Displaying 20 results from an estimated 10000 matches similar to: "[Bug 811] locked /etc/shadow password prefix on linux"
2006 Sep 30
1
Announce: X.509 certificates support version 5.5.1 in OpenSSH 4.4p1
Hi All,
The version 5.5.1 of "X.509 certificates support in OpenSSH" is ready for download.
On download page http://roumenpetrov.info.localhost/openssh/download.html#get_-5.5.1
you can found diff for OpenSSH versions 4.4p1.
What's new:
* specific diff of 5.5 for OpenSSH 4.4p1
Because of OpenSSH source code changes, like include statements and new server
option
2003 Jun 26
7
[Bug 606] sshd [-t] should warn when cannot create pid file
http://bugzilla.mindrot.org/show_bug.cgi?id=606
Summary: sshd [-t] should warn when cannot create pid file
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: Linux
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo: openssh-bugs at mindrot.org
2003 Jun 26
6
[Bug 605] make install don't create piddir
http://bugzilla.mindrot.org/show_bug.cgi?id=605
Summary: make install don't create piddir
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: Build system
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2015 Dec 07
2
OpenSSH FIPS 140-2 support using OpenSSL FIPS modules?
Thanks Roumen.
I have few more questions below:
1. What version of OpenSSH can the patch be applied to? What branch should
I check out the patch?
2.
>Impact is not only for source code. Build process has to be updated as
well. Red Hat is based on "fipscheck".
What build process should be changed? What is fipscheck?
3. My understanding any application (such as OpenSSH) which need
2011 Sep 08
2
Announce: X.509 certificates support v7.0 for OpenSSH version 5.9p1
Hi All,
Version 7.0 of "X.509 certificates support in OpenSSH" is ready for
immediate download.
This version allow client to use certificates and keys stored into
external devices. The implementation is based on openssl dynamic engines.
For instance E_NSS engine ( http://developer.berlios.de/projects/enss )
will allow you to
use certificates and keys from Firefox, SeaMonkey,
2006 Apr 14
3
Am I doing this right?
Hi everyone,
I am following along with the book and branched out a bit to try some
stuff on my own. I''ve been working on is a basic user management system
- create a user, log in, log out, update your account, that sort of
thing. I created a password changer that compares the old password
(oldpw) against what''s currently in the database, then updates that
record with the
2016 Aug 01
2
OpenSSH 7.3p1 can't be build on Solaris 10
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
The same result without CFLAGS:
configure:17300: checking for mblen
configure:17356: gcc -o conftest -g -O2 -Wall -Wpointer-arith
-Wuninitialized -Wsign-compare -Wformat-security
-Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result
-fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset
-fstack-protector-strong -fPIE
2018 Mar 24
5
Redirected folders no longer working correctly
I have a new problem. I'm currently running Samba4 4.4.16 as an AD/DC. I've been running this
AD/DC for several years now. I am using redirected folders. Up to now, domain users logging
onto any domain member Windows workstation would get their desktop. Recently I discovered that
users now only get their desktop on their "usual" workstation, and the Desktop Target is in
fact
2015 Dec 07
2
OpenSSH FIPS 140-2 support using OpenSSL FIPS modules?
Thanks Roumen.
>Lets assume that application use OpenSSL FIPS validated module. FIPS mode
is activated in openssl command if environment variable OPENSSL_FIPS is
set. Similarly I use OPENSSL_FIPS environment variable to activate FIPS
mode. Code will call FIPS_mode_set(1) if crypto module is not FIPS mode.
Did you mean the FIPS patched OpenSSH server and client (such as
ssh-keygen) always
2003 Jun 27
2
[Bug 570] configure --disable-FEATURE fix
http://bugzilla.mindrot.org/show_bug.cgi?id=570
openssh at roumenpetrov.info changed:
What |Removed |Added
----------------------------------------------------------------------------
Severity|minor |normal
------- Additional Comments From openssh at roumenpetrov.info 2003-06-27 21:46 -------
When somebody explicitly use
2012 May 25
2
Announce: X.509 certificates support v7.2 for OpenSSH version 6.0p1
Dear All,
X.509 certificates support for OpenSSH version 6.0p1 was published.
I brief new version include :
- support for Android platform;
- engine implementation is now considered stable;
- various regression test improvements including fixes for OpenSSL FIPS
enabled 1.0.1 stable release and korn shell
Yours sincerely,
Roumen Petrov
--
Get X.509 certificates support in OpenSSH:
2003 Sep 17
7
[Bug 650] fix for build problem on IRIX 6.5
http://bugzilla.mindrot.org/show_bug.cgi?id=650
Summary: fix for build problem on IRIX 6.5
Product: Portable OpenSSH
Version: 3.7p1
Platform: MIPS
OS/Version: IRIX
Status: NEW
Severity: normal
Priority: P2
Component: Build system
AssignedTo: openssh-bugs at mindrot.org
ReportedBy: koenig at
2008 Mar 10
1
Benefits of OpenSSH X.509 over key based authentication?
Hi,
I have some observations regarding the X.509 patch developed by Roumen
Petrov for OpenSSH available at http://roumenpetrov.info/openssh/ , I don't
understand some things here like
1. When certificate based authentication of the client is desired,
shouldn't it be something like what mod_ssl does in Apache where u have a CA
certificate at the server, and then the client
2003 May 19
1
[Bug 570] configure --disable-FEATURE fix
http://bugzilla.mindrot.org/show_bug.cgi?id=570
Summary: configure --disable-FEATURE fix
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: Linux
Status: NEW
Severity: minor
Priority: P2
Component: Build system
AssignedTo: openssh-bugs at mindrot.org
ReportedBy: openssh
2015 Mar 03
2
configure and have crypt or DES_crypt
Hello,
With current portable master source tree HAVE_CRYPT and HAVE_DES_CRYPT
are not defined.
It seems to me this is regression introduced with implementation of
configure options --with-openssl.
Impacted code is in xcrypt.c:
...
# if defined(WITH_OPENSSL) && !defined(HAVE_CRYPT) &&
defined(HAVE_DES_CRYPT)
# include <openssl/des.h>
# define crypt DES_crypt
# endif
...
2003 Feb 20
3
[Bug 14] Can't change expired /etc/shadow password without PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=14
dtucker at zip.com.au changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #215 is|0 |1
obsolete| |
------- Additional Comments From dtucker at zip.com.au 2003-02-20 20:51 -------
2003 Apr 14
1
[Bug 14] Can't change expired /etc/shadow password without PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=14
dtucker at zip.com.au changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |ASSIGNED
------- Additional Comments From dtucker at zip.com.au 2003-04-15 09:57 -------
Patch against 3.6.1p1 now available. No
2003 Jan 09
7
[Bug 14] Can't change expired /etc/shadow password without PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=14
------- Additional Comments From dtucker at zip.com.au 2003-01-09 23:17 -------
Created an attachment (id=199)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=199&action=view)
Implement password change via /bin/passwd in session.
openssh-passexpire10.patch:
* Implementes shadow and AIX password expiry.
* Adds general expire_message
2004 Feb 07
14
[Bug 14] Can't change expired /etc/shadow password without PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=14
dtucker at zip.com.au changed:
What |Removed |Added
----------------------------------------------------------------------------
OtherBugsDependingO| |793
nThis| |
------- You are receiving this mail because: -------
You are on the CC list for
2003 Aug 24
2
[Bug 14] Can't change expired /etc/shadow password without PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=14
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
OtherBugsDependingO| |627
nThis| |
------- You are receiving this mail because: -------
You are on the CC list for the