- markus@cvs.openbsd.org 2001/07/22 22:04:19
     [readconf.c ssh.1]
     enable challenge-response auth by default; ok millert@
diff --git a/ChangeLog b/ChangeLog
index 1d6c029..cc0d9cd 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -7,6 +7,9 @@
      [ssh.1]
      There is no option "Compress", point to "Compression" instead; ok 
      markus
+   - markus@cvs.openbsd.org 2001/07/22 22:04:19
+     [readconf.c ssh.1]
+     enable challenge-response auth by default; ok millert@
 
 20010803
  - (djm) Fix interrupted read in entropy gatherer. Spotted by markus@ on
@@ -6117,4 +6120,4 @@
  - Wrote replacements for strlcpy and mkdtemp
  - Released 1.0pre1
 
-$Id: ChangeLog,v 1.1427 2001/08/06 20:50:55 mouring Exp $
+$Id: ChangeLog,v 1.1428 2001/08/06 20:53:26 mouring Exp $
diff --git a/readconf.c b/readconf.c
index 19b571a..36700fb 100644
--- a/readconf.c
+++ b/readconf.c
@@ -12,7 +12,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: readconf.c,v 1.82 2001/06/26 16:15:23 dugsong Exp $");
+RCSID("$OpenBSD: readconf.c,v 1.83 2001/07/22 22:04:19 markus Exp $");
 
 #include "ssh.h"
 #include "xmalloc.h"
@@ -803,7 +803,7 @@
 	if (options->pubkey_authentication == -1)
 		options->pubkey_authentication = 1;
 	if (options->challenge_response_authentication == -1)
-		options->challenge_response_authentication = 0;
+		options->challenge_response_authentication = 1;
 #if defined(KRB4) || defined(KRB5)
 	if (options->kerberos_authentication == -1)
 		options->kerberos_authentication = 1;
diff --git a/ssh.1 b/ssh.1
index a4f040a..f8d9fc6 100644
--- a/ssh.1
+++ b/ssh.1
@@ -34,7 +34,7 @@
 .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 .\"
-.\" $OpenBSD: ssh.1,v 1.121 2001/07/22 21:32:42 pvalchev Exp $
+.\" $OpenBSD: ssh.1,v 1.122 2001/07/22 22:04:19 markus Exp $
 .Dd September 25, 1999
 .Dt SSH 1
 .Os
@@ -1012,15 +1012,12 @@
 Note that this option applies to protocol version 1 only.
 .It Cm ChallengeResponseAuthentication
 Specifies whether to use challenge response authentication.
-Currently there is only support for
-.Xr skey 1
-authentication.
 The argument to this keyword must be
 .Dq yes
 or
 .Dq no .
 The default is
-.Dq no .
+.Dq yes .
 .It Cm StrictHostKeyChecking
 If this flag is set to
 .Dq yes ,