From mboxrd@z Thu Jan 1 00:00:00 1970 From: =?UTF-8?q?Cl=C3=A9ment=20Lassieur?= Subject: [PATCH 2/2] services: openssh: Remove deprecated 'RSAAuthentication' option. Date: Sat, 18 Feb 2017 12:46:17 +0100 Message-ID: <20170218114617.6714-2-clement@lassieur.org> References: <20170217184529.3a610d81@lepiller.eu> <20170218114617.6714-1-clement@lassieur.org> Return-path: Received: from eggs.gnu.org ([2001:4830:134:3::10]:43379) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1cf3TO-0007kX-BL for guix-devel@gnu.org; Sat, 18 Feb 2017 06:46:43 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1cf3TL-00026C-9V for guix-devel@gnu.org; Sat, 18 Feb 2017 06:46:42 -0500 Received: from mail.lassieur.org ([83.152.10.219]:60668) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1cf3TL-000266-0e for guix-devel@gnu.org; Sat, 18 Feb 2017 06:46:39 -0500 Received: from localhost.localdomain (lib59-3-82-233-190-39.fbx.proxad.net [82.233.190.39]) by mail.lassieur.org (Postfix) with ESMTPSA id 8A7656401B3 for ; Sat, 18 Feb 2017 12:46:35 +0100 (CET) In-Reply-To: <20170218114617.6714-1-clement@lassieur.org> List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-devel-bounces+gcggd-guix-devel=m.gmane.org@gnu.org Sender: "Guix-devel" To: guix-devel@gnu.org * gnu/services/ssh.scm (openssh-config-file): Remove it. ()[rsa-authentication?]: Remove it. * doc/guix.texi (Networking Services): Remove it. --- doc/guix.texi | 5 ----- gnu/services/ssh.scm | 5 ----- 2 files changed, 10 deletions(-) diff --git a/doc/guix.texi b/doc/guix.texi index 22eef3a64..54d4bab89 100644 --- a/doc/guix.texi +++ b/doc/guix.texi @@ -9151,11 +9151,6 @@ false, users have to use other authentication method. Authorized public keys are stored in @file{~/.ssh/authorized_keys}. This is used only by protocol version 2. -@item @code{rsa-authentication?} (default: @code{#t}) -When true, users may log in using pure RSA authentication. When false, -users have to use other means of authentication. This is used only by -protocol 1. - @item @code{x11-forwarding?} (default: @code{#f}) When true, forwarding of X11 graphical client connections is enabled---in other words, @command{ssh} options @option{-X} and diff --git a/gnu/services/ssh.scm b/gnu/services/ssh.scm index 7d6abcd33..876caf6d5 100644 --- a/gnu/services/ssh.scm +++ b/gnu/services/ssh.scm @@ -273,8 +273,6 @@ The other options should be self-descriptive." (default #t)) (public-key-authentication? openssh-configuration-public-key-authentication? (default #t)) ;Boolean - (rsa-authentication? openssh-configuration-rsa-authentication? ;Boolean - (default #t)) (x11-forwarding? openssh-configuration-x11-forwarding? ;Boolean (default #f)) (protocol-number openssh-configuration-protocol-number ;integer @@ -331,9 +329,6 @@ The other options should be self-descriptive." (format port "PubkeyAuthentication ~a\n" #$(if (openssh-configuration-public-key-authentication? config) "yes" "no")) - (format port "RSAAuthentication ~a\n" - #$(if (openssh-configuration-rsa-authentication? config) - "yes" "no")) (format port "X11Forwarding ~a\n" #$(if (openssh-configuration-x11-forwarding? config) "yes" "no")) -- 2.11.1