Le 2001-05-13, Peter Wemm écrivait :

> The simplest thing is to do a ssh-keygen to generate a new RSA key and
> update ~/.ssh/authorized_keys2 once per remote machine that you connect
> to.  Once that is done, it never bothers you again.  You can change
> /etc/ssh/ssh_config so that it says 'Protocol 1,2', but that is avoiding
> the problem rather than using the more robust, cryptographically secure
> sshv2 wire protocol.

Ah. This seems to work around the very unfortunate situation described in
PR bin/27264. It seems very strange that one has to change the setup
on the *server* side to work around a regression on the client side.

Why cannot one use the same RSA public key for v1 and v2 client
authentication?

Thomas.

-- 
    [EMAIL PROTECTED]

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to