Re: FreeBSD Security Advisory FreeBSD-SA-03:12.openssh

From: Chuck Swiger (cswiger_at_mac.com)
Date: 09/17/03

  • Next message: Sick`: "FW: opiekey segfault ... isn't that harmfull? it's setuid root"
    Date: Wed, 17 Sep 2003 15:55:51 -0400
    
    

    Matthew Dillon wrote:
    [ ... ]
    > :This can be dangerous if you are ssh'ed in, and the restart kills your
    > :connection rather than the daemon.
    >
    > All the restart target does is basically kill the pid using the pid file
    > and then restart the daemon, so it is no more dangerous then the below.

    It's good that the FreeBSD script does not use 'killall' (for instance), but not
    every SysV sshd script is as sensible. Of course, if you argued that a NG sshd
    RC script might involve dependencies which affected other processes, you'd have
    a point. :-)

    -- 
    -Chuck
    _______________________________________________
    freebsd-security@freebsd.org mailing list
    http://lists.freebsd.org/mailman/listinfo/freebsd-security
    To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
    

  • Next message: Sick`: "FW: opiekey segfault ... isn't that harmfull? it's setuid root"