Displaying 20 results from an estimated 22 matches for "cuser".
Did you mean:
user
2005 Oct 06
1
Possible security problem in hostbased user authentication?
In auth2-hostbased.c, line #146
if (auth_rhosts2(pw, cuser, chost, chost) == 0)
^^^^^
shouldn't this be
if (auth_rhosts2(pw, cuser, chost, ipaddr) == 0)
^^^^^^
The code was found in 4.2.
Best regards,
Choung S.Park
2016 Feb 14
5
[Bug 2541] New: Add explicit_bzero() before free() in OpenSSH-7.1p2 for auth1.c/auth2.c/auth2-hostbased.c
...debug2("userauth_hostbased: authenticated %d", authenticated);
if (key != NULL)
key_free(key);
+ explicit_bzero(pkalg, sizeof(*pkalg));
free(pkalg);
+ explicit_bzero(pkblob, sizeof(*pkblob));
free(pkblob);
+ explicit_bzero(cuser, sizeof(*cuser));
free(cuser);
+ explicit_bzero(chost, sizeof(*chost));
free(chost);
+ explicit_bzero(sig, sizeof(*sig));
free(sig);
return authenticated;
}
@@ -237,6 +242,7 @@
verbose("Accepted %s public key %s from %s@%s&qu...
2002 Jul 01
3
3.4p1: 'buffer_append_space: alloc 10506240 not supported'
...nnection method
none
debug1: attempt 0 failures 0
Failed none for quinot from 10.10.0.172 port 35503 ssh2
Failed none for quinot from 10.10.0.172 port 35503 ssh2
debug1: userauth-request for user quinot service ssh-connection method
hostbased
debug1: attempt 1 failures 1
debug1: userauth_hostbased: cuser quinot chost vienna.int.domain.com.
pkalg s
sh-dss slen 55
debug1: temporarily_use_uid: 529/101 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 529/101 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 529/101 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 529/101 (e=0)
debug1:...
2006 Feb 12
1
sshd double-logging
...MM_USERKEY:
allowed = options.pubkey_authentication &&
user_key_allowed(authctxt->pw, key);
+ auth_method = "publickey";
break;
case MM_HOSTKEY:
allowed = options.hostbased_authentication &&
hostbased_key_allowed(authctxt->pw,
cuser, chost, key);
+ auth_method = "hostbased";
break;
case MM_RSAHOSTKEY:
key->type = KEY_RSA1; /* XXX */
allowed = options.rhosts_rsa_authentication &&
auth_rhosts_rsa_key_allowed(authctxt->pw,
cuser, chost, key);
+ auth_method = "rsa&quo...
2001 Sep 28
2
openssh-2.9p2, auth2.c
....c.ORI Wed Apr 25 14:44:15 2001
--- auth2.c Fri Sep 28 10:27:34 2001
***************
*** 801,815 ****
debug2("userauth_hostbased: chost %s resolvedname %s ipaddr %s",
chost, resolvedname, ipaddr);
if (options.hostbased_uses_name_from_packet_only) {
if (auth_rhosts2(pw, cuser, chost, chost) == 0)
return 0;
lookup = chost;
} else {
- if (((len = strlen(chost)) > 0) && chost[len - 1] == '.') {
- debug2("stripping trailing dot from chost %s", chost);
- chost[len - 1] = '\0';
- }
if (strcasecmp(resolvedname, cho...
2002 May 08
1
[PATCH] Strip trailing . when using HostbasedUsesNameFromPacketOnly
...chost, resolvedname, ipaddr);
+ if (((len = strlen(chost)) > 0) && chost[len - 1] == '.') {
+ debug2("stripping trailing dot from chost %s", chost);
+ chost[len - 1] = '\0';
+ }
if (options.hostbased_uses_name_from_packet_only) {
if (auth_rhosts2(pw, cuser, chost, chost) == 0)
return 0;
lookup = chost;
} else {
- if (((len = strlen(chost)) > 0) && chost[len - 1] == '.') {
- debug2("stripping trailing dot from chost %s", chost);
- chost[len - 1] = '\0';
- }
if (strcasecmp(resolvedname, chost) != 0...
