Displaying 20 results from an estimated 165 matches for "keypairs".
Did you mean:
keypair
2019 Jul 03
3
mail_crypt: multiple keypairs
Hello,
I am testing mail_crypt plugin with per account encryption and wanted to generate a new keypair for an account but noticed that I now end up with 2 keypairs where one is active and the other inactive as you can see below:
$ doveadm mailbox cryptokey list -u email at domain.tld -U
Folder Active Public ID
yes 7b140b4f3d6d68eed2c59259ac5e6f6a280dc82990292dc415b4100d6c797f67
no 1c1dd1c955757da7c19f1eeb6d6c4d0d66e6355baa2d844bc2623052...
2013 Aug 20
1
Unable to use 8192bit keypair for Tinc VPN 1.0.22
Dear All,
I just tried to use 8192bit keypair for Tinc VPN connection. The connection
is unable to build up. After reduce the bit of keypair from 8192bit to
4096bit. Everything is resumed to normal. How large of public/private RSA
keypair can support for TINC VPN 1.0.22 on Windows platform?
Regards,
ERIC
P Please consider your environmental responsibility. Before printing this
e-mail
2024 Oct 21
1
Security of ssh across a LAN, public key versus password
...sh access, it was because the customer changed the default settings. The images we provided were configured to only offer keypair authentication by default; some customers deliberately change the default setting to permit passphrase authentication, and that's when they get hacked. Note that the keypairs they did use were typically generated via the openstack dashboard, which doesn't even add a passphrase to the private key. So, I've seen plenty of evidence that keypairs are much, much better than password auth, even in the very relaxed situation where the keypair is unencrypted by default....
2019 Jul 04
1
mail_crypt: multiple keypairs
??????? Original Message ???????
On Thursday, July 4, 2019 11:17 AM, @lbutlr via dovecot <dovecot at dovecot.org> wrote:
> > Is it possible to delete the inactive keypair? if yes how?
>
> Wouldn?t you then be unable to *unencrypt* previous emails?
That's also what I thought but based on my understand and on the documentation of the "mailbox cryptokey generate"
2003 Mar 12
0
rsync on windows with password keypair
Hello. I am a newcomer to rsync so please forgive me if this question is
dumb. I'm still learning rsync and I didn't find anything on this topic
elsewhere.
Is it possible to run the rsync client on windows with a passworded keypair
using Pageant or SSH Accession? When I attempt to run these commands I
receive errors. I am trying the following:
rsync -e "ssh2 -l myusername -p
2019 Jul 04
0
mail_crypt: multiple keypairs
On 3 Jul 2019, at 06:38, mabi via dovecot <dovecot at dovecot.org> wrote:
> Is it possible to delete the inactive keypair? if yes how?
Wouldn?t you then be unable to encrypt previous emails?
2010 Mar 17
1
Check public/private RSA keypairs
...a_key.priv -pubout
this one will print out a public key in the same format as the public
key stored in the hosts file, i tested it with some clients, and every
private key will generate a pubkey different to the one in the hostfile,
but each of these clients do work in my vpn, so the public/private
keypairs must match.
A second command i found by googling
ssh-keygen -y -f rsa_key.priv
will output something that ist totally different to the original.
openssl rsa -in rsa_key.priv -pubout:
-----BEGIN PUBLIC KEY-----
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC0P8+wFjp+VT/TsDaiDRsTBnpS
Qdkd6OvEnyMJtCux1bKed9o...
2019 Sep 04
2
Mailcrypt plugin private password
Do I have to replace the "password" part with the actual password or can I just copy it like that?
Will dovecot create the keypair automatically or do I have to use doveadm?
4. Sep. 2019, 08:33 von aki.tuomi at open-xchange.com:
>
>
>
> On 4.9.2019 9.21, **** **** via dovecot wrote:
>
>> Hello there,
>>
>> is there a way to make the
2009 Jan 20
1
OpenSSH private key encryption: time for AES?
Hi, all.
So, in reviewing my OpenSSH keypairs and evaluating the size my RSA keys
should be, i realized that, if i update my 2048-bit keypairs to 4096
bits, it really doesn't matter that much, because they're still
only encrypted with 3DES, which provides an effective 112 bits of
symmetric encryption strength:
$ head -4 ~/.ssh/id_...
2009 Jan 22
0
Unintended key info disclosure via ForwardAgent?
...the installed default, ~/.ssh/config doesn't exist.
Access is via ~/.ssh/authorized_keys only.
remote[g][n] - remote internet hosts [generally untrusted]
ssh[d]_config are the installed default, ~/.ssh/config doesn't exist.
Access is via ~/.ssh/authorized_keys only.
