IP etc. perfectly but I'm not using this keys.

Cheers,
Ralf

_______________________________________________
64studio-users mailing list
64studio-users@64studio.com
http://lists.64studio.com/mailman/listinfo/64studio-users
 

Thread Tools




All times are GMT. The time now is 03:55 AM.

VBulletin, Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO ©2007, Crawlability, Inc.
Copyright 2007 - 2008, www.linux-archive.org