Date: Mon, 03 Dec 2001 08:43:26 +1100 From: Peter Jeremy <peter.jeremy@alcatel.com.au> To: "H. Wade Minter" <minter@lunenburg.org> Cc: "f.johan.beisser" <jan@caustic.org>, freebsd-security@FreeBSD.ORG Subject: Re: OPIE and ssh Message-ID: <20011203084326.A3702@gsmx07.alcatel.com.au> In-Reply-To: <20011130220948.T36907-100000@bunning.skiltech.com>; from minter@lunenburg.org on Fri, Nov 30, 2001 at 10:10:51PM -0500 References: <15367.51556.94034.892901@horsey.gshapiro.net> <20011130220948.T36907-100000@bunning.skiltech.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 2001-Nov-30 22:10:51 -0500, "H. Wade Minter" <minter@lunenburg.org> wrote: >On Fri, 30 Nov 2001, Gregory Neil Shapiro wrote: > >> Yep, use it every day. All I did was: >> >> cd /etc >> rm skeykeys >> ln -s opiekeys skeykeys >> keyinit gshapiro >> >> My ~/.ssh/config contains (among other things): >> >> # Defaults >> Host * >> StrictHostKeyChecking yes > >Is there anything else that needs to be done? I've been interested in >playing around with S/Key or OPIE, but when I tried those steps, I still >get a normal password prompt when I SSH in: > >bash-2.04$ slogin kenbridge >minter@kenbridge's password: Try adding "ChallengeResponseAuthentication yes" to /etc/ssh/ssh_config. Peter To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011203084326.A3702>