Displaying 20 results from an estimated 20000 matches similar to: "[Bug 983] Required authentication"
2010 Jan 07
4
[Bug 983] Required authentication
https://bugzilla.mindrot.org/show_bug.cgi?id=983
--- Comment #26 from Paul Sery <pgsery at swcp.com> 2010-01-08 08:09:14 EST ---
The configuration below is incorrect. When using protocol 2, it should
read:
...
RequiredAuthentications2 password
Also, there's no need to specify publickey in conjunction with other
authentication methods because it will always be tried first (as
specified
2009 Jul 31
2
[Bug 983] Required authentication
https://bugzilla.mindrot.org/show_bug.cgi?id=983
Darren Tucker <dtucker at zip.com.au> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |dtucker at zip.com.au
Blocks| |1626
--- Comment #23 from Darren Tucker
2011 Sep 06
16
[Bug 983] Required authentication
https://bugzilla.mindrot.org/show_bug.cgi?id=983
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks| |1930
--- Comment #34 from Damien Miller <djm at mindrot.org> 2011-09-06 10:34:24 EST ---
Retarget unresolved
2008 Jun 13
3
[Bug 983] Required authentication
https://bugzilla.mindrot.org/show_bug.cgi?id=983
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |pgsery at swcp.com
--- Comment #18 from Damien Miller <djm at mindrot.org> 2008-06-13 13:56:12 ---
*** Bug
2006 Apr 17
9
[Bug 983] Required authentication
http://bugzilla.mindrot.org/show_bug.cgi?id=983
------- Comment #7 from dtucker at zip.com.au 2006-04-17 22:00 -------
(From update of attachment 807)
This bit doesn't seem right:
>+ /* Loop until the required authmethods are done */
>+ if (authenticated && options.required_auth1 != NULL) {
>+ if (auth_remove_from_list(&options.required_auth1,
>+
2012 Mar 27
2
[Bug 983] Required authentication
https://bugzilla.mindrot.org/show_bug.cgi?id=983
--- Comment #51 from Petr Lautrbach <plautrba at redhat.com> 2012-03-28 02:35:54 EST ---
Created attachment 2138
--> https://bugzilla.mindrot.org/attachment.cgi?id=2138
fixes of original patch
(In reply to comment #46)
> Created attachment 2096 [details]
> Updated version of original patch.
Fix missing braces around block in
2006 Mar 29
7
sshd config parser
Hi All.
For various reasons, we're currently looking at extending (or even
overhauling) the config parser used for sshd_config.
Right now the syntax I'm looking at is a cumulative "Match" keyword that
matches when all of the specified criteria are met. This would be
similar the the Host directive used in ssh_config, although it's still
limiting (eg you can't easily
2012 Nov 01
5
[Bug 983] Required authentication
https://bugzilla.mindrot.org/show_bug.cgi?id=983
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |ASSIGNED
Assignee|pgsery at swcp.com |djm at mindrot.org
--- Comment #58 from Damien Miller
2009 Apr 06
2
[Bug 1587] New: [man] sshd_config(5) provide examples of keyword 'Match'
https://bugzilla.mindrot.org/show_bug.cgi?id=1587
Summary: [man] sshd_config(5) provide examples of keyword
'Match'
Product: Portable OpenSSH
Version: 5.2p1
Platform: Other
OS/Version: Other
Status: NEW
Severity: enhancement
Priority: P2
Component: Documentation
2005 May 18
0
[Bug 983] Required authentication
http://bugzilla.mindrot.org/show_bug.cgi?id=983
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Severity|normal |enhancement
------- Additional Comments From djm at mindrot.org 2005-05-18 13:20 -------
This is probably going to change
2005 Jun 28
2
more flexible AllowUsers/DenyUsers syntax
Hi,
I hope this is the right place for a feature request.
I'd like to have more flexible AllowUsers/DenyUsers synax.
