From owner-freebsd-stable Wed Jan 17 15:36:20 2001 Delivered-To: freebsd-stable@freebsd.org Received: from moek.pir.net (moek.pir.net [130.64.1.215]) by hub.freebsd.org (Postfix) with ESMTP id 6E8F837B404 for ; Wed, 17 Jan 2001 15:36:02 -0800 (PST) Received: from pir by moek.pir.net with local (Exim) id 14J27Q-0001WL-00 for freebsd-stable@FreeBSD.ORG; Wed, 17 Jan 2001 18:35:56 -0500 Date: Wed, 17 Jan 2001 18:35:55 -0500 From: Peter Radcliffe To: freebsd-stable@FreeBSD.ORG Message-ID: <20010117183555.F1446@pir.net> Reply-To: freebsd-stable@freebsd.org Mail-Followup-To: freebsd-stable@FreeBSD.ORG Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i X-fish: < X-Copy-On-Listmail: Please do NOT Cc: me on list mail. Sender: owner-freebsd-stable@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG I've been playing with moving to ssh V2 by default and discovered that the freebsd-stable openssh doesn't appear to forward the authentication agent connection, even when turned on and specificly told to. ssh v1 in the same situation with the same machines works perfectly. Has anyone else seen this ? Is it intentional ? P. ---------------------------------------------------------------- pir@mrow> uname -a FreeBSD mrow 4.2-STABLE FreeBSD 4.2-STABLE #18: Wed Jan 3 17:41:30 EST 2001 pir@mrow:/usr/src/sys/compile/MROW i386 pir@mrow> ssh -v moek SSH Version OpenSSH_2.2.0, protocol versions 1.5/2.0. Compiled with SSL (0x0090600f). [...] debug: Trying RSA authentication via agent with 'pir@mrow' debug: Received RSA challenge from server. debug: Sending response to RSA challenge. debug: Remote: RSA authentication accepted. debug: RSA authentication accepted by server. debug: Requesting pty. debug: Requesting X11 forwarding with authentication spoofing. debug: Requesting authentication agent forwarding. debug: Requesting shell. debug: Entering interactive session. [...] pir@moek> echo $SSH_AUTH_SOCK /tmp/ssh-gQdO5061/agent.5061 pir@moek> lo q pir@mrow> ssh -A -2 -v moek SSH Version OpenSSH_2.2.0, protocol versions 1.5/2.0. Compiled with SSL (0x0090600f). [...] Enabling compatibility mode for protocol 2.0 debug: Local version string SSH-2.0-OpenSSH_2.2.0 [...] debug: trying DSA agent key /home/pir/.ssh/id_dsa debug: ssh-userauth2 successfull debug: no set_nonblock for tty fd 4 debug: no set_nonblock for tty fd 5 debug: no set_nonblock for tty fd 6 debug: channel 0: new [client-session] debug: send channel open 0 debug: Entering interactive session. debug: callback start debug: client_init id 0 arg 0 debug: Requesting X11 forwarding with authentication spoofing. debug: channel request 0: shell [...] pir@moek> echo $SSH_AUTH_SOCK SSH_AUTH_SOCK: Undefined variable. ---------------------------------------------------------------- -- pir pir@pir.net pir@net.tufts.edu To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message