Displaying 9 results from an estimated 9 matches for "jhawk".
Did you mean:
hawk
2017 Apr 10
3
error allocating core memory buffers (code 22) at util2.c(106) [sender=3.1.2]
...like the inability to modify symlinks
inside a top-level Backups.backupdb directory of a Time Machine hfs
volume (But you can move the top-level directory into another directory
and then modify symlinks inside and then move it back). This has been
an "interesting" experience.
Thanks.
--jhawk at mit.edu
John Hawkinson
2002 Mar 11
3
Does OpenSSH 3.x support KRB5 directly?
Just curious. There seems to be an awful lot in the source, but no
actual configure option.
Please advise.
--
Austin Gonyou
Systems Architect, CCNA
Coremetrics, Inc.
Phone: 512-698-7250
email: austin at coremetrics.com
"It is the part of a good shepherd to shear his flock, not to skin it."
Latin Proverb
2017 Apr 11
0
error allocating core memory buffers (code 22) at util2.c(106) [sender=3.1.2]
...so lost
the stack trace I thought I had (inadequate scrollback), so I'm not
sure what was going on. But at first blush, it appeared that adding -vvvv
made things hang forever.
Removing it, and rerunning, it's now happily trucking along and has
been for the past hour actually doing work.
--jhawk at mit.edu
John Hawkinson
2001 Nov 22
1
1.2.26-compat Kerberos support
On Wed, Nov 21, 2001 at 01:41:42PM -0500, John Hawkinson wrote:
> auth-krb5.c
> auth1.c
> compat.c
> comapt.h
> servconf.c
> session.c
> session.h
> sshconnect1.c
> sshd_config
why do you need to touch these files? for MIT K5? or
for adding back the told ticket passing behaviour?
i have no string opinion about whether the AFS/Kerb tickets
should be passed
2002 Feb 26
1
logging of which key authenticated?
Hi folks,
I was wondering if it were possible to log which key is used to authenticate
a user logging in?
In our scenario, our client is wanting to use SSH keys to control shared
access to Unix accounts, including root. It is obviously possible to add
multiple keys into the authorized_keys file, however, it is not possible to
see which user/key was actually presented, at a reasonable logging
2013 May 29
2
Patch to discourage unencrypted key generation
>>> configuration holes are the *default* configuration. ssh-keygen
>>> creates passphrase frees by default if you simply hit "Enter" a few
>>> times, and there is no way I've ever seen for ssh_config to reject
>>> them by default when loading local keys or loading them into an
>>> ssh-agent.
>>
>> So where are your
2001 Dec 14
2
PATCH: Kerberos password authentication w/o KDC verification
Folks: We use an old AFS cell with Kerberos 4. Our use of Kerberos 4 is
fairly limited; we have never needed to implement rcmd host principals
for most of our systems. Indeed, given that Kerberos 4 strips off the
domain name portion of a hostname when determining the rcmd instance, we
would not be able to do this, since we do have duplicate hostnames in
multiple subdomains.
For AFS
2018 Jul 12
5
OpenSSH slow on OSX High Sierra (maybe due to libcrypto)?
Hi all.
Is anyone else seeing issues with OpenSSH being slow on OSX High
Sierra? In the interests of better test coverage I set one up,
however the OpenSSH tests take much longer on it than on much older
machines with much slower CPUs. It seems to be due to the
vendor-supplied libcrypto being about 20x slower at bignum operations
than nominally the same version of LibreSSL compiled locally.
If
2001 Nov 20
3
problem with AFS token forwarding
Hello,
I came across an interoperability problem in OpenSSH 3.0p1 and 3.0.1p1
concerning the AFS token forwarding. That means that the new versions are
not able to exchange AFS tokens (and Kerberos TGTs) with older OpenSSH
releases (including 2.9p2) and with the old SSH 1.2.2x. In my opinion this
problem already existed in Openssh 2.9.9p1, but I have never used this
version (I only looked at the