search for: cuser

Displaying 20 results from an estimated 22 matches for "cuser".

Did you mean: user
2005 Oct 06
1
Possible security problem in hostbased user authentication?
In auth2-hostbased.c, line #146 if (auth_rhosts2(pw, cuser, chost, chost) == 0) ^^^^^ shouldn't this be if (auth_rhosts2(pw, cuser, chost, ipaddr) == 0) ^^^^^^ The code was found in 4.2. Best regards, Choung S.Park
2016 Feb 14
5
[Bug 2541] New: Add explicit_bzero() before free() in OpenSSH-7.1p2 for auth1.c/auth2.c/auth2-hostbased.c
...debug2("userauth_hostbased: authenticated %d", authenticated); if (key != NULL) key_free(key); + explicit_bzero(pkalg, sizeof(*pkalg)); free(pkalg); + explicit_bzero(pkblob, sizeof(*pkblob)); free(pkblob); + explicit_bzero(cuser, sizeof(*cuser)); free(cuser); + explicit_bzero(chost, sizeof(*chost)); free(chost); + explicit_bzero(sig, sizeof(*sig)); free(sig); return authenticated; } @@ -237,6 +242,7 @@ verbose("Accepted %s public key %s from %s@%s&qu...
2002 Jul 01
3
3.4p1: 'buffer_append_space: alloc 10506240 not supported'
...nnection method none debug1: attempt 0 failures 0 Failed none for quinot from 10.10.0.172 port 35503 ssh2 Failed none for quinot from 10.10.0.172 port 35503 ssh2 debug1: userauth-request for user quinot service ssh-connection method hostbased debug1: attempt 1 failures 1 debug1: userauth_hostbased: cuser quinot chost vienna.int.domain.com. pkalg s sh-dss slen 55 debug1: temporarily_use_uid: 529/101 (e=0) debug1: restore_uid debug1: temporarily_use_uid: 529/101 (e=0) debug1: restore_uid debug1: temporarily_use_uid: 529/101 (e=0) debug1: restore_uid debug1: temporarily_use_uid: 529/101 (e=0) debug1:...
2006 Feb 12
1
sshd double-logging
...MM_USERKEY: allowed = options.pubkey_authentication && user_key_allowed(authctxt->pw, key); + auth_method = "publickey"; break; case MM_HOSTKEY: allowed = options.hostbased_authentication && hostbased_key_allowed(authctxt->pw, cuser, chost, key); + auth_method = "hostbased"; break; case MM_RSAHOSTKEY: key->type = KEY_RSA1; /* XXX */ allowed = options.rhosts_rsa_authentication && auth_rhosts_rsa_key_allowed(authctxt->pw, cuser, chost, key); + auth_method = "rsa&quo...
2001 Sep 28
2
openssh-2.9p2, auth2.c
....c.ORI Wed Apr 25 14:44:15 2001 --- auth2.c Fri Sep 28 10:27:34 2001 *************** *** 801,815 **** debug2("userauth_hostbased: chost %s resolvedname %s ipaddr %s", chost, resolvedname, ipaddr); if (options.hostbased_uses_name_from_packet_only) { if (auth_rhosts2(pw, cuser, chost, chost) == 0) return 0; lookup = chost; } else { - if (((len = strlen(chost)) > 0) && chost[len - 1] == '.') { - debug2("stripping trailing dot from chost %s", chost); - chost[len - 1] = '\0'; - } if (strcasecmp(resolvedname, cho...
2002 May 08
1
[PATCH] Strip trailing . when using HostbasedUsesNameFromPacketOnly
...chost, resolvedname, ipaddr); + if (((len = strlen(chost)) > 0) && chost[len - 1] == '.') { + debug2("stripping trailing dot from chost %s", chost); + chost[len - 1] = '\0'; + } if (options.hostbased_uses_name_from_packet_only) { if (auth_rhosts2(pw, cuser, chost, chost) == 0) return 0; lookup = chost; } else { - if (((len = strlen(chost)) > 0) && chost[len - 1] == '.') { - debug2("stripping trailing dot from chost %s", chost); - chost[len - 1] = '\0'; - } if (strcasecmp(resolvedname, chost) != 0...
