Date: Thu, 26 Feb 2004 18:39:25 +0100 From: des@des.no (Dag-Erling =?iso-8859-1?q?Sm=F8rgrav?=) To: "Mike Jakubik" <mikej@rogers.com> Cc: current@freebsd.org Subject: Re: sshd_config 1.35 commit Message-ID: <xzpsmgxloz6.fsf@dwp.des.no> In-Reply-To: <20040226171444.ILLR435635.fep04-mail.bloor.is.net.cable.rogers.com@win2000> (Mike Jakubik's message of "Thu, 26 Feb 2004 12:15:33 -0500") References: <20040226171444.ILLR435635.fep04-mail.bloor.is.net.cable.rogers.com@win2000>
next in thread | previous in thread | raw e-mail | index | archive | help
"Mike Jakubik" <mikej@rogers.com> writes: > When choosing ssh v2 and keyboard-interactive authentication in SecureCRT= I > have to enter the password twice (it doesnt work the first time) and I can > not save the password. You think this is better than the old behavior? The old behaviour is to allow clients to bypass the PAM policy. > Wh= at > better ssh software is there than SecureCRT? I dont like putty. That's your problem. > I'm not > going to memorize all my clients logins, and waste time typing them in. I= ts > a pain in the ass and a waste of time. How come this PAM circumvention I agree. That's why I use key authentication. Maybe you should too. > How come this PAM circumvention > wasnt a problem before? It's always been a problem, for as long as OpenSSH has supported PAM. DES --=20 Dag-Erling Sm=F8rgrav - des@des.no
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzpsmgxloz6.fsf>