search for: laatsch

Displaying 10 results from an estimated 10 matches for "laatsch".

2008 May 27
6
Openssh + AFS
...in /afs/rrz.uni-koeln.de/admin/public/openssh-5.0p1-PatchDir/ It implements AFS-Token-passing and Krb5-ticket-passing for protocol-2 (adding X509-cred-passing should be easy). A flag 'AllowCredPassing' in the ssh config files might increase the acceptability for that. Best regards, Rainer Laatsch
2016 Aug 26
2
krb5support missing in Makefile when configuring --with-krb5=<pathtokrb5> required by newer krb5 versions
See subject. Am I missing here something or is it a bug? Best regards Rainer
2008 Feb 15
0
Protocol 2 AfsTokenPassing
Possibly someone might be interested in Protocol 2 AfsTokenPassing. Best regards Rainer Laatsch ________________________________ ______________________ E-mail: Laatsch at Uni-Koeln.DE Universitaet zu Koeln Reg. Rechenzentrum (ZAIK/RRZK) Fax : (0221) 478-5590 Robert-Koch-Str. 10 Tel : (0221) 478-5582 D-50931 Koeln == README.openssh-4.7p1+AFS == Patches to enhance openssh-4.7p1...
2008 Sep 02
0
Standard SSH credential passing + get AFS PAG + token
These Scripts at location /afs/rrz.uni-koeln.de/wsadmin/contrib/ : Init-ssh2 krb5gettoken xauthrc ssh2 enable credential (krb5 ticket) passing and get you a PAG and AFS token on subsequent login. This should work with any ssh. NO patches. Enjoy & send bugs/cents to: Laatsch at Uni-Koeln.DE Best regards Rainer Laatsch
2016 Aug 02
2
Configure option '--with-ssh1' breaks openssh-7.3p1
My pc runs Scientific Linux release 6.8 (Carbon), Kernel 2.6.32-642.3.1.el6.i686, all patches applied. After unpacking, running ' -/configure ' (just that, no other params), then ' make; make install DESTDIR=`pwd`/DESTDIR ' and running sshd from there: the call ' DESTDIR/.../bin/ssh host102 ' succeeds ( authentication with id_rsa ; host 102 is localhost where the new sshd
2016 Aug 03
2
Configure option '--with-ssh1' breaks openssh-7.3p1
On 08/03/16 02:12, Darren Tucker wrote: > On Wed, Aug 3, 2016 at 7:42 AM, rl <rainer.laatsch at t-online.de> wrote: > [...] >> /Data/openssh-7.3p1/DESTDIR/usr/local/sbin/sshd -p 222 -f \n >> DESTDIR/usr/local/etc/sshd_config > > It looks like you have an embedded newline in the config file name > you're passing to sshd. If that's the case I'm surpr...
2008 Sep 02
1
Authentication w/ key + password
I have read archives about two-factor authentication on this list and it is interesting and can open up a can of worms. I don't intend on opening a can of worms or spur debate. As far as I can tell, authentication to openssh can be performed by signing a connection request with a private client key & having the server decrypt the key with the public key. The other way to authenticate (of
2016 Aug 03
2
Configure option '--with-ssh1' breaks openssh-7.3p1
On 08/03/16 03:19, Darren Tucker wrote: > > Yes. Debugging something on a system you can't interact with is hard > enough without having information withheld. > I'll run again and add the relevant unedited texts as attachments. There is nothing in /var/log/secure. Also a diff between the config.h 's without and with --with-ssh1 is attached. I have a centos-6.7 under
2010 Aug 10
0
Test OK openssh-SNAP-20100810
All tests passed on Scientific Linux SL release 5.3 (Boron) Kernel: 2.6.18-164.15.1.el5 #1 SMP Tue Mar 16 18:53:13 EDT 2010 i686 i686 i386 GNU/Linux Only 2 remarks about 'SUDO not set'. Many thanks to the developers! Best regards R.
2011 Jan 15
0
OPENSSH 5.7: openssh-SNAP-20110115 SUCCESS on Scientific Linux SL release 5.4 (Boron)
make[1]: Leaving directory `/Data/openssh-SNAP-20110115/regress' all tests passed root at host103# uname -a Linux host103.localdomain 2.6.18-194.26.1.el5 #1 SMP Tue Nov 9 12:56:26 EST 2010 i686 athlon i386 GNU/Linux root at host103# cat /etc/*release* Scientific Linux SL release 5.4 (Boron) root at host103# cat /proc/version Linux version 2.6.18-194.26.1.el5 (brewbuilder at norob.fnal.gov)