2006 May 15
0
[PATCH 4/12] bug fix: openssh-4.3p2 memory leak
...diff -uprN openssh-4.3p2/monitor.c openssh-4.3p2-kylie/monitor.c
--- openssh-4.3p2/monitor.c 2005-11-04 22:07:05.000000000 -0600
+++ openssh-4.3p2-kylie/monitor.c 2006-05-08 17:18:15.697809744 -0500
@@ -1010,6 +1010,10 @@ mm_answer_keyallowed(int sock, Buffer *m
key_blobtype = type;
hostbased_cuser = cuser;
hostbased_chost = chost;
+ } else {
+ xfree(blob);
+ xfree(chost);
+ xfree(cuser);
}
debug3("%s: key %p is %s",
2005 Aug 23
1
compile R with Portland Group compiler
...fndef __GNUC__
| choke me
| #endif
|
| ;
| return 0;
| }
configure:4184: result: no
configure:4190: checking whether /usr/pgi/linux86-64/6.0/bin/pgcc accepts -g
If I ignored the config.log errors and went ahead to do make, I got the
following errors,
make[3]: Entering directory `/home/cuser/AMD_BENCH/R-2.1.1/src/main'
/usr/pgi/linux86-64/6.0/bin/pgcc -I../../src/extra/zlib
-I../../src/extra/bzip2 -I../../src/extra/pcre -I. -I../../src/include
-I../../src/include -I/usr/pgi/linux86-64/6.0/include
-I/usr/pgi/linux86-64/6.0/include/CC -DHAVE_CONFIG_H -g -O2 -c regex.c
-o regex...
2002 Jan 10
1
OpenSSH 3.0.Xp1, AIX -> Sun trusted host problem
...rt 732 ssh2
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1:
userauth-request for user patrol service ssh-connection method
hostbased
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: attempt 1 failures 1
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1:
userauth_hostbased: cuser patrol chost aixhost1.Stanford.EDU. pkalg
ssh-dss slen 55
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1:
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: restore_uid
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1:
temporarily_use_ui...
2003 Feb 28
1
Hostbased Authentication Question
...nothing I have tried seems to work. My question is this, does it matter
which key, either ssh_host_key.pub or ssh_host_rsa_key.pub or
ssh_host_dsa_key.pub, you put in /etc/ssh/ssh_known_hosts??? I have tried
all three, and continue to get this error from sshd -d -d -d
debug1: userauth_hostbased: cuser root chost mckinley. pkalg ssh-dss slen
55
debug3: mm_key_allowed entering
debug3: mm_request_send entering: type 20
debug3: monitor_read: checking request 20
debug3: mm_answer_keyallowed entering
debug3: mm_answer_keyallowed: key_from_blob: 0x80a4e88
debug2: userauth_hostbased: chost mckinley. re...
2018 Nov 11
2
After reboot the server nmb service is not acitve.
...y = no
wins support = no
ntlm auth = no
domain logons = no
load printers = no
printcap name = /dev/null
pid directory = /var/run/samba/NAS3
[NAS3-ki-folder]
valid users = cuser, buser
read list = cuser, buser
write list =
path = /mnt/NAS/myNASFS/ki-folder
guest ok = no
writable = yes
create mask = 0777
directory mask = 0777
browseable = no
-----------------------------------------------------------------------------------------------
log nmb.NAS3
add_name_to_subnet: Add...
2002 Aug 07
0
[Bug 382] New: Privilege Separation breaks HostbasedAuthentication
...ering
debug3: mm_auth_password: user not authenticated
Failed none for rjl01 from 10.49.191.9 port 34890 ssh2
debug1: userauth-request for user rjl01 service ssh-connection method hostbased
debug1: attempt 1 failures 1
debug2: input_userauth_request: try method hostbased
debug1: userauth_hostbased: cuser rjl01 chost evereska. pkalg ssh-dss slen 55
debug3: mm_key_allowed entering
debug3: mm_request_send entering: type 20
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED
debug3: mm_request_receive_expect entering: type 21
debug3: mm_request_receive entering
debug3: monitor_read: checking req...
2003 Oct 20
1
[Bug 746] host authentication requires RSA1 keys
...tication in /etc/ssh/ssh_known_hosts.
In monitor.c, at about line 962 the type of the key passed to key_read() is
fixed:
case MM_RSAHOSTKEY:
key->type = KEY_RSA1; /* XXX */
allowed = options.rhosts_rsa_authentication &&
auth_rhosts_rsa_key_allowed(authctxt->pw,
cuser, chost, key);
In addition, the host's IP address is required in the key definition
in /etc/ssh/ssh_known_hosts; the symbolic host name won't work.
Here's a workaround, that could be included in the documentation:
Here's a workaround for the problem. Use
ssh-keyscan -t...
