Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 13 Jul 1999 13:44:30 +0400
From:      Sergei Laskavy <laskavy@Gambit.Msk.SU>
To:        John Hay <jhay@mikom.csir.co.za>
Cc:        freebsd-stable@freebsd.org
Subject:   Re: [anoncvs.freebsd.org] Remote: Server does not permit empty password login.
Message-ID:  <19990713134430.A14935@gambit.msk.su>
In-Reply-To: <199907130908.LAA20654@zibbi.mikom.csir.co.za>; from John Hay on Tue, Jul 13, 1999 at 11:08:53AM %2B0200
References:  <19990713121519.A12440@gambit.msk.su> <199907130908.LAA20654@zibbi.mikom.csir.co.za>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Jul 13, 1999 at 11:08:53AM +0200, John Hay wrote:

I used the same setup for some time and with different anoncvs servers
(not just FreeBSD).

For FreeBSD I use anoncvs + ssh to update only ports that I use -- the
speed boost is very high :-)

I noticed that ssh host key on ``anoncvs.freebsd.org'' was changed, so I
guess they had some kind of upgrade and didn't restored the previous
setup.

A day ago I sent a letter to root@anoncvs.freebsd.org regarding

	Remote: Bad file modes for /ctm/FreeBSD/anoncvs

Looks like they fixed (or at least changed) something because today's
``ssh -v messages'' differ.

Unsetting CVS_RSH won't help. My evil natd don't allow me to use remote
shell protocol :-)

I believe that fixing ``Bad file modes for /ctm/FreeBSD/anoncvs'' and
``Server does not permit empty password login'' will restore things.

> I haven't used anonymous cvs to get FreeBSD, so I'm just guessing. Are
> you sure that FreeBSD make it available through ssh? None of the
> examples in the handbook suggests this. Try unsetting the CVS_RSH
> environment variable and see if it makes a difference.

> John Hay -- John.Hay@mikom.csir.co.za

>> Dear administrators! anoncvs is still broken:

|$ cvs -R up .
|SSH Version 1.2.27 [i386--freebsd3.2], protocol version 1.5.
|Standard version.  Does not use RSAREF.
|host: Reading configuration data /usr/local/etc/ssh_config
|host: ssh_connect: getuid 1000 geteuid 1000 anon 1
|host: Connecting to anoncvs.freebsd.org [207.90.181.9] port 22.
|host: Connection established.
|host: Remote protocol version 1.99, remote software version 2.0.13 (non-commercial)
|host: Waiting for server public key.
|host: Received server public key (768 bits) and host key (1024 bits).
|host: Host 'anoncvs.freebsd.org' is known and matches the host key.
|host: Initializing random; seed file /home/laskavy/.ssh/random_seed
|host: Encryption type: idea
|host: Sent encrypted session key.
|host: Installing crc compensation attack detector.
|host: Received encrypted confirmation.
|host: Remote: Server does not permit empty password login.
-------^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|host: No agent.
|host: Trying RSA authentication with key 'laskavy@Berkeley.Gambit.Msk.SU'
|host: Remote: Bad file modes for /ctm/FreeBSD/anoncvs
|host: Server refused our key.
|host: Doing password authentication.
|anoncvs@anoncvs.freebsd.org's password:
|host: Remote: Server does not permit empty password login.
-------^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|Permission denied.
|cvs [update aborted]: end of file from server (consult above messages if any)

--
Sergei Laskavy, FreeBSD, Vim and TeX support, Moscow


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-stable" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19990713134430.A14935>