From owner-freebsd-security Sat May 6 19:13: 5 2000 Delivered-To: freebsd-security@freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (Postfix) with ESMTP id 233FD37B973; Sat, 6 May 2000 19:13:04 -0700 (PDT) (envelope-from kris@FreeBSD.org) Received: from localhost (kris@localhost) by freefall.freebsd.org (8.9.3/8.9.2) with ESMTP id TAA38305; Sat, 6 May 2000 19:13:03 -0700 (PDT) (envelope-from kris@FreeBSD.org) X-Authentication-Warning: freefall.freebsd.org: kris owned process doing -bs Date: Sat, 6 May 2000 19:13:03 -0700 (PDT) From: Kris Kennaway To: Brian Reichert Cc: freebsd-security@freebsd.org Subject: Re: OpenSSH-1.2.2 + S/Key In-Reply-To: <20000501234749.A8682@numachi.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Mon, 1 May 2000, Brian Reichert wrote: > Yes, please! I have no idea how non-functional the patches may > be, but I'm willing to poke. I have Solaris and FreeBSD platforms > (and stock ssh) to test against... See www.freebsd.org/~kris/ssh-opie.tgz for the patches. I think I included everything there. They should work correctly for OPIE logins, the only thing missing is they don't return fake OPIE challenges for nonexistent users as well as I'd like. Kris ---- In God we Trust -- all others must submit an X.509 certificate. -- Charles Forsythe To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message