On Sat, Mar 30, 2002 at 01:14:07PM +0100, Dag-Erling Smorgrav wrote: > "David O'Brien" <[EMAIL PROTECTED]> writes: > > Something is still very wrong: > > > > ssh foo@releng4 > > otp-md5 350 re9786 ext > > S/Key Password: > > otp-md5 134 re2584 ext > > S/Key Password: > > otp-md5 417 re5381 ext > > S/Key Password: > > otp-md5 198 re2571 ext > > S/Key Password: > > > > Uh, why does my sequence keep changing when I just hit <return>??? > > Because it's generating fake S/Key challenges, and badly.
Especially since RELENG_4 does NOT use OPIE. Who this "fake S/Key challenge" that and turned it on? > No, I haven't seen it, but I've had similar reports. It's actually a > bug on the server side, in older OpenSSH servers, that is exposed by > newer OpenSSH clients. Will OpenSSH 3.1 be MFC'ed soon? Considering I DO want SKeyAuthentication (USENIX is comming up); what is the real fix? -- -- David ([EMAIL PROTECTED]) To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current" in the body of the message