Displaying 20 results from an estimated 28 matches for "ssh_ecdsa_verifi".
Did you mean:
ssh_ecdsa_verify
2016 Nov 16
4
long delay when logging in
I have a CentOS 7 system and when I login with putty or ssh there is a
long delay before I get the password prompt. I ran ssh -v and I found
that it gets up to this:
debug1: ssh_ecdsa_verify: signature correct
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug1: SSH2_MSG_SERVICE_ACCEPT received
and then
2016 Jun 08
5
Problem with Active Directory authentication
Hello --
We are running the 14.04.3 LTS 64-bit release as a virtual machine on a Vmware appliance. The goal of the installation is to create a Samba server that utilizes Active Directory authentication. To that end I utilized the following procedure:
2016 Jun 09
2
Problem with Active Directory authentication
Hello --
The output of the getent passwd command was the following:
<username>@<domainname>:*:##########:##########::/PHShome/<username>:/bin/PHSshell
________________________________
From: Data Control Systems - Mike Elkevizth [mike at datacontrolsystems.com]
Sent: Wednesday, June 08, 2016 6:12 PM
To: Kaplan, Andrew H.
Cc: samba-technical at lists.samba.org; samba at
2016 Jun 10
1
Problem with Active Directory authentication
On Wed, Jun 08, 2016 at 07:46:00PM +0000, Kaplan, Andrew H. wrote:
> Hello --
>
> We are running the 14.04.3 LTS 64-bit release as a virtual machine on a Vmware appliance. The goal of the installation is to create a Samba server that utilizes Active Directory authentication. To that end I utilized the following procedure:
>
>
2016 Jun 09
1
FW: Problem with Active Directory authentication
Hi,
If you have the "template = /bin/bash" option, I think it is more likely
something wrong with the way ssh is trying to authenticate the username.
Do a "getent passwd" and then try "ssh -v '<username exactly as getent
returns it (case sensitive)>'@<fqdn of server>. If it doesn't work, post
the output of what ssh generates.
Mike E.
On Thu,
2016 Jun 09
2
FW: Problem with Active Directory authentication
Hi,
Try using the format <domainname><winbind separator><username> to login
instead of <username>@<domainname>. I'm not sure why, and don't have time
to check into it right now, but ssh doesn't like the
<username>@<domainname> format for me either. The default winbind
separator is a backslash "\", so you'll have to escape it,
2016 Nov 17
0
long delay when logging in
Edit /etc/ssh/sshd_config
Set:
UseDNS no
GSSAPIAuthentication no
Save, restart sshd, try again.
digimer
On 16/11/16 06:07 PM, Larry Martell wrote:
> I have a CentOS 7 system and when I login with putty or ssh there is a
> long delay before I get the password prompt. I ran ssh -v and I found
> that it gets up to this:
>
> debug1: ssh_ecdsa_verify: signature correct
> debug1:
2011 Dec 17
3
[Bug 1961] New: ECDSA memory leak
https://bugzilla.mindrot.org/show_bug.cgi?id=1961
Bug #: 1961
Summary: ECDSA memory leak
Classification: Unclassified
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at
2014 Feb 18
1
[PATCH] verify against known fingerprints
I've just written this patch, it's undergone minimal testing and "works
for me" and I'm after feedback as to acceptability of approach, anything
I should be doing differently for the feature to be acceptable upstream
and what I should be doing about automated testing.
Use-case: you have the host's SSH fingerprints via an out-of-band
mechanism which you trust and want to
2016 Jun 10
2
Problem with Active Directory authentication
On 10/06/16 12:47, Kaplan, Andrew H. wrote:
> Hello --
>
> I started a thread on the list that you suggested in your e-mail, and thank-you for the reference.
