Mailing-List: contact cygwin-help AT sourceware DOT cygnus DOT com; run by ezmlm List-Subscribe: List-Archive: List-Post: List-Help: , Sender: cygwin-owner AT sources DOT redhat DOT com Delivered-To: mailing list cygwin AT sources DOT redhat DOT com Message-ID: <3A83A7B3.756449B5@ece.gatech.edu> Date: Fri, 09 Feb 2001 03:17:55 -0500 From: Charles Wilson X-Mailer: Mozilla 4.75 [en] (Windows NT 5.0; U) X-Accept-Language: en MIME-Version: 1.0 To: Corinna Vinschen Subject: Re: Authentication By-Pass Vulnerability in OpenSSH 2.3.1 (devel snapshot) (fwd) References: <20010209084018 DOT C4880 AT cygbert DOT vinschen DOT de> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Corinna Vinschen wrote: > FYI for those running snapshots. I have removed the openssh-20010202 > snapshot from cygwin/latest. > > If you are using the openssh-20010202 snapshot PLEASE REVERT BACK TO > openssh-20001221 OR openssh-2.3.0p1.!!! This means you have to re-regenerate your RSA keys after reverting back to the older version, right? --Chuck -- Want to unsubscribe from this list? Check out: http://cygwin.com/ml/#unsubscribe-simple