Displaying 20 results from an estimated 1100 matches similar to: "[Bug 1023] Add support for dhgex-sha512"
2013 Jun 09
1
[PATCH] fix mac_computer
The mac_compute() function in openssh calls umac_final() to prepend a tag
to a buffer. Umac_final() calls pdf_gen_xor() on the tag as its final
operation, and as implemented, pdf_gen_xor() assumes an appropriate
alignment for 64-bit operations on its buffer. However, the buffer
is declared in mac_compute() as a static u_char array, and the linker
doesn't guarantee 64-bit alignment for such
2011 Jan 03
1
Tinc improvements
Dear Guus,
I've attached my first git commit to your repository.
It does not contain any new functionalities, but it is a first try to
interact with your git copy.
Could you please verify, if you can push this commit to your repository?
If it works, I'll send you the rest of my work, which contains:
1) some small improvements in logging
(using flags instead of counters)
2) the
2006 Nov 26
2
Fixed zeros in tables
Hello All R Users,
Function loglm() in library MASS can be cajoled to accomodate
structural zeros in a cross-classification table. An example from
Fienberg demonstrates how this can be done.
My question is: Can the function glm() perform the same task? Can
glm() estimate a log-linear model with fixed zeros like loglm()?
Thanks for your help,
Andrew
## Fienberg, The Analysis of Cross-Classified
2015 May 22
3
Weak DH primes and openssh
On Fri, May 22, 2015 at 12:27:01, Darren Tucker <dtucker at zip.com.au> wrote:
> Note that PuTTY does do Diffie-Hellman Group Exchange, but until very
> recently (ie after their 0.64 release) they didn't do the one that was
> actually standardized in RFC4419. OpenSSH recently removed support for
> that non-standard one and as a result we don't offer DHGEX to PuTTY
>
2012 May 05
5
[PATCH] Optionally, allow distros to use openssl for MD5 verification
This has the advantage of being more efficient than the included
routines and allows distros to centralize crypto mainteniance on
a few libraries.
---
configure.ac | 4 +-
m4/ax_check_openssl.m4 | 124 +++++++++++++++++++++++++++++++++++++
src/libFLAC/Makefile.am | 2 +-
src/libFLAC/include/private/md5.h | 8 ++-
src/libFLAC/md5.c
2017 Jun 14
1
LLD support for mach-o aliases (weak or otherwise)
> On Jun 6, 2017, at 4:08 PM, Michael Clark via llvm-dev <llvm-dev at lists.llvm.org> wrote:
>
> Hi Folks,
>
> I’m working on a port of musl libc to macos (arch triple is “x86_64-xnu-musl”) to solve some irreconcilable issues I’m having with libSystem.dylib. I don’t want to use glibc for various reasons, mainly because I want to static link. I have static PIE + ASLR working
2017 Jun 14
4
LLD support for mach-o aliases (weak or otherwise)
> On Jun 14, 2017, at 2:47 PM, Michael Clark via llvm-dev <llvm-dev at lists.llvm.org> wrote:
>
>>
>> On 15 Jun 2017, at 6:50 AM, Louis Gerbarg <lgerbarg at apple.com <mailto:lgerbarg at apple.com>> wrote:
>>
>>>
>>> On Jun 6, 2017, at 4:08 PM, Michael Clark via llvm-dev <llvm-dev at lists.llvm.org <mailto:llvm-dev at
2001 Mar 04
1
bubblebabble patch
Hi,
Here is a patch that adds the possibility of displaying key fingerprints
in the bubblebabble format used by ssh.com ssh implementations.
I hope it makes its way into the source.
--- ./openssh-2.5.1/key_original.h Sun Mar 4 00:47:55 2001
+++ ./openssh-2.5.1/key.h Sun Mar 4 00:57:57 2001
@@ -36,6 +36,17 @@
KEY_DSA,
KEY_UNSPEC
};
+
+enum digest_type {
+ DIGEST_TYPE_SHA1,
+
2013 May 13
8
[Bug 2101] New: Unaligned memory access on sparc in UMAC implemetation
https://bugzilla.mindrot.org/show_bug.cgi?id=2101
Bug ID: 2101
Summary: Unaligned memory access on sparc in UMAC implemetation
Classification: Unclassified
Product: Portable OpenSSH
Version: 6.0p1
Hardware: Sparc
OS: Solaris
Status: NEW
Severity: normal
Priority: P5
Component: ssh
2020 Jul 24
2
Openssl 3
Anyone trying openssl 3 against openssh?
