similar to: Cannot authenticate with new Red Hat/Fedora SHA512

Displaying 20 results from an estimated 10000 matches similar to: "Cannot authenticate with new Red Hat/Fedora SHA512"

2017 Jul 20
2
Installing rpy2 on Red Hat 6
I need to install rpy2 on RHEL6. The version of R in the 6 repos is 3.0, and rpy2 does not work with that version. I installed R 3.3.3 following the directions here: https://oguya.ch/posts/2017-03-18-building-R-on-rhel-6/. But even with 3.3.3 it's still failing. Using pip it fails with: /usr/local/lib64/R/lib/libR.a(CommandLineArgs.o): could not read symbols: Bad value and installing from
2017 Jul 20
0
Installing rpy2 on Red Hat 6
> On Jul 20, 2017, at 7:53 AM, Larry Martell <larry.martell at gmail.com> wrote: > > I need to install rpy2 on RHEL6. The version of R in the 6 repos is > 3.0, and rpy2 does not work with that version. I installed R 3.3.3 > following the directions here: > https://oguya.ch/posts/2017-03-18-building-R-on-rhel-6/. But even with > 3.3.3 it's still failing. Using pip it
2017 Jul 21
2
Installing R 3.4.0 on Red Hat 6
I am trying to install R 3.4.0 on RHEL6. If I look here is it there: http://mirror.sjc02.svwh.net/fedora-epel/6/x86_64/ I did this: sudo subscription-manager repos --enable rhel-6-server-optional-rpms sudo subscription-manager repos --enable rhel-6-server-extras-rpms wget https://dl.fedoraproject.org/pub/epel/epel-release-latest-6.noarch.rpm rpm epel-release-latest-6.noarch.rpm Which all
2017 Jul 21
2
Installing R 3.4.0 on Red Hat 6
On Fri, Jul 21, 2017 at 11:39 AM, Tom Callaway <tcallawa at redhat.com> wrote: > On 07/21/2017 11:18 AM, Larry Martell wrote: >> I am trying to install R 3.4.0 on RHEL6. If I look here is it there: >> >> http://mirror.sjc02.svwh.net/fedora-epel/6/x86_64/ >> >> I did this: >> >> sudo subscription-manager repos --enable rhel-6-server-optional-rpms
2017 Sep 12
3
Apache 2.2 EOL - what is Red Hat's story for RHEL6?
On 09/12/2017 02:58 PM, Stephen John Smoogen wrote: > On 12 September 2017 at 15:29, Alan McKay <alan.mckay at gmail.com> wrote: >> Hi folks, >> >> I have been googling for a few weeks now and not finding anything. >> Apache 2.2 is EOL at the end of this year. >> >> Has Red Hat announced a plan yet on what they are doing in RHEL6? >> >> I am
2017 Sep 12
5
Apache 2.2 EOL - what is Red Hat's story for RHEL6?
Hi folks, I have been googling for a few weeks now and not finding anything. Apache 2.2 is EOL at the end of this year. Has Red Hat announced a plan yet on what they are doing in RHEL6? I am assuming they will up-version from 6.9 to 6.10 and as part of that upgrade from Apache 2.2 to Apache 2.4 ? thanks, -Alan -- "You should sit in nature for 20 minutes a day. Unless you are busy, then
2017 Sep 12
1
Apache 2.2 EOL - what is Red Hat's story for RHEL6?
On 12 September 2017 at 15:29, Alan McKay <alan.mckay at gmail.com> wrote: > Hi folks, > > I have been googling for a few weeks now and not finding anything. > Apache 2.2 is EOL at the end of this year. > > Has Red Hat announced a plan yet on what they are doing in RHEL6? > > I am assuming they will up-version from 6.9 to 6.10 and as part of > that upgrade from
2010 May 30
2
beta5 builds under RHEL
Hi, beta4 built under RHEL4, RHEL5 and RHEL6 (the latter being the public beta). beta5 now builds only for RHEL5, the other two fail with: strnum.c: In function `str_to_llong': strnum.c:139: error: `LLONG_MIN' undeclared (first use in this function) strnum.c:139: error: (Each undeclared identifier is reported only once strnum.c:139: error: for each function it appears in.) Thanks! --
2012 Jan 03
5
Storing passwords encrypted... bcrypt?
