control of auth methods
Darren Tucker
dtucker at zip.com.au
Sat May 8 15:39:12 EST 2004
Damien Miller wrote:
> Perhaps we would be willing to add a single "AuthMethods xxx,yyy,zzz",
> where xxx, etc are the auth method names used in the protocol. We'd have
> to keep the older names around for a fair while to stop breakage.
How should methods that have different names between protocols 1 and 2
be handled? eg ChallengeResponseAuthentication is "challenge-response"
for v1 but "keyboard-interactive" for v2.
Ie, would "AuthMethods keyboard-interactive" enable challenge-response
in v1?
--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69
Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.
More information about the openssh-unix-dev
mailing list