From owner-freebsd-security Mon Feb 19 9:32:35 2001 Delivered-To: freebsd-security@freebsd.org Received: from ns1.via-net-works.net.ar (ns1.via-net-works.net.ar [200.10.100.10]) by hub.freebsd.org (Postfix) with ESMTP id 6F09037B4EC for ; Mon, 19 Feb 2001 09:32:31 -0800 (PST) Received: (from fpscha@localhost) by ns1.via-net-works.net.ar (8.9.3/8.9.3) id OAA72628 for security@freebsd.org; Mon, 19 Feb 2001 14:35:05 -0300 (ART) From: Fernando Schapachnik Message-Id: <200102191735.OAA72628@ns1.via-net-works.net.ar> Subject: Inconsistent behavior on openssh To: security@freebsd.org Date: Mon, 19 Feb 2001 14:35:04 -0300 (ART) Reply-To: Fernando Schapachnik X-Mailer: ELM [version 2.4ME+ PL82 (25)] MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=ISO-8859-1 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org After installing the latest versions of openssh I noted that ssh will not request rhost authentication if run by an user other than root. This is because it can't bind to a low port, as it lost the suid bit. This wasn't like this before. What is supposed to be the standard way of remote ssh logging without password? TIA! Fernando P. Schapachnik Administración de la red VIA NET.WORKS ARGENTINA S.A. fschapachnik@vianetworks.com.ar Conmutador: (54-11) 4323-3333 - Soporte: 0810-333-AYUDA To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message