[anoncvs.freebsd.org] Remote: Server does not permit empty password login.

1999-07-13 Thread Sergei Laskavy

Dear administrators!

anoncvs is still broken:

|$ cvs -R up .
|SSH Version 1.2.27 [i386--freebsd3.2], protocol version 1.5.
|Standard version.  Does not use RSAREF.
|host: Reading configuration data /usr/local/etc/ssh_config
|host: ssh_connect: getuid 1000 geteuid 1000 anon 1
|host: Connecting to anoncvs.freebsd.org [207.90.181.9] port 22.
|host: Connection established.
|host: Remote protocol version 1.99, remote software version 2.0.13 (non-commercial)
|host: Waiting for server public key.
|host: Received server public key (768 bits) and host key (1024 bits).
|host: Host 'anoncvs.freebsd.org' is known and matches the host key.
|host: Initializing random; seed file /home/laskavy/.ssh/random_seed
|host: Encryption type: idea
|host: Sent encrypted session key.
|host: Installing crc compensation attack detector.
|host: Received encrypted confirmation.
|host: Remote: Server does not permit empty password login.
---
|host: No agent.
|host: Trying RSA authentication with key '[EMAIL PROTECTED]'
|host: Remote: Bad file modes for /ctm/FreeBSD/anoncvs
|host: Server refused our key.
|host: Doing password authentication.
|[EMAIL PROTECTED]'s password:
|host: Remote: Server does not permit empty password login.
---
|Permission denied.
|cvs [update aborted]: end of file from server (consult above messages if any)


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-stable" in the body of the message



Re: [anoncvs.freebsd.org] Remote: Server does not permit empty password login.

1999-07-13 Thread John Hay

I haven't used anonymous cvs to get FreeBSD, so I'm just guessing. Are you
sure that FreeBSD make it available through ssh? None of the examples
in the handbook suggests this. Try unsetting the CVS_RSH environment
variable and see if it makes a difference.

John
-- 
John Hay -- [EMAIL PROTECTED]

 Dear administrators!
 
 anoncvs is still broken:
 
 |$ cvs -R up .
 |SSH Version 1.2.27 [i386--freebsd3.2], protocol version 1.5.
 |Standard version.  Does not use RSAREF.
 |host: Reading configuration data /usr/local/etc/ssh_config
 |host: ssh_connect: getuid 1000 geteuid 1000 anon 1
 |host: Connecting to anoncvs.freebsd.org [207.90.181.9] port 22.
 |host: Connection established.
 |host: Remote protocol version 1.99, remote software version 2.0.13 (non-commercial)
 |host: Waiting for server public key.
 |host: Received server public key (768 bits) and host key (1024 bits).
 |host: Host 'anoncvs.freebsd.org' is known and matches the host key.
 |host: Initializing random; seed file /home/laskavy/.ssh/random_seed
 |host: Encryption type: idea
 |host: Sent encrypted session key.
 |host: Installing crc compensation attack detector.
 |host: Received encrypted confirmation.
 |host: Remote: Server does not permit empty password login.
 ---
 |host: No agent.
 |host: Trying RSA authentication with key '[EMAIL PROTECTED]'
 |host: Remote: Bad file modes for /ctm/FreeBSD/anoncvs
 |host: Server refused our key.
 |host: Doing password authentication.
 |[EMAIL PROTECTED]'s password:
 |host: Remote: Server does not permit empty password login.
 ---
 |Permission denied.
 |cvs [update aborted]: end of file from server (consult above messages if any)
 
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with "unsubscribe freebsd-stable" in the body of the message
 




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-stable" in the body of the message