Displaying 10 results from an estimated 10 matches for "laatsch".
2008 May 27
6
Openssh + AFS
...in
/afs/rrz.uni-koeln.de/admin/public/openssh-5.0p1-PatchDir/
It implements AFS-Token-passing and Krb5-ticket-passing for protocol-2
(adding X509-cred-passing should be easy).
A flag 'AllowCredPassing' in the ssh config files might increase the
acceptability for that.
Best regards,
Rainer Laatsch
2016 Aug 26
2
krb5support missing in Makefile when configuring --with-krb5=<pathtokrb5> required by newer krb5 versions
See subject. Am I missing here something or is it a bug?
Best regards
Rainer
2008 Feb 15
0
Protocol 2 AfsTokenPassing
Possibly someone might be interested in Protocol 2 AfsTokenPassing.
Best regards
Rainer Laatsch
________________________________ ______________________
E-mail: Laatsch at Uni-Koeln.DE Universitaet zu Koeln
Reg. Rechenzentrum (ZAIK/RRZK)
Fax : (0221) 478-5590 Robert-Koch-Str. 10
Tel : (0221) 478-5582 D-50931 Koeln
== README.openssh-4.7p1+AFS ==
Patches to enhance openssh-4.7p1...
2008 Sep 02
0
Standard SSH credential passing + get AFS PAG + token
These Scripts at location /afs/rrz.uni-koeln.de/wsadmin/contrib/ :
Init-ssh2
krb5gettoken
xauthrc
ssh2
enable credential (krb5 ticket) passing and get you a PAG and AFS token on
subsequent login. This should work with any ssh. NO patches.
Enjoy & send bugs/cents to: Laatsch at Uni-Koeln.DE
Best regards
Rainer Laatsch
2016 Aug 02
2
Configure option '--with-ssh1' breaks openssh-7.3p1
My pc runs Scientific Linux release 6.8 (Carbon),
Kernel 2.6.32-642.3.1.el6.i686,
all patches applied.
After unpacking, running ' -/configure '
(just that, no other params), then
' make; make install DESTDIR=`pwd`/DESTDIR '
and running sshd from there: the call
' DESTDIR/.../bin/ssh host102 '
succeeds ( authentication with id_rsa ; host 102 is localhost
where the new sshd
2016 Aug 03
2
Configure option '--with-ssh1' breaks openssh-7.3p1
On 08/03/16 02:12, Darren Tucker wrote:
> On Wed, Aug 3, 2016 at 7:42 AM, rl <rainer.laatsch at t-online.de> wrote:
> [...]
>> /Data/openssh-7.3p1/DESTDIR/usr/local/sbin/sshd -p 222 -f \n
>> DESTDIR/usr/local/etc/sshd_config
>
> It looks like you have an embedded newline in the config file name
> you're passing to sshd. If that's the case I'm surpr...
2008 Sep 02
1
Authentication w/ key + password
I have read archives about two-factor authentication on this list and
it is interesting and can open up a can of worms. I don't intend on
opening a can of worms or spur debate.
As far as I can tell, authentication to openssh can be performed by
signing a connection request with a private client key & having the
server decrypt the key with the public key.
The other way to authenticate (of
2016 Aug 03
2
Configure option '--with-ssh1' breaks openssh-7.3p1
On 08/03/16 03:19, Darren Tucker wrote:
>
> Yes. Debugging something on a system you can't interact with is hard
> enough without having information withheld.
>
I'll run again and add the relevant unedited texts as attachments.
There is nothing in /var/log/secure.
Also a diff between the config.h 's without and with --with-ssh1 is
attached.
I have a centos-6.7 under
2010 Aug 10
0
Test OK openssh-SNAP-20100810
All tests passed on
Scientific Linux SL release 5.3 (Boron)
Kernel: 2.6.18-164.15.1.el5 #1 SMP Tue Mar 16 18:53:13 EDT 2010 i686 i686
i386 GNU/Linux
Only 2 remarks about 'SUDO not set'.
Many thanks to the developers!
Best regards
R.
2011 Jan 15
0
OPENSSH 5.7: openssh-SNAP-20110115 SUCCESS on Scientific Linux SL release 5.4 (Boron)
make[1]: Leaving directory `/Data/openssh-SNAP-20110115/regress'
all tests passed
root at host103# uname -a
Linux host103.localdomain 2.6.18-194.26.1.el5 #1 SMP Tue Nov 9 12:56:26 EST
2010 i686 athlon i386 GNU/Linux
root at host103# cat /etc/*release*
Scientific Linux SL release 5.4 (Boron)
root at host103# cat /proc/version
Linux version 2.6.18-194.26.1.el5 (brewbuilder at norob.fnal.gov)