>
> Also, I checked the auth.log file on the server, and the following entries were present:
>
> I checked the auth.log file, and the following entries were present:
>
> Jun 10 07:10:50 <samba server>
2016 Jun 08
0
Problem with Active Directory authentication
What does "getent passwd <username>@<domainname>" return on the server for
the login shell. By default a samba AD DC sets the login shell for all
Active Directory user accounts to /bin/false. The only way I've found to
change this, is to override that globally with the "template shell =
/bin/bash" option in smb.conf, which enables it globally for all Active
2016 Jun 09
0
FW: Problem with Active Directory authentication
A thought came to me:
The smb.conf file on the system has the following entry:
template shell = /bin/bash
Would creating a symbolic link with the name PHSshell pointing to the /bin/bash shell solve the problem?
________________________________
From: Kaplan, Andrew H.
Sent: Thursday, June 09, 2016 11:00 AM
To: Data Control Systems - Mike Elkevizth
Cc: samba-technical at lists.samba.org; samba
2016 Jun 10
0
Problem with Active Directory authentication
Hello --
I started a thread on the list that you suggested in your e-mail, and thank-you for the reference.
Also, I checked the auth.log file on the server, and the following entries were present:
I checked the auth.log file, and the following entries were present:
Jun 10 07:10:50 <samba server> sshd[7419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
2016 Jun 09
0
FW: Problem with Active Directory authentication
Hello --
I tried the two methods listed in your e-mail, and unfortunately neither worked.
The connection simply closed, or timed out, after about a minute.
I mentioned the possibility of creating a symbolic link to the bash shell in my previous e-mail,
could that be part of the solution?
Thanks.
________________________________
From: Data Control Systems - Mike Elkevizth [mike at
2015 May 23
2
X11 forwarding not working.
Hi!
I'm having a difficult time getting X11 forwarding to work.
Since I've read the docs completely about this, this must be an SSH bug
which is likely because I'm using Gentoo as the SSH server.
When trying to forward X11 connections, I get
X11 connection rejected because of wrong authentication.
kwrite: cannot connect to X server XXXXXXXXX:10.0
Using command
ssh -Y -p 1111 -4
2016 Jun 10
2
Problem with Active Directory authentication
On 10/06/16 13:46, Kaplan, Andrew H. wrote:
> Hello --
>
> The winbind packages that are installed on the server are the following:
>
> Package Description
> libnss-winbind 4.3.9+dfsg-0ubuntu0.14.04.3 amd64 Samba nameservice integration plugins
> libpam-winbind 4.3.9+dfsg-0ubuntu0.14.04.3 amd64 Windows domain authentication
2016 Jun 10
0
Problem with Active Directory authentication
Hello --
The winbind packages that are installed on the server are the following:
Package Description
libnss-winbind 4.3.9+dfsg-0ubuntu0.14.04.3 amd64 Samba nameservice integration plugins
libpam-winbind 4.3.9+dfsg-0ubuntu0.14.04.3 amd64 Windows domain authentication integration plugin
libwbclient0 4.3.9+dfsg-0ubuntu0.14.04.3 amd64 Samba
2013 Dec 11
4
OpenSSH 6.3p1 Smartcard-Support
Hi there,
has anybody managed to get the eToken Pro Anywhere work with SSH? I'm using the latest SafeNetAuthentication drivers available for Ubuntu 64bit (8.3) and everything is working just fine except for ssh. I can use the eToken for logging in, openvpn, rdestkop, etc. but it seems ssh does not recognize the device properly. The command "ssh -I /usr/lib/libeToken.so.8 user at
2015 Mar 14
3
[Bug 2365] New: openssh client ignores -o Tunnel=ethernet option, creating an IP tunnel device instead of an ethernet tap device
https://bugzilla.mindrot.org/show_bug.cgi?id=2365
Bug ID: 2365
Summary: openssh client ignores -o Tunnel=ethernet option,
creating an IP tunnel device instead of an ethernet
tap device
Product: Portable OpenSSH
Version: 6.6p1
Hardware: amd64
OS: Linux
Status: NEW
2016 Jun 10
0
Problem with Active Directory authentication
Hi,
I have a feeling that Rowland is correct that all the different
authentication methods are interfering with one another. I can say all I
have is winbind and it works fine for me. My relevant pam-auth-update
modules are:
[*] Unix authentication
[*] Winbind NT/Active Directory authentication
[*] Register user sessions in the systemd control group hierarchy
[*] Create home directory on login