control of auth methods

Darren Tucker dtucker at zip.com.au
Sat May 8 15:39:12 EST 2004


Damien Miller wrote:

> Perhaps we would be willing to add a single "AuthMethods xxx,yyy,zzz",
> where xxx, etc are the auth method names used in the protocol. We'd have
> to keep the older names around for a fair while to stop breakage.

How should methods that have different names between protocols 1 and 2 
be handled?  eg ChallengeResponseAuthentication is "challenge-response" 
for v1 but "keyboard-interactive" for v2.

Ie, would "AuthMethods keyboard-interactive" enable challenge-response 
in v1?

-- 
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4  37C9 C982 80C7 8FF4 FA69
     Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.




More information about the openssh-unix-dev mailing list