Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 17 Jan 2002 08:34:51 -0800
From:      "Bruce A. Mah" <bmah@FreeBSD.ORG>
To:        Josh Tiefenbach <josh@zipperup.org>
Cc:        Koji Hino <hino@ccrl.sj.nec.com>, stable@FreeBSD.ORG
Subject:   Re: 4.5-RC1: Why sshd require opie for SSH version 2? 
Message-ID:  <200201171634.g0HGYpD22958@bmah.dyndns.org>
In-Reply-To: <20020116155436.A28166@zipperup.org> 
References:  <20020116.110509.05717273.hino@ccrl.sj.nec.com> <20020116155436.A28166@zipperup.org>

next in thread | previous in thread | raw e-mail | index | archive | help
If memory serves me right, Josh Tiefenbach wrote:
> > After doing some tests, I found that connecting to this 4.5-RC1 box
> > from other machine by OpenSSH (without RSA/DSA key, nor rhost*auth,
> > assuming to use plain password to login), requires opie to login,
> > though /etc/opiekeys, and /etc/skeykeys are both size 0. If I start
> > openssh with flag '-1', which means to use OpenSSH version 1 protocol,
> > it works fine: require plain password. I checked 4.4-RELEASE machine,
> > and found that it works fine without '-1' flag, and even with '-2', it
> > works.

[snip]

> Perhaps its an OpenSSH v3 thing? If I have some time tonite, I'll go compile
> up v3 someplace and check it out.

Did you get a chance to do this?

I'm unable to reproduce this problem between two RELENG_4 machines
running the base system OpenSSH (both machines built within the last
three days).  Usually I use a DSA keypair to authenticate, but I
temporarily blew away ~/.ssh/authorized_keys2 on the server side and ~/
.ssh/id_dsa on the client side.

Bruce.



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-stable" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200201171634.g0HGYpD22958>