Date: Mon, 22 Apr 2002 21:41:20 -0400 From: Anthony Schneider <aschneid@mail.slc.edu> To: Mike Meyer <mwm-dated-1019955884.8b118e@mired.org> Cc: Jordan Hubbard <jkh@winston.freebsd.org>, hackers@FreeBSD.ORG Subject: Re: ssh + compiled-in SKEY support considered harmful? Message-ID: <20020422214120.A14633@mail.slc.edu> In-Reply-To: <15556.45867.668486.259740@guru.mired.org>; from mwm-dated-1019955884.8b118e@mired.org on Mon, Apr 22, 2002 at 08:04:43PM -0500 References: <200204230039.g3N0dQ8i011313@winston.freebsd.org> <15556.45867.668486.259740@guru.mired.org>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --]
On Mon, Apr 22, 2002 at 08:04:43PM -0500, Mike Meyer wrote:
> In <200204230039.g3N0dQ8i011313@winston.freebsd.org>, Jordan Hubbard <jkh@winston.freebsd.org> typed:
> > My question: Who's "wrong" here, FreeBSD or Mac OS X? If the latter,
>
> Someone decided that FreeBSD should do challengeresponse
> authentication by default. You can fix it by uncommenting the line
> "#ChallengeResponseAuthentication no" in /etc/ssh/sshd_config.
>
that's what fixxed it for me, too.
SkeyAuthentication no also does it. :)
-Anthony.
-----------------------------------------------
PGP key at:
http://www.keyserver.net/
http://www.anthonydotcom.com/gpgkey/key.txt
Home:
http://www.anthonydotcom.com
-----------------------------------------------
[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAjzEu78ACgkQ+rDjkNht5F2mMACfYxbazSOUnrTs0XOk00X1AAND
xToAoIGhI8C9EssxCQ6I0ttn2yhiJAuh
=z7cs
-----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020422214120.A14633>
