Date: Thu, 17 Jan 2002 08:34:51 -0800 From: "Bruce A. Mah" <bmah@FreeBSD.ORG> To: Josh Tiefenbach <josh@zipperup.org> Cc: Koji Hino <hino@ccrl.sj.nec.com>, stable@FreeBSD.ORG Subject: Re: 4.5-RC1: Why sshd require opie for SSH version 2? Message-ID: <200201171634.g0HGYpD22958@bmah.dyndns.org> In-Reply-To: <20020116155436.A28166@zipperup.org> References: <20020116.110509.05717273.hino@ccrl.sj.nec.com> <20020116155436.A28166@zipperup.org>
next in thread | previous in thread | raw e-mail | index | archive | help
If memory serves me right, Josh Tiefenbach wrote: > > After doing some tests, I found that connecting to this 4.5-RC1 box > > from other machine by OpenSSH (without RSA/DSA key, nor rhost*auth, > > assuming to use plain password to login), requires opie to login, > > though /etc/opiekeys, and /etc/skeykeys are both size 0. If I start > > openssh with flag '-1', which means to use OpenSSH version 1 protocol, > > it works fine: require plain password. I checked 4.4-RELEASE machine, > > and found that it works fine without '-1' flag, and even with '-2', it > > works. [snip] > Perhaps its an OpenSSH v3 thing? If I have some time tonite, I'll go compile > up v3 someplace and check it out. Did you get a chance to do this? I'm unable to reproduce this problem between two RELENG_4 machines running the base system OpenSSH (both machines built within the last three days). Usually I use a DSA keypair to authenticate, but I temporarily blew away ~/.ssh/authorized_keys2 on the server side and ~/ .ssh/id_dsa on the client side. Bruce. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200201171634.g0HGYpD22958>