Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 22 Apr 2002 21:41:20 -0400
From:      Anthony Schneider <aschneid@mail.slc.edu>
To:        Mike Meyer <mwm-dated-1019955884.8b118e@mired.org>
Cc:        Jordan Hubbard <jkh@winston.freebsd.org>, hackers@FreeBSD.ORG
Subject:   Re: ssh + compiled-in SKEY support considered harmful?
Message-ID:  <20020422214120.A14633@mail.slc.edu>
In-Reply-To: <15556.45867.668486.259740@guru.mired.org>; from mwm-dated-1019955884.8b118e@mired.org on Mon, Apr 22, 2002 at 08:04:43PM -0500
References:  <200204230039.g3N0dQ8i011313@winston.freebsd.org> <15556.45867.668486.259740@guru.mired.org>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On Mon, Apr 22, 2002 at 08:04:43PM -0500, Mike Meyer wrote:
> In <200204230039.g3N0dQ8i011313@winston.freebsd.org>, Jordan Hubbard <jkh@winston.freebsd.org> typed:
> > My question:  Who's "wrong" here, FreeBSD or Mac OS X?  If the latter,
> 
> Someone decided that FreeBSD should do challengeresponse
> authentication by default. You can fix it by uncommenting the line
> "#ChallengeResponseAuthentication no" in /etc/ssh/sshd_config.
> 

that's what fixxed it for me, too.
SkeyAuthentication no also does it. :)
-Anthony.

-----------------------------------------------
PGP key at:
    http://www.keyserver.net/
    http://www.anthonydotcom.com/gpgkey/key.txt
Home:
    http://www.anthonydotcom.com
-----------------------------------------------


[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjzEu78ACgkQ+rDjkNht5F2mMACfYxbazSOUnrTs0XOk00X1AAND
xToAoIGhI8C9EssxCQ6I0ttn2yhiJAuh
=z7cs
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020422214120.A14633>