Displaying 10 results from an estimated 10 matches for "keydata".
Did you mean:
key_data
2008 Apr 03
3
[Bug 971] New: zfs key -l fails after unloading (keyscope=dataset)
...0
DEBUG: keysource="passphrase,prompt"
Enter passphrase for ''tank/enc'':
Enter again:
salt==0
salt==3731736994759854399
outkey
(1081232)=b0d7586016db505e3ae4be3dc32f3f270a22f4ce17ef8d44336b4e1f4fabf14
zic_key (1081232)
bash-3.2# zfs key -u tank/enc
salt= 0
keyscope= 0
keydata=
keysource=
dataset name=tank/enc
bash-3.2# zfs key -l tank/enc
Enter passphrase for ''tank/enc'':
salt==3731736994759854399
salt==3731736994759854399
outkey
(1064848)=b0d7586016db505e3ae4be3dc32f3f270a22f4ce17ef8d44336b4e1f4fabf14
zic_key (1064848)
salt= 0
keyscope= 0
keydata=b0d7...
2004 Jun 11
2
[Bug 454] SSH doesn't consider distinguish ports for host-key verification
...tp://bugzilla.mindrot.org/show_bug.cgi?id=454
------- Additional Comments From robbat2 at gentoo.org 2004-06-11 15:34 -------
will this ever be implemented, or is it waiting for somebody to send in code
for it?
existing $HOME/.ssh/known_hosts file has the following format:
'host keytype keydata'
where host is a either an IP or a name that resolves to the IP of the machine
in question.
/etc/ssh/ssh_known_hosts has the following format [according to ssh(1)]:
'host[,host]* keydata [comment]*'
since we need to support IPv6 addresses, we cannot use a ':' as the
address/p...
2007 Sep 12
1
sftp-server only in subdir possible?
...to allow access to only one
directory of an existing user (that may not login) via sftp-server and
authorized_keys file using the extended syntax
command="/usr/lib/openssh/sftp-server --root
/data/exchange",no-port-forwarding,no-agent-forwarding,no-X11-forwarding,no-pty
ssh-rsa AAA...keydata
Is something like that already possible, is there a better solution?
If not, how much effort for me would it be to implement it? I've already
got the ubuntu sources and looked into the code a little bit. Is the
chroot syscall after opening the root directory sufficient to make it
work? Nev...
2015 Jun 30
3
how is the sha fingerprint generated?
% cat ext_rsa.pub| sed -r 's/.*(AAAA[^ ]+).*/\1/' | sha256sum
~/.ssh swlap1
d4bf8b06f2d9d9af7a11583a5367205ed310a84f0dee68d062e2ddca1e85c3ff -
% ssh-keygen -lf ext_rsa.pub
~/.ssh swlap1
8192 SHA256:FgrfxmdjTM/j4wwRa7nVdPSUaJdqHYMJtJ6aciPl9ug swilson at swlap1 (RSA)
Why do those differ and how would i generate the equivalent (mainly
just curious)? I've also tried base64 and a
2000 Oct 13
1
question about ssh / security
I've been using ssh for a while now (both fsecure and openssh), but am
not an expert on security. I was wondering whether the following is
secure:
I create a key pair, trusted & trusted.pub
I run sshd on a server (no telnet, rsh or other services). I create a
user "guest", and put "trusted.pub" in my authorized file. I give away
"trusted" (the private key)
2008 Sep 11
3
ZFS Crypto [Prelim] Codereview
...y persistent, appropriate, converted, value:
84 * keystatus is partialy persitent and partially temporary.
86 * If the on disk state is defined we return the appopriate "in memory"
131 * The userland passphrase was convered to a key using PKCS#5 PBE
143 * zic_keydata is the PIN valule
Period needed at end of line 119 (to avoid run-in with line 120):
119 * The size of the keydata struct element is hardcoded at 1k
120 * this is the same as the largest PIN that the crypto framework
------------------------------------------------------------------
--
This me...
2017 Feb 11
2
[RFC][cifs-utils PATCH] cifs.upcall: allow scraping of KRB5CCNAME out of initiating task's /proc/<pid>/environ file
...;
+ ccache = get_existing_cc(env_cachename);
/* Couldn't find credcache? Try to use keytab */
if (ccache == NULL && arg.username != NULL)
ccache = init_cc_from_keytab(keytab_name, arg.username);
@@ -959,6 +1094,7 @@ out:
SAFE_FREE(arg.ip);
SAFE_FREE(arg.username);
SAFE_FREE(keydata);
+ SAFE_FREE(env_cachename);
syslog(LOG_DEBUG, "Exit status %ld", rc);
return rc;
}
--
2.9.3
2017 Feb 15
5
[cifs-utils PATCH v3 0/4] cifs.upcall: allow cifs.upcall to scrape cache location initiating task's environment
Third respin of this series. Reordered for better safety for bisecting.
The environment scraping is now on by default, but can be disabled with
"-E" in environments where it's not needed.
Also, I've added a patch to make cifs.upcall drop capabilities before
doing most of its work. This may help reduce the attack surface of the
program.
Jeff Layton (4):
cifs.upcall: convert
2017 Feb 14
3
[PATCH v2 0/2] cifs.upcall: allow cifs.upcall to grab $KRB5CCNAME from initiating process
Small respin of the patches that I posted a few days ago. The main
difference is the reordering of the series to make it do the group
and grouplist manipulation first, and then the patch that makes
it grab the KRB5CCNAME from the initiating process.
I think the code is sound, my main question is whether we really
need the command-line switch for this. Should this just be the
default mode of
2017 Feb 15
5
[cifs-utils PATCH v3 0/4] cifs.upcall: allow cifs.upcall to scrape cache location initiating task's environment
Apologies for v3 series, I had some extra patches in there. This is
the one that should have been sent. Relabeled as v4 for clarity.
Third respin of this series. Reordered for better safety for bisecting.
The environment scraping is now on by default, but can be disabled with
"-E" in environments where it's not needed.
Also, I've added a patch to make cifs.upcall drop