--
Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca
Yahweh, Queen & country!Never Satan President Republic!Beware AntiChrist rising!
https://www.empire.kred/ROOTNK?t=94a1f39b
Put more trust in nobility of character than in an oath. -Solon
2011 Feb 01
1
Cannot authenticate with new Red Hat/Fedora SHA512
RHEL6 and Fedora 14 use an improved password algorithm of SHA512 on a
brand new install of the OS (:$6$ in shadow file).
cat /etc/shadow
user1:$6$<salt>$<password>:15006:0:99999:7:::
I cannot get dovecot to authenticate. I've search for a way to change
the default algorithm in dovecot and found you should use CRYPT but I
don't know what to put in the
2013 Dec 25
1
SHA512-CRYPT scheme fails password verification
Hello,
If I try to use the crypt schemes provided by libc. I fail as follows:
jnikula at jlaptop:~/$ doveadm pw -s SHA512-CRYPT -p 123456
{SHA512-CRYPT}$6$to2umWLDtqvzS8SV$ZGpBeGNKuUN/2HKG6I2BEAt.Gzrz/y.SZDkos2GT2ik8obnp3XCFWfVsKVriJa6jjHULmLIqCSSyaF5YrTH7u.
jnikula at jlaptop:~/$ doveadm pw -t
2014 Dec 06
0
MD5-CRYPT/CRAM-MD5 vs SHA512-CRYPT/PLAIN
On 12/5/14, ML mail <mlnospam at yahoo.com> wrote:
> Hello,
>
> I am wondering which variant is more secure for user authentication and
> password scheme. Basically I am looking at both variants:
>
> 1) MD5-CRYPT password scheme storage with CRAM-MD5 auth mechanism
> 2) SHA512-CRYPT password scheme storage with PLAIN auth mechanism
>
> In my opinion the option 2)
2014 Dec 06
0
MD5-CRYPT/CRAM-MD5 vs SHA512-CRYPT/PLAIN
Am 06.12.2014 um 06:56 schrieb Jan Wide?:
> If you add disable_plaintext_auth=yes ssl=required settings, then
> dovecot will drop authentication without STARTTLS. But damage will be
> done, client will send unencrypted (or in this scenario MD5 or SHA512
> hash) login/password
no, damage will *not* be done
STARTTLS happens in context of connect and *log before* any
authentication is
2015 Jun 04
2
Testing SHA512-CRYPT password hashes with doveadm pw -t fails
Hi,
I use Debian jessie with Dovecot 2.2.13-11.
While writing a script for Horde to change the passwords in my passwd
file I noticed doveadm pw -t fails for SHA512-CRYPT:
# doveadm pw -s SHA1 -p test
{SHA1}qUqP5cyxm6YcTAhz05Hph5gvu9M=
# doveadm pw -t {SHA1}qUqP5cyxm6YcTAhz05Hph5gvu9M= -p test
{SHA1}qUqP5cyxm6YcTAhz05Hph5gvu9M= (verified)
# doveadm pw -s SHA512-CRYPT -p test
2015 Jun 04
0
Testing SHA512-CRYPT password hashes with doveadm pw -t fails
doveadm pw -t
'{SHA512-CRYPT}$6$8FfoioQWQDR/Vuzu$ynKiO/E6Xf4dMvfx2LsP9KQotqy5cEOEppnEh5Hqe1UpCYAgOwSIJlNb0O65fxdYcRZH3gNFQ7ZOM/2kD/R811'
-p test
You have $ in the password, see man-page of shell ...
Am 04.06.2015 um 05:29 schrieb Felix Zielcke:
> oveadm pw -t {SHA512-CRYPT}$6$8FfoioQWQDR/Vuzu$ynKiO/E6Xf4dMvfx2LsP9KQotqy5cEOEppnEh5Hqe1UpCYAgOwSIJlNb0O65fxdYcRZH3gNFQ7ZOM/2kD/R811 -p
2018 Mar 10
0
dovecot sha512-crypt database storage
Hi,
Thanks. That query doesn't return any parse errors but it does say
that it can't save the password.
Any ideas?
Thanks.
Dave.
On 3/10/18, David Mehler <dave.mehler at gmail.com> wrote:
> Hello,
>
> Thanks. Trying that query adapted to my database table and getting an
> error can not save password, any ideas?
>
> When you made your initial database tables how
2018 Mar 11
2
dovecot sha512-crypt database storage
On 2018-03-10 (16:48 MST), David Mehler <dave.mehler at gmail.com> wrote:
>
> Thanks. That query doesn't return any parse errors but it does say
> that it can't save the password.
Are you referencing the right table in your database?
--
It is the business of the future to be dangerous.
2018 Mar 11
0
dovecot sha512-crypt database storage
Hello,
Yes I am referencing my virtual users table.
Other suggestions welcome.
Thanks.
Dave.
On 3/11/18, @lbutlr <kremels at kreme.com> wrote:
> On 2018-03-10 (16:48 MST), David Mehler <dave.mehler at gmail.com> wrote:
>>
>> Thanks. That query doesn't return any parse errors but it does say
>> that it can't save the password.
>
> Are you
2018 Mar 11
1
dovecot sha512-crypt database storage
On Mar 11, 2018, at 10:19, David Mehler <dave.mehler at gmail.com> wrote:
> Other suggestions welcome.
Does the account you are using have access to write the new passwords?> Doe s the command work from the command line or phpmyadmin?
--
My main job is trying to come up with new and innovative and effective ways to reject even more mail. I'm up to about 97% now.