2006 May 15
0
[PATCH 4/12] bug fix: openssh-4.3p2 memory leak
...diff -uprN openssh-4.3p2/monitor.c openssh-4.3p2-kylie/monitor.c --- openssh-4.3p2/monitor.c 2005-11-04 22:07:05.000000000 -0600 +++ openssh-4.3p2-kylie/monitor.c 2006-05-08 17:18:15.697809744 -0500 @@ -1010,6 +1010,10 @@ mm_answer_keyallowed(int sock, Buffer *m key_blobtype = type; hostbased_cuser = cuser; hostbased_chost = chost; + } else { + xfree(blob); + xfree(chost); + xfree(cuser); } debug3("%s: key %p is %s",
2005 Aug 23
1
compile R with Portland Group compiler
...fndef __GNUC__ | choke me | #endif | | ; | return 0; | } configure:4184: result: no configure:4190: checking whether /usr/pgi/linux86-64/6.0/bin/pgcc accepts -g If I ignored the config.log errors and went ahead to do make, I got the following errors, make[3]: Entering directory `/home/cuser/AMD_BENCH/R-2.1.1/src/main' /usr/pgi/linux86-64/6.0/bin/pgcc -I../../src/extra/zlib -I../../src/extra/bzip2 -I../../src/extra/pcre -I. -I../../src/include -I../../src/include -I/usr/pgi/linux86-64/6.0/include -I/usr/pgi/linux86-64/6.0/include/CC -DHAVE_CONFIG_H -g -O2 -c regex.c -o regex...
2002 Jan 10
1
OpenSSH 3.0.Xp1, AIX -> Sun trusted host problem
...rt 732 ssh2 Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: userauth-request for user patrol service ssh-connection method hostbased Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: attempt 1 failures 1 Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: userauth_hostbased: cuser patrol chost aixhost1.Stanford.EDU. pkalg ssh-dss slen 55 Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: temporarily_use_uid: 6737/1012 (e=0) Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: restore_uid Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: temporarily_use_ui...
2003 Feb 28
1
Hostbased Authentication Question
...nothing I have tried seems to work. My question is this, does it matter which key, either ssh_host_key.pub or ssh_host_rsa_key.pub or ssh_host_dsa_key.pub, you put in /etc/ssh/ssh_known_hosts??? I have tried all three, and continue to get this error from sshd -d -d -d debug1: userauth_hostbased: cuser root chost mckinley. pkalg ssh-dss slen 55 debug3: mm_key_allowed entering debug3: mm_request_send entering: type 20 debug3: monitor_read: checking request 20 debug3: mm_answer_keyallowed entering debug3: mm_answer_keyallowed: key_from_blob: 0x80a4e88 debug2: userauth_hostbased: chost mckinley. re...
2018 Nov 11
2
After reboot the server nmb service is not acitve.
...y = no wins support = no ntlm auth = no domain logons = no load printers = no printcap name = /dev/null pid directory = /var/run/samba/NAS3 [NAS3-ki-folder] valid users = cuser, buser read list = cuser, buser write list = path = /mnt/NAS/myNASFS/ki-folder guest ok = no writable = yes create mask = 0777 directory mask = 0777 browseable = no ----------------------------------------------------------------------------------------------- log nmb.NAS3 add_name_to_subnet: Add...
2002 Aug 07
0
[Bug 382] New: Privilege Separation breaks HostbasedAuthentication
...ering debug3: mm_auth_password: user not authenticated Failed none for rjl01 from 10.49.191.9 port 34890 ssh2 debug1: userauth-request for user rjl01 service ssh-connection method hostbased debug1: attempt 1 failures 1 debug2: input_userauth_request: try method hostbased debug1: userauth_hostbased: cuser rjl01 chost evereska. pkalg ssh-dss slen 55 debug3: mm_key_allowed entering debug3: mm_request_send entering: type 20 debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED debug3: mm_request_receive_expect entering: type 21 debug3: mm_request_receive entering debug3: monitor_read: checking req...
2003 Oct 20
1
[Bug 746] host authentication requires RSA1 keys
...tication in /etc/ssh/ssh_known_hosts. In monitor.c, at about line 962 the type of the key passed to key_read() is fixed: case MM_RSAHOSTKEY: key->type = KEY_RSA1; /* XXX */ allowed = options.rhosts_rsa_authentication && auth_rhosts_rsa_key_allowed(authctxt->pw, cuser, chost, key); In addition, the host's IP address is required in the key definition in /etc/ssh/ssh_known_hosts; the symbolic host name won't work. Here's a workaround, that could be included in the documentation: Here's a workaround for the problem. Use ssh-keyscan -t...
