I'm confused. I just did an apt-get update and apt-get upgrade but for some reason it's holding back openssh-client and openssh-server. Is this because they're still working on a patch for the patch?
I'm confused. I just did an apt-get update and apt-get upgrade but for some reason it's holding back openssh-client and openssh-server. Is this because they're still working on a patch for the patch?
Code:`--> wajig whichpkg ssh-vulnkey File Path Package ===========================================================-================= INSTALLED /usr/bin/ssh-vulnkey openssh-client /usr/share/man/man1/ssh-vulnkey.1.gz openssh-client `--> wajig status openssh-client Package Installed =======================-=============== openssh-client 1:4.7p1-8ubuntu1.1
I'm pretty sure there's an easier way. For SSH2:
I'll give it a shot when I get home. I'm not entirely confident that I should try overwriting my SSH keys while using an SSH session.Code:sudo ssh-keygen -f /etc/ssh/ssh_host_rsa_key -N '' -t rsa sudo ssh-keygen -f /etc/ssh/ssh_host_dsa_key -N '' -t dsa
i ran "sudo ssh-vulnkey -a". It gave me no output at all. What does this mean?
Has anybody succesfully re-generated their keys yet using ssh-keygen? And what was the exact method used?
Cheers
Not sure why apt-get is doing that, but I solved the problem by logging in at the console and doing the following:
It installed, along with ssh-vulnkey, and generated new keys.Code:sudo apt-get purge openssh-client openssh-server sudo apt-get install openssh-client openssh-server
Just looking for a bit of clarity here.
After patching, I'm going to have to repurchase all my CA provided SSL certificates aren't I?
https://lists.ubuntu.com/archives/ub...ay/000705.html
http://lists.debian.org/debian-secur.../msg00152.html
I went ahead & dist-upgraded and during the upgrade SSH keys were regenerated, nice.
Does this mean everything I generated an SSL certificate for should also be recreated???
Most likely. I would at least for added security.
I just got done recreating my SSH keys
"Security lies within the user of who runs the system. Think smart, live safe." - Dr Small
Linux User #441960 | Wiki: DrSmall
Bookmarks