Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 22 Apr 2002 19:53:06 -0700
From:      Jordan Hubbard <jkh@winston.freebsd.org>
To:        Robert Watson <rwatson@FreeBSD.ORG>
Cc:        Oscar Bonilla <obonilla@galileo.edu>, Anthony Schneider <aschneid@mail.slc.edu>, Mike Meyer <mwm-dated-1019955884.8b118e@mired.org>, hackers@FreeBSD.ORG
Subject:   Re: ssh + compiled-in SKEY support considered harmful? 
Message-ID:  <11670.1019530386@winston.freebsd.org>
In-Reply-To: Message from Robert Watson <rwatson@FreeBSD.ORG>  of "Mon, 22 Apr 2002 22:41:02 EDT." <Pine.NEB.3.96L.1020422223923.64976i-100000@fledge.watson.org> 

next in thread | previous in thread | raw e-mail | index | archive | help
> That fix relies on the extensive PAM updates in -CURRENT however; in
> -STABLE it can probably be similarly replicated via appropriate tweaking
> of sshd (?).

Why not fix it in stable by the very simple tweaking of the
ChallengeResponseAuthentication to no in the sshd config file we ship
Trust me, this question is going to come up a _lot_ for us otherwise. :(

- Jordan

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?11670.1019530386>