similar to: [Bug 1282] Log which key used for authentication

Displaying 20 results from an estimated 20000 matches similar to: "[Bug 1282] Log which key used for authentication"

2007 Jun 12
3
[Bug 1282] Log which key used for authentication
http://bugzilla.mindrot.org/show_bug.cgi?id=1282 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |WORKSFORME CC|
2008 May 22
6
[Bug 1468] New: sshd does not log failed attempts using key-based authentication only
https://bugzilla.mindrot.org/show_bug.cgi?id=1468 Summary: sshd does not log failed attempts using key-based authentication only Classification: Unclassified Product: Portable OpenSSH Version: 5.0p1 Platform: ix86 OS/Version: Linux Status: NEW Severity: security Priority: P2
2007 Jan 03
0
asterisk sip peer/user matching methods for authentication backwards?
Take an example where there is two sip users defined in sip.conf as follows; [peer1] Host=192.168.1.1 ... [peer2] Host=dynamic Secret=password ... [Peer3] Config not relevant ... The intention is to accept calls from peer1 without authentication (ip address authentication only), but require authentication from peer2 If by chance a SIP invite comes "From"
2006 Mar 08
4
[Bug 1172] [PATCH] Restrict public key authentication to scp access only
http://bugzilla.mindrot.org/show_bug.cgi?id=1172 Summary: [PATCH] Restrict public key authentication to scp access only Product: Portable OpenSSH Version: 4.3p2 Platform: All OS/Version: Linux Status: NEW Keywords: patch Severity: enhancement Priority: P2 Component: scp
2007 Nov 27
2
[Bug 1394] New: SCP used to overwrite key
https://bugzilla.mindrot.org/show_bug.cgi?id=1394 Summary: SCP used to overwrite key Classification: Unclassified Product: Portable OpenSSH Version: 4.7p1 Platform: Other OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: scp AssignedTo: bitbucket at mindrot.org
2007 May 06
1
[Bug 1286] SFTP keeps reading input until it runs out of buffer space
http://bugzilla.mindrot.org/show_bug.cgi?id=1286 thuejk at gmail.com changed: What |Removed |Added ---------------------------------------------------------------------------- OS/Version|Linux |All Keywords| |low-hanging-fruit ------- You are receiving this mail because: ------- You are
2006 Aug 24
6
[Bug 1221] Banner only suppressed at log level = QUIET (used to be at log level < INFO)
http://bugzilla.mindrot.org/show_bug.cgi?id=1221 Summary: Banner only suppressed at log level = QUIET (used to be at log level < INFO) Product: Portable OpenSSH Version: 4.3p2 Platform: All OS/Version: All Status: NEW Severity: minor Priority: P2 Component: ssh AssignedTo:
2007 Jun 28
5
[Bug 1326] New: Allow non-public-key credentials in authorized_keys file ( Kerberos, etc.)
