search for: jhawk

Displaying 9 results from an estimated 9 matches for "jhawk".

Did you mean: hawk
2017 Apr 10
3
error allocating core memory buffers (code 22) at util2.c(106) [sender=3.1.2]
...like the inability to modify symlinks inside a top-level Backups.backupdb directory of a Time Machine hfs volume (But you can move the top-level directory into another directory and then modify symlinks inside and then move it back). This has been an "interesting" experience. Thanks. --jhawk at mit.edu John Hawkinson
2002 Mar 11
3
Does OpenSSH 3.x support KRB5 directly?
Just curious. There seems to be an awful lot in the source, but no actual configure option. Please advise. -- Austin Gonyou Systems Architect, CCNA Coremetrics, Inc. Phone: 512-698-7250 email: austin at coremetrics.com "It is the part of a good shepherd to shear his flock, not to skin it." Latin Proverb
2017 Apr 11
0
error allocating core memory buffers (code 22) at util2.c(106) [sender=3.1.2]
...so lost the stack trace I thought I had (inadequate scrollback), so I'm not sure what was going on. But at first blush, it appeared that adding -vvvv made things hang forever. Removing it, and rerunning, it's now happily trucking along and has been for the past hour actually doing work. --jhawk at mit.edu John Hawkinson
2001 Nov 22
1
1.2.26-compat Kerberos support
On Wed, Nov 21, 2001 at 01:41:42PM -0500, John Hawkinson wrote: > auth-krb5.c > auth1.c > compat.c > comapt.h > servconf.c > session.c > session.h > sshconnect1.c > sshd_config why do you need to touch these files? for MIT K5? or for adding back the told ticket passing behaviour? i have no string opinion about whether the AFS/Kerb tickets should be passed
2002 Feb 26
1
logging of which key authenticated?
Hi folks, I was wondering if it were possible to log which key is used to authenticate a user logging in? In our scenario, our client is wanting to use SSH keys to control shared access to Unix accounts, including root. It is obviously possible to add multiple keys into the authorized_keys file, however, it is not possible to see which user/key was actually presented, at a reasonable logging
2013 May 29
2
Patch to discourage unencrypted key generation
>>> configuration holes are the *default* configuration. ssh-keygen >>> creates passphrase frees by default if you simply hit "Enter" a few >>> times, and there is no way I've ever seen for ssh_config to reject >>> them by default when loading local keys or loading them into an >>> ssh-agent. >> >> So where are your
2001 Dec 14
2
PATCH: Kerberos password authentication w/o KDC verification
Folks: We use an old AFS cell with Kerberos 4. Our use of Kerberos 4 is fairly limited; we have never needed to implement rcmd host principals for most of our systems. Indeed, given that Kerberos 4 strips off the domain name portion of a hostname when determining the rcmd instance, we would not be able to do this, since we do have duplicate hostnames in multiple subdomains. For AFS
2018 Jul 12
5
OpenSSH slow on OSX High Sierra (maybe due to libcrypto)?
Hi all. Is anyone else seeing issues with OpenSSH being slow on OSX High Sierra? In the interests of better test coverage I set one up, however the OpenSSH tests take much longer on it than on much older machines with much slower CPUs. It seems to be due to the vendor-supplied libcrypto being about 20x slower at bignum operations than nominally the same version of LibreSSL compiled locally. If
2001 Nov 20
3
problem with AFS token forwarding
Hello, I came across an interoperability problem in OpenSSH 3.0p1 and 3.0.1p1 concerning the AFS token forwarding. That means that the new versions are not able to exchange AFS tokens (and Kerberos TGTs) with older OpenSSH releases (including 2.9p2) and with the old SSH 1.2.2x. In my opinion this problem already existed in Openssh 2.9.9p1, but I have never used this version (I only looked at the