Displaying 8 results from an estimated 8 matches for "opiekeys".
Did you mean:
opiekey
2003 Nov 02
1
opie bug or ..?
Hi. I have a question related to freebsd opie implementation.
I am running 4.9-RELEASE and I've tried to setup opie.
*** 1 *** opiepasswd/opiekey
I've added user using `opiepasswd -c "ssa"`
mx2# opiepasswd -c "ssa"
Adding ssa:
Only use this method from the console; NEVER from remote. If you are using
telnet, xterm, or a dial-in, type ^C now or exit with
2003 Sep 17
0
FW: opiekey segfault ... isn't that harmfull? it's setuid root
Hi,
I dunno much about exploiting, but I was wondering about the setuid root
program 'opiepasswd' to use one-time-passwords.
When having a seed of (null) and a sequence of -1, I get a segfault.
Kernel/base:
FreeBSD lama.inet-solutions.be 4.8-RELEASE-p4 FreeBSD 4.8-RELEASE-p4 #0:
Sun Aug 31 21:00:38 CEST 2003
root@lama.inet-solutions.be:/usr/obj/usr/src/sys/LAMA i386
Make.conf:
2004 Jun 22
2
Opieaccess file, is this normal?
Hi,
I'm trying to setup one-time passwords on freebsd5.2.1
>From what I've read so far, if the user is present in opiekeys, the
opieaccess file determines if the user (coming from a specific host or
network) is allowed to use his unix password from this specific network.
As my opieaccess file is empty and the default rule (as mentionned in the
man file) is deny, I should not be able to get an ssh shell with my standa...
2004 Jun 24
0
FW: Opieaccess file, is this normal?
...word required pam_unix.so no_warn
try_first_pass
? just want to point out the I want to keep "unix password authentication"
for the users whose host or network are in opieaccess. "Unix password
authenication" should be disabled for all users present in opiekeys and
whose hosts or network is not present in opieaccess.
2005 Aug 15
2
recompile sshd with OPIE?
Hi,
I'm having trouble getting an answer to the following problem on -questions
- I hope someone here has done something similar and can help.
I'd like to compile support for FreeBSD OPIE into sshd. Presently I have
to use PAM to achieve one-time password support. On a 4.x system I have
in /etc/ssh/sshd_config
ChallengeResponseAuthentication yes
and in /etc/pam.conf
sshd auth
2007 Jul 23
8
Ideas for Webmail/OTP
I want to discuss some problems/enhancements for dovecot in a webmail/otp setup.
For access to an IMAP server like dovecot I see different client types:
a) a "normal" MUA installed in a more or less trusted environment
b) remote access via "webmail" from untrusted environments
For a) I see with dovecot and other IMAP servers no problems, tricky is the setup for b).
If you use
2004 Jun 21
2
Bug#255560: logcheck-database: More Postfix rules
...:alnum:]-]+ postfix/smtpd\[[0-9]+\]: fingerprint=([0-9A-F]{2}:){15}[0-9A-F]{2}$
^\w{3} [ :0-9]{11} [._[:alnum:]-]+ postfix/smtpd?\[[0-9]+\]: Verified: subject_CN=.*, issuer=.*$
^\w{3} [ :0-9]{11} [._[:alnum:]-]+ postfix/smtpd\[[0-9]+\]: OTP unavailable because can't read/write key database /etc/opiekeys: No such file or directory$
^\w{3} [ :0-9]{11} [._[:alnum:]-]+ postfix/smtpd\[[0-9]+\]: [A-Z0-9]+: reject: RCPT from [^[:space:]]+: [45][0-9][0-9] .*$
^\w{3} [ :0-9]{11} [._[:alnum:]-]+ postfix/smtp\[[0-9]+\]: connect to [^[:space:]]+ Connection refused \(port [0-9]+\)$
^\w{3} [ :0-9]{11} [._[:alnu...
2005 Oct 02
11
Repeated attacks via SSH
Everyone:
We're starting to see a rash of password guessing attacks via SSH
on all of our exposed BSD servers which are running an SSH daemon.
They're coming from multiple addresses, which makes us suspect that
they're being carried out by a network of "bots" rather than a single attacker.
But wait... there's more. The interesting thing about these attacks
is that