Displaying 20 results from an estimated 413 matches for "preauthed".
Did you mean:
preauth'd
2015 Apr 07
2
OpenSSH 6.6.x sends invalid SSH_MSG_USERAUTH_INFO_REQUEST
Darren Tucker <dtucker at zip.com.au> writes:
>That's a vendor-modified version of OpenSSH. Assuming it corresponds to
>what's in FreeBSD head, there's about a thousand lines of changes.
Ugh.
>Can you reproduce the problem with an unmodified version from openssh.com?
>Failing that, can you get the server-side debug output from a failing
>connection (ie
2015 Jul 24
3
Cisco vs. 6.9
> Many aging ciphers, hashes, and key exchanges are in the process of being
> retired. <1kbit Diffie Hellman moduli have been removed as well in 6.9, I
> believe.
>
> If the Ciscos rely on <1kbit DH moduli or SHA1/MD5 hash based proposals to
> work, that could be your problem.
We did not update the moduli file.
> A comparison of the two versions' output from:
2023 Jun 30
1
Subsystem sftp invoked even though forced command created
On 30/06/2023 09:56, Damien Miller wrote:
> It's very hard to figure out what is happening here without a debug log.
>
> You can get one by stopping the listening sshd and running it manually
> in debug mode, e.g. "/usr/sbin/sshd -ddd"
Or starting one in debug mode on a different port, e.g. "-p99 -ddd"
2014 Dec 23
2
chaining AUTH methods -- adding GoogleAuthenticator 2nd Factor to pubkey auth? can't get the GA prompt :-/
On Tue, 23 Dec 2014, Dmt Ops wrote:
> testing goole-authenticator's standalone functionality, it
>
> > cd google-authenticator/libpam/
> > ./demo
> Verification code: 123456
> Login failed
> Invalid verification code
> >
>
> fails with an INVALID code, and
>
> > ./demo
> Verification code:
2015 Jul 23
3
Cisco vs. 6.9
After upgrading a Linux system from OpenSSH 6.7 to 6.9, Cisco
switches/routers can no longer scp config files to/from the system. The
last debug entry before the Cisco device closes the connection is "debug1:
server_input_channel_open: confirm session". The next line is "Connection
closed by x.x.x.x". Anyone else seen this or know of a fix? The Cisco
device gives
2014 Dec 23
3
chaining AUTH methods -- adding GoogleAuthenticator 2nd Factor to pubkey auth? can't get the GA prompt :-/
On Sun, Dec 21, 2014 at 5:25 PM, Damien Miller <djm at mindrot.org> wrote:
> On Fri, 19 Dec 2014, Dmt Ops wrote:
>
> > I added an EXPLICIT
> >
> > AuthenticationMethods publickey,keyboard-interactive
> > + UsePam yes
> >
> > to sshd_config. Now, at connect attempt I get
> >
> > Password:
> > Verification code:
> >
2020 Jul 07
3
libssh2 is hanging during a file transfert
I'm trying to send data to a server with openssh 7.9p1, but it's hanging
somewhere.
the client stop at the line :
Jul 7 11:52:16 TOTO sshd[19553]: debug3: channel 0: will not send data
after close
and after 5 minutes the client closes the connection, why ?
This is the trace of the server openssh : ( DEBUG3 level)
Jul 7 11:52:15 TOTO sshd[31175]: debug3: fd 6 is not O_NONBLOCK
Jul
2015 Feb 28
2
SAP-2015-3-1 issues
On Sun, Mar 01, 2015 at 03:23:04AM +1100, Damien Miller wrote:
>
>
> On Sat, 28 Feb 2015, The Doctor wrote:
>
> > BSD/OS issues
> >
> > with 1.0.2a dev
>
> Thanks for testing.
>
You are welcome.
> > make tests
> >
> > regress/netcat.c:656: `on' undeclared (first use in this function)
> > regress/netcat.c:656: (Each
2017 Jan 19
4
Client fails kex after c38ea634893a1975dbbec798fb968c9488013f4a
I have a Putty variant that works well with openSSH up until 7.4. After
git bisecting I found that after the application of
c38ea634893a1975dbbec798fb968c9488013f4a the client fails with host key
mismatch. The commit in question appears to remove vestiges of ssh-1
support but my client is using 2.0. I am trying to work out what in that
commit would lead to the symptoms. I have been through the
2014 Dec 19
2
chaining AUTH methods -- adding GoogleAuthenticator 2nd Factor to pubkey auth? can't get the GA prompt :-/
I added an EXPLICIT
AuthenticationMethods publickey,keyboard-interactive
+ UsePam yes
to sshd_config. Now, at connect attempt I get
Password:
Verification code:
Password:
Verification code:
Password:
...