2008 Sep 23
0
ast_func_write: Function not registered
...a write func odbc list records files in sql table:
[R]
dsn=connector
write=INSERT INTO ast_records (filename,caller,callee,dtime) VALUES
('${ARG1}','${ARG2}','${ARG3}','${ARG4}')
prefix=M
and set it in dialplan :
exten => _0X.,n,Set(
M_R(${MIXMONITOR_FILENAME}\,${CUSER}\,${EXTEN}\,${DTIME})= )
i tried to add preload => func_odbc.so to load before extentions.conf
but when i excute it still have ast_func_write: M_R Function not registered:
Executing [0343434 at admin:6] Set("IAX2/555-10991", "
M_R(/records/23-09-08-02-22_555_0343434.gsm,555,034...
2003 Sep 13
3
Trailing dot is not removed from client hostname if HostbasedUsesNameFromPacketOnly is yes
If HostbasedUsesNameFromPacketOnly is set to yes, sshd does not remove
the trailing dot from the client supplied hostname, causing sshd to
attempt to look up "foo.example.com." (note trailing period) in
known_hosts and .shosts instead of "foo.example.com"
Trivial patch attached.
--
Carson
-------------- next part --------------
An embedded and charset-unspecified text was
2002 Aug 01
0
[Bug 376] New: HostbasedAuthentication, followed snailbook but not working! :-(
...ntering
debug3: mm_auth_password: user not authenticated
Failed none for rjl01 from 10.49.191.9 port 887 ssh2
debug1: userauth-request for user rjl01 service ssh-connection method
hostbased
debug1: attempt 1 failures 1
debug2: input_userauth_request: try method hostbased
debug1: userauth_hostbased: cuser rjl01 chost evereska. pkalg ssh-dss
slen 55
debug3: mm_key_allowed entering
debug3: mm_request_send entering: type 20
debug3: monitor_read: checking request 20
debug3: mm_answer_keyallowed entering
debug3: mm_answer_keyallowed: key_from_blob: 1245e0
debug2: userauth_hostbased: chost evereska. resol...
2003 Oct 08
4
OS/390 openssh
...th2-hostbased.c Sat Jun 28 04:38:02 2003
+++ openssh-3.7.1p2/auth2-hostbased.c Tue Oct 7 08:21:59 2003
@@ -60,10 +60,10 @@
return 0;
}
pkalg = packet_get_string(&alen);
- pkblob = packet_get_string(&blen);
+ pkblob = packet_get_binary(&blen);
chost = packet_get_string(NULL);
cuser = packet_get_string(NULL);
- sig = packet_get_string(&slen);
+ sig = packet_get_binary(&slen);
debug("userauth_hostbased: cuser %s chost %s pkalg %s slen %d",
cuser, chost, pkalg, slen);
@@ -101,7 +101,7 @@
buffer_put_cstring(&b, service);
buffer_put_cstring(&...
2015 Jun 18
7
[Bug 2415] New: Public key failures are not counted and therefore not logged into syslog
...-- a/monitor.c
+++ b/monitor.c
@@ -1267,6 +1267,7 @@ mm_answer_keyallowed(int sock, Buffer *m)
hostbased_chost = chost;
} else {
/* Log failed attempt */
+ authctxt->failures++;
auth_log(authctxt, 0, 0, auth_method, NULL);
free(blob);
free(cuser);
--
You are receiving this mail because:
You are watching the assignee of the bug.
2003 Feb 05
0
openssh 3.5p1 hostbased authentication
hello,
i did some debugging today, here is the weird portion form sshd -d -d -d
debug1: userauth-request for user jholland service ssh-connection method
hostbased
debug1: attempt 1 failures 1
debug2: input_userauth_request: try method hostbased
debug1: userauth_hostbased: cuser jholland chost i2-0. pkalg ssh-dss slen
55
debug3: mm_key_allowed entering
debug3: mm_request_send entering: type 20
debug3: monitor_read: checking request 20
debug3: mm_answer_keyallowed entering
debug3: mm_answer_keyallowed: key_from_blob: 0x6000000000022cd0
debug2: userauth_hostbased: chost i2-...
2003 Oct 20
12
[Bug 747] host authentication requires RSA1 keys
...tication in /etc/ssh/ssh_known_hosts.
In monitor.c, at about line 962 the type of the key passed to key_read() is
fixed:
case MM_RSAHOSTKEY:
key->type = KEY_RSA1; /* XXX */
allowed = options.rhosts_rsa_authentication &&
auth_rhosts_rsa_key_allowed(authctxt->pw,
cuser, chost, key);
In addition, the host's IP address is required in the key definition
in /etc/ssh/ssh_known_hosts; the symbolic host name won't work.
Here's a workaround, that could be included in the documentation:
Here's a workaround for the problem. Use
ssh-keyscan -t...