20010322 - (djm) Better AIX no tty fix, spotted by Gert Doering <gert@greenie.muc.de> - (djm) Released 2.5.2p2
20010321 - (djm) Fix ttyname breakage for AIX and Tru64. Patch from Steve VanDevender <stevev@darkwing.uoregon.edu> - (djm) Make sure pam_retval is initialised on call to pam_end. Patch from Solar Designer <solar@openwall.com> - (djm) Don't loop forever when changing password via PAM. Patch from Solar Designer <solar@openwall.com> - (djm) Generate config files before build - (djm) Correctly handle SIA and AIX when no tty present. Spotted and suggested fix from Mike Battersby <mib@unimelb.edu.au>
http://sysadmin.oreilly.com/news/silverman_1200.html the SSH-1 public-key user-authentication method is also vulnerable; the attacker may use the signed authenticator from the client side to access the client's account on the server. However, the SSH-2 public-key and host-based client authentication methods are MITM-proof: the authenticators involved are bound to session identifiers that are forced to be different on either side of the attacker.