Displaying 6 results from an estimated 6 matches for "pubkey_authentication".
2002 Jun 26
1
[Fwd: Kerberos buglet in OpenSSH-3.3p1]
Can anyone with Heimdal KrbV verify this?
-------------- next part --------------
An embedded message was scrubbed...
From: Dag-Erling Smorgrav <des at ofug.org>
Subject: Kerberos buglet in OpenSSH-3.3p1
Date: 25 Jun 2002 14:52:10 +0200
Size: 1291
Url: http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20020626/347e123e/attachment.mht
2006 Nov 15
11
OpenSSH Certkey (PKI)
...u_int clen;
+
+ cert = buffer_get_string(m, &clen);
+ key->cert = xstrdup(cert);
+ allowed = options.certkey_authentication &&
+ user_cert_key_allowed(authctxt->pw, key);
+ auth_method = "certkey";
+ break;
+ }
case MM_USERKEY:
allowed = options.pubkey_authentication &&
user_key_allowed(authctxt->pw, key);
@@ -859,7 +870,7 @@
}
static int
-monitor_valid_userblob(u_char *data, u_int datalen)
+monitor_valid_userblob(u_char *data, u_int datalen, u_char *name)
{
Buffer b;
char *p;
@@ -900,7 +911,7 @@
fail++;
} else {
p = buffer_...
2001 Nov 12
4
Please test -current
Could people please test -current? We will be making a release fairly
soon.
-d
--
| By convention there is color, \\ Damien Miller <djm at mindrot.org>
| By convention sweetness, By convention bitterness, \\ www.mindrot.org
| But in reality there are atoms and space - Democritus (c. 400 BCE)
2006 Feb 12
1
sshd double-logging
...board-interactive/pam";
+ auth_method = compat20 ? "keyboard-interactive/pam" :
+ "challenge-response";
if (ret == 0)
sshpam_authok = sshpam_ctxt;
return (0);
@@ -980,17 +981,20 @@ mm_answer_keyallowed(int sock, Buffer *m
case MM_USERKEY:
allowed = options.pubkey_authentication &&
user_key_allowed(authctxt->pw, key);
+ auth_method = "publickey";
break;
case MM_HOSTKEY:
allowed = options.hostbased_authentication &&
hostbased_key_allowed(authctxt->pw,
cuser, chost, key);
+ auth_method = "hostbased&q...
2001 Nov 20
3
problem with AFS token forwarding
Hello,
I came across an interoperability problem in OpenSSH 3.0p1 and 3.0.1p1
concerning the AFS token forwarding. That means that the new versions are
not able to exchange AFS tokens (and Kerberos TGTs) with older OpenSSH
releases (including 2.9p2) and with the old SSH 1.2.2x. In my opinion this
problem already existed in Openssh 2.9.9p1, but I have never used this
version (I only looked at the
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |