Date: Mon, 22 Apr 2002 19:53:06 -0700 From: Jordan Hubbard <jkh@winston.freebsd.org> To: Robert Watson <rwatson@FreeBSD.ORG> Cc: Oscar Bonilla <obonilla@galileo.edu>, Anthony Schneider <aschneid@mail.slc.edu>, Mike Meyer <mwm-dated-1019955884.8b118e@mired.org>, hackers@FreeBSD.ORG Subject: Re: ssh + compiled-in SKEY support considered harmful? Message-ID: <11670.1019530386@winston.freebsd.org> In-Reply-To: Message from Robert Watson <rwatson@FreeBSD.ORG> of "Mon, 22 Apr 2002 22:41:02 EDT." <Pine.NEB.3.96L.1020422223923.64976i-100000@fledge.watson.org>
next in thread | previous in thread | raw e-mail | index | archive | help
> That fix relies on the extensive PAM updates in -CURRENT however; in > -STABLE it can probably be similarly replicated via appropriate tweaking > of sshd (?). Why not fix it in stable by the very simple tweaking of the ChallengeResponseAuthentication to no in the sshd config file we ship Trust me, this question is going to come up a _lot_ for us otherwise. :( - Jordan To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?11670.1019530386>