"Logan Kennelly" wrote: > [...] > You have probably already done this, but OpenSSH 3.3p1 is still vulnerable. > The key is that it now supports privilege separation which should trap them > in a little box where they can't do anything. To enable this, add the > following line to your sshd config file. > > UsePrivilegeSeparation yes Thanks Logan. Someone on another list also pointed me to http://www.kb.cert.org/vuls/id/369347 which also seems to be a good, concise description of the problem, and possible workarounds. For ssh > 2.9, they recommend: ChallengeResponseAuthentication no PAMAuthenticationViaKbdInt no along with your recommendation. It sounds like this is a moving target, at least until 3.4 is readily available. - Bob