2008 Sep 23
0
ast_func_write: Function not registered
...a write func odbc list records files in sql table: [R] dsn=connector write=INSERT INTO ast_records (filename,caller,callee,dtime) VALUES ('${ARG1}','${ARG2}','${ARG3}','${ARG4}') prefix=M and set it in dialplan : exten => _0X.,n,Set( M_R(${MIXMONITOR_FILENAME}\,${CUSER}\,${EXTEN}\,${DTIME})= ) i tried to add preload => func_odbc.so to load before extentions.conf but when i excute it still have ast_func_write: M_R Function not registered: Executing [0343434 at admin:6] Set("IAX2/555-10991", " M_R(/records/23-09-08-02-22_555_0343434.gsm,555,034...
2003 Sep 13
3
Trailing dot is not removed from client hostname if HostbasedUsesNameFromPacketOnly is yes
If HostbasedUsesNameFromPacketOnly is set to yes, sshd does not remove the trailing dot from the client supplied hostname, causing sshd to attempt to look up "foo.example.com." (note trailing period) in known_hosts and .shosts instead of "foo.example.com" Trivial patch attached. -- Carson -------------- next part -------------- An embedded and charset-unspecified text was
2002 Aug 01
0
[Bug 376] New: HostbasedAuthentication, followed snailbook but not working! :-(
...ntering debug3: mm_auth_password: user not authenticated Failed none for rjl01 from 10.49.191.9 port 887 ssh2 debug1: userauth-request for user rjl01 service ssh-connection method hostbased debug1: attempt 1 failures 1 debug2: input_userauth_request: try method hostbased debug1: userauth_hostbased: cuser rjl01 chost evereska. pkalg ssh-dss slen 55 debug3: mm_key_allowed entering debug3: mm_request_send entering: type 20 debug3: monitor_read: checking request 20 debug3: mm_answer_keyallowed entering debug3: mm_answer_keyallowed: key_from_blob: 1245e0 debug2: userauth_hostbased: chost evereska. resol...
2003 Oct 08
4
OS/390 openssh
...th2-hostbased.c Sat Jun 28 04:38:02 2003 +++ openssh-3.7.1p2/auth2-hostbased.c Tue Oct 7 08:21:59 2003 @@ -60,10 +60,10 @@ return 0; } pkalg = packet_get_string(&alen); - pkblob = packet_get_string(&blen); + pkblob = packet_get_binary(&blen); chost = packet_get_string(NULL); cuser = packet_get_string(NULL); - sig = packet_get_string(&slen); + sig = packet_get_binary(&slen); debug("userauth_hostbased: cuser %s chost %s pkalg %s slen %d", cuser, chost, pkalg, slen); @@ -101,7 +101,7 @@ buffer_put_cstring(&b, service); buffer_put_cstring(&amp...
2015 Jun 18
7
[Bug 2415] New: Public key failures are not counted and therefore not logged into syslog
...-- a/monitor.c +++ b/monitor.c @@ -1267,6 +1267,7 @@ mm_answer_keyallowed(int sock, Buffer *m) hostbased_chost = chost; } else { /* Log failed attempt */ + authctxt->failures++; auth_log(authctxt, 0, 0, auth_method, NULL); free(blob); free(cuser); -- You are receiving this mail because: You are watching the assignee of the bug.
2003 Feb 05
0
openssh 3.5p1 hostbased authentication
hello, i did some debugging today, here is the weird portion form sshd -d -d -d debug1: userauth-request for user jholland service ssh-connection method hostbased debug1: attempt 1 failures 1 debug2: input_userauth_request: try method hostbased debug1: userauth_hostbased: cuser jholland chost i2-0. pkalg ssh-dss slen 55 debug3: mm_key_allowed entering debug3: mm_request_send entering: type 20 debug3: monitor_read: checking request 20 debug3: mm_answer_keyallowed entering debug3: mm_answer_keyallowed: key_from_blob: 0x6000000000022cd0 debug2: userauth_hostbased: chost i2-...
2003 Oct 20
12
[Bug 747] host authentication requires RSA1 keys
...tication in /etc/ssh/ssh_known_hosts. In monitor.c, at about line 962 the type of the key passed to key_read() is fixed: case MM_RSAHOSTKEY: key->type = KEY_RSA1; /* XXX */ allowed = options.rhosts_rsa_authentication && auth_rhosts_rsa_key_allowed(authctxt->pw, cuser, chost, key); In addition, the host's IP address is required in the key definition in /etc/ssh/ssh_known_hosts; the symbolic host name won't work. Here's a workaround, that could be included in the documentation: Here's a workaround for the problem. Use ssh-keyscan -t...