On Mon, 30 Jul 2001, Brian F. Feldman wrote:

>For what it's worth, I tend to simply set "Protocol 1,2" in my .ssh/config
>and for the default case, it works fine (just like it used to).  I don't
>want to make that policy decision, though, because we will be better off
>when everyone moves to the protocol version 2, so it's reasonable for the
>default to make things "difficult" to encourage the switch.  I support the
>OpenSSH developers' plan here.

FWIW, I do the same in my .ssh/config because I work in a heterogeneous
computing environment where my home directory is NFS automounted.  Some
operating systems come with SSH daemons still installed by default as
1,2. The newer operating systems, including most of our linux installs,
are 2,1 by default.  I use RSA keys to authenticate and it's easier to
just have one keypair to worry about.  When every machine I use has
sshv2 support and does it by default, then I'll kill the RSA keys and
generate DSA keys.  It's quite annoying that systems which have 2,1 in
their sshd_config won't detect that I have RSA keys in .ssh but no DSA
keys and go ahead and select sshv1 on their own.

Brandon D. Valentine <[EMAIL PROTECTED]>

The very powerful and the very stupid have one thing in common.  Instead
of altering their views to fit the facts, they alter the facts to fit
their views ... which can be very uncomfortable if you happen to be one
of the facts that needs altering.
        - Doctor Who, "Face of Evil"

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message

Reply via email to