From owner-freebsd-security Wed Jan 5 7:41:53 2000 Delivered-To: freebsd-security@freebsd.org Received: from eltex.ru (ELTEX-2-SPIIRAS.nw.ru [195.19.204.46]) by hub.freebsd.org (Postfix) with ESMTP id 1E0B815386 for ; Wed, 5 Jan 2000 07:41:46 -0800 (PST) (envelope-from ark@eltex.ru) Received: from yaksha.eltex.ru (root@yaksha.eltex.ru [195.19.198.2]) by eltex.ru (8.9.3/8.9.3) with SMTP id SAA13546; Wed, 5 Jan 2000 18:41:06 +0300 (MSK) Received: by yaksha.eltex.ru (ssmtp TIS-0.5alpha, 19 Oct 1998); Wed, 5 Jan 2000 18:38:00 +0300 Received: from undisclosed-intranet-sender id xma023903; Wed, 5 Jan 00 17:23:36 +0300 Date: Wed, 5 Jan 2000 17:23:25 +0300 Message-Id: <200001051423.RAA06052@paranoid.eltex.spb.ru> In-Reply-To: <20000103090708.A3780@rumpole.bohemians.lexington.ky.us> from "David Rankin " From: ark@eltex.ru Organization: "Klingon Imperial Intelligence Service" Subject: Re: OpenSSH protocol 1.6 proposal To: drankin@bohemians.lexington.ky.us Cc: security@FreeBSD.ORG, openssh-unix-dev@mindrot.org Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org -----BEGIN PGP SIGNED MESSAGE----- nuqneH, David Rankin said : > > Apart from standards-compliance, what does SSH2 buy you over a cleaned > > up SSH1? > > I know it's been mentioned already, but the #1 is you can do PAM > challenge/response authentication correctly. TISAuthentication option works fine for me. _ _ _ _ _ _ _ {::} {::} {::} CU in Hell _| o |_ | | _|| | / _||_| |_ |_ |_ (##) (##) (##) /Arkan#iD |_ o _||_| _||_| / _| | o |_||_||_| [||] [||] [||] Do i believe in Bible? Hell,man,i've seen one! -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBOHNT26H/mIJW9LeBAQGScQP/b7pDSIl9euhFcNOrGn2koIXvruUwFhO6 kbw+G2EtmqgFSWiCECyrhDerFL51fT67uaGKPQtoQ6fmiZ6zAhbDiVGI3ASPoPnO tDP4rgsiRNiAy3YTmooaBMbL+XmWTg+WYRlTUDeGLVnUQbOWVUNn3kL83P0K2ScP iBMUOtLr8wc= =VDHV -----END PGP SIGNATURE----- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message