I am in a situation, where I have machines connected to three
networks (a private, high speed, a public, and a private vpn) and I'd
like to enable root logins only on the private networks. Currently I
see no way of doing this, because there is no way to specify a
2010 Nov 12
1
[Bug 983] Required authentication
https://bugzilla.mindrot.org/show_bug.cgi?id=983
Paul Sery <pgsery at swcp.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #1768|0 |1
is obsolete| |
--- Comment #30 from Paul Sery <pgsery at swcp.com> 2010-11-12
2012 Aug 02
1
[Bug 983] Required authentication
https://bugzilla.mindrot.org/show_bug.cgi?id=983
Petr Lautrbach <plautrba at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #2138|0 |1
is obsolete| |
--- Comment #54 from Petr Lautrbach <plautrba at
2005 Nov 05
3
[Bug 582] Add 'KbdintXORPasswordAuthentication' option.
http://bugzilla.mindrot.org/show_bug.cgi?id=582
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |WONTFIX
------- Comment #2 from djm at mindrot.org 2005-11-06 03:46 -------
2005 Jul 22
0
[Bug 983] Required authentication
http://bugzilla.mindrot.org/show_bug.cgi?id=983
------- Additional Comments From openssh at yihye-beseder.no-ip.com 2005-07-22 18:01 -------
Created an attachment (id=941)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=941&action=view)
Adds "RequireBothPasswordAndPubKey" authorization option to SSHd
I'll attach my patch as well so it exists someplace else besides
2005 May 17
3
feature: RequiredAuthentications
Hi, probably an ignorant question, maybe I'm missing something ...
Is there a way for a sshd server to be able to enforce both
client host key authentication as well as user authentication,
say for roving user-administered laptops.
So a sysadmin can restrict access to allow only client hosts
which can pass the HostbasedAuthentication tests,
whatever the current IP name/address, but still
2015 Jan 09
5
OpenSSH_6.7p1 hostbased authentication failing on linux->linux connection. what's wrong with my config?
I run OpenSSH on linux
@ client
which ssh
/usr/local/bin/ssh
ssh -v
OpenSSH_6.7p1, OpenSSL 1.0.1j 15 Oct 2014
@ server
which sshd
/usr/local/bin/sshd
sshd -v
unknown option -- V
OpenSSH_6.7p1, OpenSSL 1.0.1j 15 Oct 2014
usage: sshd [-46DdeiqTt] [-b bits] [-C connection_spec] [-c host_cert_file]
[-E log_file] [-f config_file] [-g login_grace_time]
2008 Feb 06
2
[PATCH] Out-of-band challenge (OBC) authentication method
This patch (https://bugzilla.mindrot.org/show_bug.cgi?id=1438) creates a
kbdint device that provides a server-based authentication mechanism. The
server generates and emails you a random string when you attempt to
login. You're authenticated if you can correctly answer the challenge.
You can use a regular email account, a pager, cell phone or other email
capable device to receive the
2001 Mar 02
2
Security problem depending on your point of view with OpenSSH 2.5.1p1 related to Password authentication.
I compiled 2.5.1p1 on solaris and linux with PAM support and produced the same problem.
If I set sshd_config to not allow password authentication( PasswordAuthentication no ) and restart sshd.
I then ssh in with password authentication in ssh protocol version 2.
$ ssh -v -2 jenn at billsnet.com
OpenSSH_2.5.1p1, SSH protocols 1.5/2.0, OpenSSL 0x0090600f
debug: Reading configuration data
2008 Jun 09
1
Problem in RSA Key authentication
Hello Damien,
I am using OpenSSH-5.0 on my ARM board. I want to perform RSA
authentication, but server is not accepting the key generated by the
client. I have copied the authorized_keys in the "$HOME/.ssh/" folder
and provided permission (755) to that folder. Please help me how to
solve this problem.
Following is the log from the client
OpenSSH_4.3p2, OpenSSL 0.9.8b 04 May 2006