I wonder if the code used in the Astaro SSH server is derivated from a server which was vulnerable to the CRC32 attack (eg. OpenSSH).
In this case, all astaro fw would be vulnerable to REMOTE ROOT exploit !
I know that the Astaro SSH server is only ssh-v.1 compatible (is v.2 planned ?) and that's a security concern, at least for me. But a remote root would be a LOT worse !!!
I wonder if the code used in the Astaro SSH server is derivated from a server which was vulnerable to the CRC32 attack (eg. OpenSSH).
In this case, all astaro fw would be vulnerable to REMOTE ROOT exploit !
I know that the Astaro SSH server is only ssh-v.1 compatible (is v.2 planned ?) and that's a security concern, at least for me. But a remote root would be a LOT worse !!!