summaryrefslogtreecommitdiff
path: root/debian/README.compromised-keys
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2008-06-09 11:08:17 +0000
committerColin Watson <cjwatson@debian.org>2008-06-09 11:08:17 +0000
commit0b848463a5673dabee2561bd381c679d673d2215 (patch)
tree67cc122f32acb970fd66d73c9b107872fddfbac2 /debian/README.compromised-keys
parent1e9c9549f143e974d6cce857b3e1af1639265758 (diff)
Add documentation on removing openssh-blacklist locally (see #484269).
Diffstat (limited to 'debian/README.compromised-keys')
-rw-r--r--debian/README.compromised-keys27
1 files changed, 27 insertions, 0 deletions
diff --git a/debian/README.compromised-keys b/debian/README.compromised-keys
index bfffc154a..7a9cb7657 100644
--- a/debian/README.compromised-keys
+++ b/debian/README.compromised-keys
@@ -138,3 +138,30 @@ OpenSSL:
138 138
1393. If certificates have been generated for use on other systems, they must be 1393. If certificates have been generated for use on other systems, they must be
140 found and replaced as well. 140 found and replaced as well.
141
142== Removing openssh-blacklist ==
143
144For the moment, the openssh-server package depends on openssh-blacklist, in
145order that the blacklist is deployed to the maximum possible number of
146systems to reduce the potential spread of worms exploiting this
147vulnerability. We acknowledge that this may be inconvenient for some small
148systems, but nevertheless feel that this was the best course of action.
149
150If you absolutely need to remove the blacklist from your system, then you
151can run the following commands to substitute a fake package for
152openssh-blacklist:
153
154 sudo apt-get install equivs
155 equivs-control openssh-blacklist.ctl
156 sed -i 's/^Package:.*/Package: openssh-blacklist/' openssh-blacklist.ctl
157 sed -i 's/^# Version:.*/Version: 9:1.0/' openssh-blacklist.ctl
158 equivs-build openssh-blacklist.ctl
159 sudo dpkg -i openssh-blacklist_1.0_all.deb
160
161Be warned: this circumvents a security measure for the sake of disk space.
162You should only do this if you have no other option, and if you are certain
163that no compromised keys will ever be generated on or copied onto this
164system.
165
166Once a sufficient amount of time and number of releases have passed, the
167openssh-blacklist package will be phased out.