Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Feb 2004 18:39:25 +0100
From:      des@des.no (Dag-Erling =?iso-8859-1?q?Sm=F8rgrav?=)
To:        "Mike Jakubik" <mikej@rogers.com>
Cc:        current@freebsd.org
Subject:   Re: sshd_config 1.35 commit
Message-ID:  <xzpsmgxloz6.fsf@dwp.des.no>
In-Reply-To: <20040226171444.ILLR435635.fep04-mail.bloor.is.net.cable.rogers.com@win2000> (Mike Jakubik's message of "Thu, 26 Feb 2004 12:15:33 -0500")
References:  <20040226171444.ILLR435635.fep04-mail.bloor.is.net.cable.rogers.com@win2000>

next in thread | previous in thread | raw e-mail | index | archive | help
"Mike Jakubik" <mikej@rogers.com> writes:
> When choosing ssh v2 and keyboard-interactive authentication in SecureCRT=
 I
> have to enter the password twice (it doesnt work the first time) and I can
> not save the password. You think this is better than the old behavior?

The old behaviour is to allow clients to bypass the PAM policy.

>                                                                        Wh=
at
> better ssh software is there than SecureCRT? I dont like putty.

That's your problem.

>                                                                  I'm not
> going to memorize all my clients logins, and waste time typing them in. I=
ts
> a pain in the ass and a waste of time. How come this PAM circumvention

I agree.  That's why I use key authentication.  Maybe you should too.

>                                        How come this PAM circumvention
> wasnt a problem before?

It's always been a problem, for as long as OpenSSH has supported PAM.

DES
--=20
Dag-Erling Sm=F8rgrav - des@des.no



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzpsmgxloz6.fsf>