OpenSSH Releases Version 5.0 41
os2man lets us know that OpenSSH version 5.0 has been released. The mirrors are linked from the top page. "OpenSSH (OpenBSD Secure Shell) is a set of computer programs providing encrypted communication sessions over a computer network using the ssh protocol. It was created as an open source alternative to the proprietary Secure Shell software suite offered by SSH Communications Security. OpenSSH is available for almost any Operating System."
Stay Classy (Score:2, Interesting)
Re:Stay Classy (Score:4, Insightful)
Re: (Score:2)
Re: (Score:2)
The
Re:Stay Classy (Score:5, Informative)
The result is that the maintainers of OpenSSH were not properly notified, and a bug was left in the code. For all that it's worth, it seems Theo was on holidays [undeadly.org], with no access to a computer.
So, sure, it may sound harsh, but I believe it's for a good cause: OpenSSH developers really want a stable and secure software. Consider the announcement a reminder of the proper procedure to warn them of bugs, not a dig at this or that operating system.
Re:Stay Classy (Score:5, Insightful)
I know that if I sent out a mass emailed "reminder" to my company about the proper protocol for something and specifically called out somebody from another group in it, the response would be a universal, "What a dick!" I'd be lucky to avoid being taken to the woodshed by my boss for it. That's just not how it's done.
Re: (Score:2)
Re: (Score:1)
Anyway, this minor flap about the release notes would have a more appropriate dimension if this release were given the minor sounding number it deserves. Was 4.91 already taken?
Re: (Score:3, Insightful)
Re: (Score:3, Funny)
Re: (Score:2)
Re: (Score:3, Informative)
"If you find a new security problem, you can mail it to deraadt@openbsd.org."
If he's going to be out of the country and unavailable for contact, perhaps you should provide an alternative method of reporting security issues that doesn't go through him. (Admittedly, it is the wrong way to report OpenSSH vulnerabilities - presumably the person looked at the wrong page - but it seems to be the official way of reporting issues that affect the rest of OpenBSD
Re: (Score:2, Flamebait)
Remember, OpenBSD was only started because Theo was kicked out of NetBSD for constantly making personal attacks, so he started a competing project as revenge.
Re: (Score:1)
security update? (Score:2, Insightful)
Security:
* CVE-2008-1483: Avoid possible hijacking of X11-forwarded connections
by refusing to listen on a port unless all address families bind
successfully.
Re: (Score:2)
You are talking about OpenSSH here. It is not "merely" a security update. It is a top priority security update.
Besides, what other kind of update would you expect on ssh?
Re:security update? (Score:4, Insightful)
Besides, what other kind of update would you expect on ssh?
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:2, Insightful)
Besides, what other kind of update would you expect on ssh?
Going from a 4.x release to a 5.x release? Something more than what's sounds like a small patch to fix a security problem. (I believe I saw a backport of this fix on a recent Ubuntu update).
Re: (Score:3, Informative)
It's a stupid versioning scheme, but it's what they use.
Re: (Score:2)
They didn't change the ssh protocol on ages, their server is a simple tty, and the client simple echoes data to a tty. If you don't consider security fixes, you'd have only small cosmetic changes.
Also, OpenSSH must be flawless. That is the software that gives acess to near everybody on near every server (and some desktops) at the internet. You don't want flaws on it.
Re: (Score:3, Informative)
No.
I don't know why you say "merely;" I'd rather know about security updates instead of new features. But perhaps you're trying to provoke a conversation on the unusual version numbering employed by OpenSSH? Because of the nature of the program, many releases have security fixes. If you want to see some recent features, look at the release notes for 4.9 [undeadly.org].
Re: (Score:2)
Because usually, a major version number change indicates major changes, not patching a single bug. I'd have expected a 4.9 with a security vulnerability patched to be released as 4.9.1.
Why Buck Convention? (Score:2)
Well, that would be conventional. Nobody says they need to be conventional.
However, conventions help us communicate and generally greases the skids for societal progress. So, it would be interesting to know why OpenSSH uses a different versioning system. Maybe it's more useful in some way we don't understand?
However, goin
Security Fix (Score:2)
Re: (Score:2)
The release notes criticize Debian devs for disclosing this publicly before trying to contact OpenSSH privately.
... which is ridiculous. Why should any privileged group get access to this information before the general public does? A great way to start a botnet would be to infiltrate a few of these "private" mailing lists and use/sell the information before the general public finds out about it. Heck, if the software is developed by a public company (not the case with OpenSSH) you could also short the company's stock and make a nice pile of cash.
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Interesting)
No, it's perfectly rational.
In one case, you're trusting the OpenSSH maintainers, as a group, not to put deliberate backdoors into the code that everyone will see. You're trusting them to behave well when the risk of being discovered is quite high. You also have the option of auditing the code yourself, so you don't even have to give them your complete trust.
In the other case, you are trusting each individual OpenSSH maintainer not to use his newly-acquired knowledge against specific targets when the
Re: (Score:1)
Wow. I think you just blew my mind.
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
I will suggest that there should be consistency & Debian believes in responsible disclosure.
Debian maintains a private security reporting mechanism & tells developers that some security bugs may be private for some length of time [debian.org]. Indeed, the Debian dev who closed that issue expressed apologies for not contacting the appropriate person.
Even those who do not believe in responsible disclosure will usually have the good m
Re: (Score:2)
I do think that calling them out like this is classless, though.
Chroot Finally? (Score:3, Interesting)
Re:Chroot Finally? (Score:4, Informative)
It was available in 4.9, released just days before 5.0.