Hi everyone, Was just perusing this article about how trivial it is to decrypt passwords that are stored using most (standard) encryption methods (like MD5), and was wondering - is it possible to use bcrypt with dovecot+postfix+mysql (or posgres)? -- Best regards, Charles
2013 Dec 25
1
SHA512-CRYPT scheme fails password verification
Hello, If I try to use the crypt schemes provided by libc. I fail as follows: jnikula at jlaptop:~/$ doveadm pw -s SHA512-CRYPT -p 123456 {SHA512-CRYPT}$6$to2umWLDtqvzS8SV$ZGpBeGNKuUN/2HKG6I2BEAt.Gzrz/y.SZDkos2GT2ik8obnp3XCFWfVsKVriJa6jjHULmLIqCSSyaF5YrTH7u. jnikula at jlaptop:~/$ doveadm pw -t
2014 Aug 12
3
doveadm pw with SHA512-CRYPT won't roundtrip
Hi, Not sure if this is a PBKAC or not:- root at ds3:/usr/share/postfixadmin# doveadm pw -s SHA512-CRYPT -p password {SHA512-CRYPT}$6$aUgGXP0UshkMj7hY$9JV4yMRsjIe/98CzmglYrMjf.9NJ.FXzxcLE9B0v3doCRUWo2wRncc6hg6VCs0DCUHQbeC/bRDZdGCge/nB/h/ root at ds3:/usr/share/postfixadmin# doveadm pw -t
2015 May 01
1
Fatal: Unknown scheme: SHA512-CRYPT. On a Mac-mini
Running postfix+dovecot+mysql on a mac-mini, and trying to solve this puzzle. Is this a Mac issue?, a MySQL issue? or something I haven't configured in? You can see from the output of the samples shows in the first case, that SHA512-CRYPT seems to be Unknown. The code I used is from a Linux based tutorial on setting up Postfix+Dovecot+MySQL on a site. Everything is generally going ok, apart
2018 Mar 10
3
dovecot sha512-crypt database storage
Hello, I've got dovecot authenticating to a MySQL database. I've got a field varchar(128) called password. Whenever I create a password I use doveadm pw as in: doveadm pw -s sha512-crypt now i'd like to get MySQL to make a dovecot-specific password. My goal is to eventually have roundcube's password plugin working with this MySQL database to change the password. Thanks. Dave.
2015 Jun 04
2
Testing SHA512-CRYPT password hashes with doveadm pw -t fails
Hi, I use Debian jessie with Dovecot 2.2.13-11. While writing a script for Horde to change the passwords in my passwd file I noticed doveadm pw -t fails for SHA512-CRYPT: # doveadm pw -s SHA1 -p test {SHA1}qUqP5cyxm6YcTAhz05Hph5gvu9M= # doveadm pw -t {SHA1}qUqP5cyxm6YcTAhz05Hph5gvu9M= -p test {SHA1}qUqP5cyxm6YcTAhz05Hph5gvu9M= (verified) # doveadm pw -s SHA512-CRYPT -p test
2014 Dec 05
3
MD5-CRYPT/CRAM-MD5 vs SHA512-CRYPT/PLAIN
Hello, I am wondering which variant is more secure for user authentication and password scheme. Basically I am looking at both variants: 1) MD5-CRYPT password scheme storage with CRAM-MD5 auth mechanism 2) SHA512-CRYPT password scheme storage with PLAIN auth mechanism In my opinion the option 2) should be safer although it is using PLAIN auth mechanism. Of course I would always use STARTTLS and
2017 Jul 21
0
Installing R 3.4.0 on Red Hat 6
Hmmm. When I look at the contents of epel-release-latest-6.noarch.rpm, I see: /etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-6 /etc/rpm/macros.ghc-srpm /etc/yum.repos.d/epel-testing.repo /etc/yum.repos.d/epel.repo /usr/share/doc/epel-release-6 /usr/share/doc/epel-release-6/GPL Do you have those .repo files in /etc/yum.repos.d/ ? ~tom On Fri, Jul 21, 2017 at 11:41 AM, Larry Martell <larry.martell at
2011 Nov 15
2
pgadmin3 missing dependencies
I searched the list archives and I found one answer to this which suggested I should install the PG yum repos. I don't like that answer for reasons which follow. I'm running Centos 6.0 freshly installed, and I've decided that with this box I'm sticking as much as possible to just the CentOS repos that go with that release. I figure in particular I do not need any PG features
2014 Dec 06
3
MD5-CRYPT/CRAM-MD5 vs SHA512-CRYPT/PLAIN
On 12/06/2014 02:35 AM, Nick Edwards wrote: > On 12/5/14, ML mail <mlnospam at yahoo.com> wrote: >> Hello, >> >> I am wondering which variant is more secure for user authentication and >> password scheme. Basically I am looking at both variants: >> >> 1) MD5-CRYPT password scheme storage with CRAM-MD5 auth mechanism >> 2) SHA512-CRYPT password
2017 Sep 12
0
Apache 2.2 EOL - what is Red Hat's story for RHEL6?
On Sep 12, 2017, at 1:29 PM, Alan McKay <alan.mckay at gmail.com> wrote: > > I have been googling for a few weeks now and not finding anything. > Apache 2.2 is EOL at the end of this year. > > Has Red Hat announced a plan yet on what they are doing in RHEL6? > > I am assuming they will up-version from 6.9 to 6.10 and as part of > that upgrade from Apache 2.2 to
2017 Sep 13
0
Apache 2.2 EOL - what is Red Hat's story for RHEL6?
> I don't have any official knowledge, but I would suspect that they will > maintain httpd-2.2 throughout the lifetime of RHEL6. Security issues > would be backported. (If older versions of RHEL are any indication) The basic problem is though that there won't be any security fixes for 2.2 How can they back port something that does not exist? Or do you mean you think