[Info-vax] Is HP's TCP/IP Services for OpenVMS vulnerable?
VAXman- at SendSpamHere.ORG
VAXman- at SendSpamHere.ORG
Sat Aug 20 12:25:16 EDT 2011
In article <j2oiq2$cpk$1 at news1.cse.ohio-state.edu>, DAVISM at ecr6.ohio-state.edu (Michael T. Davis) writes:
>
>In article <0ff9dbc7-09ea-4f2f-840a-8196c92fc914 at b9g2000prd.googlegroups.com>,
>Rod <rregier at dymaxion.ca> writes:
>
>>> "Michael T. Davis" <DAV... at ecr6.ohio-state.edu> wrote in messagenews:j2bh=
>>na$r7e$1 at news1.cse.ohio-state.edu...
>>> > We're running...
>>>
>>> > =A0HP TCP/IP Services for OpenVMS Alpha Version V5.6 - ECO 3
>>> > =A0on an AlphaServer DS15 running OpenVMS V8.3
>>
>>You can also get a modest jump on security issues by upgrading to the
>>current production release of the OpenVMS IP stack, which is 5.7 ECO
>>2.
>>
>>I'm running it on some systems including SSH usage w/o serious
>>operational issues.
>
> The "powers that be" here are basically just going by what Nessus
>tells them, and it bases this on the hello banner from the server. We don't
>have a support contract, but we do have access to newer releases. So, is
>there a newer release version wherein the SSH server reports a version of at
>least 3.2.2?
HP TCP/IP Services for OpenVMS Alpha Version V5.7 - ECO 1
on an AlphaServer DS10L 466 MHz running OpenVMS V8.4
SSH-2.0-3.2.0 SSH OpenVMS V5.5 VMS_sftp_version 3
--
VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)ORG
All your spirit rack abuses, come to haunt you back by day.
All your Byzantine excuses, given time, given you away.
More information about the Info-vax
mailing list