Date: Sat, 2 Jun 2001 02:35:00 -0700 From: Kris Kennaway <kris@obsecurity.org> To: Archie Cobbs <archie@packetdesign.com> Cc: freebsd-bugs@FreeBSD.ORG Subject: Re: bin/27821: can't do RSA login via ssh to root account Message-ID: <20010602023500.F95359@xor.obsecurity.org> In-Reply-To: <200106012210.f51MA3V16636@freefall.freebsd.org>; from archie@packetdesign.com on Fri, Jun 01, 2001 at 03:10:03PM -0700 References: <200106012210.f51MA3V16636@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--juZjCTNxrMaZdGZC Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Fri, Jun 01, 2001 at 03:10:03PM -0700, Archie Cobbs wrote: > Yep, the '-2' flag is what makes it work. Oh, maybe that makes sense, > I'm using a DSA key.. are they only supported by version 2? DSAAuthentication Specifies whether to try DSA authentication. The argument to this keyword must be ``yes'' or ``no''. DSA authentication will only be attempted if a DSA identity file exists. Note that this option applies to protocol version 2 only. > I thought that ssh+sshd would automatically negotiate version 2 but > maybe I assume too much. The default used to be to try protocol version 1 first; this has now changed to version 2 in the OpenSSH 2.9 client. It's always been configurable in your client configuration files. Kris --juZjCTNxrMaZdGZC Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7GLNDWry0BWjoQKURAlIzAKCBx0qHshKB5SEy0g/b+EOOdzMQ3wCeMvZh Bk6XBed4QrKbV1zih+EOEqo= =kdIL -----END PGP SIGNATURE----- --juZjCTNxrMaZdGZC-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010602023500.F95359>