On Sat, Mar 30, 2002 at 01:14:07PM +0100, Dag-Erling Smorgrav wrote:
> "David O'Brien" <[EMAIL PROTECTED]> writes:
> > Something is still very wrong:
> > 
> >     ssh  foo@releng4
> >     otp-md5 350 re9786 ext
> >     S/Key Password: 
> >     otp-md5 134 re2584 ext
> >     S/Key Password: 
> >     otp-md5 417 re5381 ext
> >     S/Key Password: 
> >     otp-md5 198 re2571 ext
> >     S/Key Password: 
> > 
> > Uh, why does my sequence keep changing when I just hit <return>???
> 
> Because it's generating fake S/Key challenges, and badly.

Especially since RELENG_4 does NOT use OPIE.
Who this "fake S/Key challenge" that and turned it on?

 
> No, I haven't seen it, but I've had similar reports.  It's actually a
> bug on the server side, in older OpenSSH servers, that is exposed by
> newer OpenSSH clients.

Will OpenSSH 3.1 be MFC'ed soon?
Considering I DO want SKeyAuthentication (USENIX is comming up); what is
the real fix?

-- 
-- David  ([EMAIL PROTECTED])

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message

Reply via email to