I.e.,
It's asking for Password, not accepting pubkey
AND
when given the password (which is correct), and the GA VerificationCode, it
simply repeats the credentials request.
2014 Mar 27
1
AIX SFTP with chroot : conection closed without error message
Hello,
I'm trying to setup a chroot for one user on my AIX 5.2 system
I have tried with openssh 5.0 (don't know where it comes from) and as it
didn't work, I have downloaded and compiled the current version (6.6p1)
When I connect, password is checked, chroot is done, sftp subsystem is
accepted, but I get disconnected without any error
Below is all can say about my config (after
2014 May 25
2
Samba 4 / Kerberos / ssh
I try to get Samba 4 with ssh running.
I found in the Script from Matthieu Patou tot he sysvol sync the follwing intresting line.
---
kinit -k -t /etc/krb5.keytab `hostname -s | tr "[:lower:]" "[:upper:]"`\$
rsync -X -u -a $dc_account_name\$@${dc}.${domain}:$SYSVOL $STAGING
---
when i understand correct he uses the domain controller service principle to connect to the
2024 Jul 28
1
SSH time increased significantly after upgrade to OpenSSH 9.6p1
Team,
We upgraded sshd in our product from OpenSSH 8.6 to OpenSSH 9,.6.
After the upgrade, clients are seeing significant increase in time to
do ssh to the listener. Normally, a single ssh does not matter much
but some of our workflows involve about 3000 to 4000 ssh connect and
close and this is hitting us hard,
I enabled logging on the server side. I see the most of the increase
is here in
2016 Oct 20
2
Custom PAM module not working correctly
Hello,
I've developed a custom PAM module which only allows a user to
authenticate to the server only if another user of the same machine
also authenticates succesfully. It's currently a simple module which
also works as a PAM aware application since it authenticates each user
with PAM itself. Both the pamtester utility and su can use this module
correctly. However, when I try to use
2012 Nov 23
1
Public Key Authentication
Hi,
I wonder, how can i use openssh Public key authentification with
ActivCard pkcs11 x509 certificate store and login to only my account
reading/using username provided from certificate DN, or principal
name,friendly name ?
b111887 and e411617 is administrator on this os. I have rights to put
e411617 pub keys to b111887 home folder authorized keys. And because
openssh ask's me to provide
2018 Jul 17
2
root can login to console but not via ssh
Hi,
I built OpenSSH 7.7p1-1 to try to include some security fixes for an old OS
version (SLES 10). We use a special PAM module for root to allow us to
provide auto-expiring passwords. There is, however, one root password that
should always work. root can login just fine on the console, which I assume
means that the PAM module is working correctly because I can use both the
always should work
2017 Jun 06
10
[Bug 2727] New: ssh_dispatch_run_fatal: Connection to 127.0.0.1 port 8002: message authentication code incorrect
https://bugzilla.mindrot.org/show_bug.cgi?id=2727
Bug ID: 2727
Summary: ssh_dispatch_run_fatal: Connection to 127.0.0.1 port
8002: message authentication code incorrect
Product: Portable OpenSSH
Version: 7.5p1
Hardware: ix86
OS: Linux
Status: NEW
Severity: major
Priority: P5
2014 May 28
1
sftp session disconnects right after passwd enter
Greetings All,
I have a ssh server which allows sftp connections from the Internet
while ssh connections from within the local net, here is the config:
Code:
Port 11111
Port 11113
Protocol 2
LogLevel DEBUG
2024 Jun 19
1
An Analysis of the DHEat DoS Against SSH in Cloud Environments
On Tue, 18 Jun 2024, Joseph S. Testa II wrote:
> In the upcoming v9.8 release notes I see "the server will now block
> client addresses that repeatedly fail authentication, repeatedly
> connect without ever completing authentication or that crash the
> server." Has this new PerSourcePenalties config directive been tested
> against the DHEat attack?
Not explicitly but
2024 Jun 19
1
An Analysis of the DHEat DoS Against SSH in Cloud Environments
On Wed, Jun 19, 2024 at 02:10:30PM +1000, Damien Miller wrote:
> On Tue, 18 Jun 2024, Joseph S. Testa II wrote:
>
> > In the upcoming v9.8 release notes I see "the server will now block
> > client addresses that repeatedly fail authentication, repeatedly
> > connect without ever completing authentication or that crash the
> > server." Has this new