Policy prevents keypairs sitting on the disks of any host except
for ws[g][n]. Therefore, they are not there to be selectable with:
IdentityFile and IdentitiesOnly
However, they are loaded in ws[g][n]'s agent. So hopping around like
this works fine because ForwardAgent is set by default everywhere:
wsa1 -> locala...
2019 Sep 04
1
Mailcrypt plugin private password
Is any of the password schemes supported or is there a reason you chose pkcs5?
4. Sep. 2019, 08:45 von aki.tuomi at open-xchange.com:
>
> It should pick up the password used by the user, there is a caveat here though. The keypair is created on first use, so password will be initialized to empty string going thru pkcs5. This is slightly inconvenient.
>
>
> To avoid
2020 Jan 02
4
u2f seed
In the u2f protocol, my understanding is in the normal case, the web browser seeds the keypair process with the hostname of the remote server. In the case of ssh, the hostname is probably not what I would want to do. But the u2f protocol seems to have a way to handle this. It just needs to be exposed to the user. The content of the private keyfile in ssh is generated somehow. Where is that done?
2012 Feb 27
0
Article on Fingerprinting Public/Private Keypairs
I have published the preview of a "hints and tips" article for the
upcoming print edition of Secure Computing Magazine (Australia) on
OpenSSH Public/Private Key Fingerprinting, including "BubbleBabble"
encoding and the ASCII ?randomart image?, at
http://cmlh.id.au/tagged/openssh
--
Regards,
Christian Heinrich
http://cmlh.id.au/contact
2019 Jun 09
2
OpenSSH forcing the signature to SHA1.
Hello folks,
I am new here, so please be gentle :), and any help will be appreciated.
Essentially what I am trying to do is, to use Jsch ( the java
implementation of SSH client). it has support for Public key based
authentication.
Since there is a requirement for FIPS enablement, we are trying to use the
Algorithm SHA256withRSA, instead of SHA1withRSA.
When the code tries to verify the
2019 Dec 31
2
u2f seed
When using openssh with a u2f key, you generate a key via:
ssh-keygen -t ecdsa-sk
Each time you run it, it gives a different key pair. (Randomly seeming).
A differently generated key pair is not valid with the first's public key.
All good so far, but you run into a problem if:
You generate a keypair (A).
You register your public key for (A) on a bunch of ssh servers.
You take
2024 Oct 21
1
Security of ssh across a LAN, public key versus password
On Mon, Oct 21, 2024 at 08:50:44PM +0000, Tim Rice via openssh-unix-dev wrote:
> Hi Chris,
>
> > What do you mean by "keypair authentication"?
>
> That's the authentication you use when you have ssh-keygen provide you
> with a private key and a public key, and distribute the public key to all
> the different authorized_keys files.
>
But he says not to
2023 Jul 07
1
Subsystem sftp invoked even though forced command created
On 06.07.23 23:37, MCMANUS, MICHAEL P wrote:> So changing the forced
command as stated will break the application. I
> would need to create a test bed to simulate the listener rather than
> use the server as is, where is. That may produce false or misleading
> results.
Since the forced command is tied to the specific keypair in the
authorized_keys, you could
-- test with a different
2024 Oct 21
7
Security of ssh across a LAN, public key versus password
I have a small LAN at home with nine or ten systems on it running
various varieties of Linux. I 'do things' on the LAN either from my
dekstop machine or from my laptop, both run Xubuntu 24.04 at the
moment.
There's a couple of headless systems on the LAN where login security
is important to me and I've been thinking about the relative merits of
password and public-key
2008 May 14
1
Possible weak keys generated by tinc on Debian (and derivates) due to a security bug in Debian's OpenSSL packages
Hello,
For those who run tinc on Debian or Debian-based distributions like
Ubuntu and Knoppix, be advised that the following security issue affects
tinc as well:
http://www.debian.org/security/2008/dsa-1571
In short, if you generated public/private keypairs for tinc between 2006
and May 7th of 2008 on a machine running Debian or a derivative, they may
have been generated without a properly seeded random number generator.
Please ensure you have updated your OpenSSL packages and regenerate all
suspect keypairs. Do not forget to restart tinc.
If you hav...
2008 May 14
1
Possible weak keys generated by tinc on Debian (and derivates) due to a security bug in Debian's OpenSSL packages
Hello,
For those who run tinc on Debian or Debian-based distributions like
Ubuntu and Knoppix, be advised that the following security issue affects
tinc as well:
http://www.debian.org/security/2008/dsa-1571
In short, if you generated public/private keypairs for tinc between 2006
and May 7th of 2008 on a machine running Debian or a derivative, they may
have been generated without a properly seeded random number generator.
Please ensure you have updated your OpenSSL packages and regenerate all
suspect keypairs. Do not forget to restart tinc.
If you hav...