http://bugzilla.mindrot.org/show_bug.cgi?id=1326 Summary: Allow non-public-key credentials in authorized_keys file (Kerberos, etc.) Product: Portable OpenSSH Version: 4.4p1 Platform: All OS/Version: Linux Status: NEW Severity: enhancement Priority: P2 Component: Kerberos support
2006 Dec 03
6
[Bug 1266] incompatibility between s/key and keys Autentification
http://bugzilla.mindrot.org/show_bug.cgi?id=1266 Summary: incompatibility between s/key and keys Autentification Product: Portable OpenSSH Version: 4.4p1 Platform: ix86 OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: Miscellaneous AssignedTo: bitbucket at mindrot.org
2017 May 06
3
[Bug 2712] New: Add fingerprint of key used for public key authentication to PAM handle
https://bugzilla.mindrot.org/show_bug.cgi?id=2712 Bug ID: 2712 Summary: Add fingerprint of key used for public key authentication to PAM handle Product: Portable OpenSSH Version: -current Hardware: All OS: Linux Status: NEW Severity: enhancement Priority: P5
2006 Dec 22
3
[Bug 1270] Public key (DSA) authentication works on 3.8p1 but not on 4.5p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1270 Summary: Public key (DSA) authentication works on 3.8p1 but not on 4.5p1 Product: Portable OpenSSH Version: v4.5p1 Platform: HPPA OS/Version: HP-UX Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo: bitbucket at
2017 Sep 18
0
0-client_t: null client [Invalid argument] & high CPU usage (Gluster 3.12)
Sam, You might want to give glusterfs-3.12.1 a try instead. On Fri, Sep 15, 2017 at 6:42 AM, Sam McLeod <mailinglists at smcleod.net> wrote: > Howdy, > > I'm setting up several gluster 3.12 clusters running on CentOS 7 and have > having issues with glusterd.log and glustershd.log both being filled with > errors relating to null client errors and client-callback
2013 Mar 31
1
Feature request: Need to INVITE to peer with other domain without peer domain addition
Hi, asterisk admin and users. I need to SIP INVITE uri with domain via peer. And uri domain differ then peer domain. dialplan: exten => s,n,Dial(SIP/peer1/number at domain2.com,60,r) [peer1] type=friend host=domain1.com fromdomain=domain1.com As a result in SIP packet uri: number at domain2.com@domain1.com I need: number at domain2.com I can't use "SIP uri dial", i need
2014 Apr 29
1
IAX2 trunk on IPV6
Hi, I have installed asterisk-1.8.25.0 on an Ubuntu server which has both an ipv6 ip and ipv4 ip(real ip) assigned. And I have a client ubuntu with only ipv4 ip(local ip) installed asterisk-1.8.25.0 . I want to configure the client asterisk with the server asterisk as IAX2 peer and want to connect to the IPV6 ip. I bind the server with ipv6 and also sending the registration request from the
2007 Jan 04
0
asterisk sip peer/user matching methods forauthentication backwards?
Hi, I too have found this matching to be frustrating. I would like it to behave as you describe. Doug -- Doug Meredith 506-854-7997 ext. 801 ________________________________ From: asterisk-users-bounces@lists.digium.com [mailto:asterisk-users-bounces@lists.digium.com] On Behalf Of Damon Estep Sent: Thursday, January 04, 2007 1:50 AM To: Asterisk Users Mailing List - Non-Commercial
2017 Sep 25
0
0-client_t: null client [Invalid argument] & high CPU usage (Gluster 3.12)
FYI - I've been testing the Gluster 3.12.1 packages with the help of the SIG maintainer and I can confirm that the logs are no longer being filled with NFS or null client errors after the upgrade. -- Sam McLeod @s_mcleod https://smcleod.net > On 18 Sep 2017, at 10:14 pm, Sam McLeod <mailinglists at smcleod.net> wrote: > > Thanks Milind, > > Yes I?m hanging out for
2017 Sep 15
3
0-client_t: null client [Invalid argument] & high CPU usage (Gluster 3.12)
Howdy, I'm setting up several gluster 3.12 clusters running on CentOS 7 and have having issues with glusterd.log and glustershd.log both being filled with errors relating to null client errors and client-callback functions. They seem to be related to high CPU usage across the nodes although I don't have a way of confirming that (suggestions welcomed!). in
2024 Mar 18
0
smbd rejects all and any authentication attempts due to a corrupted "gencache.tdb"
I run smbd 4.18.8 inside a docker container via "smbd --foreground" (see the attached config). Recently my server was abruptly restarted due to a power outage. Upon the restart it was able to successfully start the container, but the shares became inaccessible due to smbd rejecting all authentication attempts. In the logs I found: [2024/03/18 08:22:50.790021, 5]
2017 Sep 18
2
0-client_t: null client [Invalid argument] & high CPU usage (Gluster 3.12)
Thanks Milind, Yes I?m hanging out for CentOS?s Storage / Gluster SIG to release the packages for 3.12.1, I can see the packages were built a week ago but they?re still not on the repo :( -- Sam > On 18 Sep 2017, at 9:57 pm, Milind Changire <mchangir at redhat.com> wrote: > > Sam, > You might want to give glusterfs-3.12.1 a try instead. > > > >> On Fri, Sep
2007 Oct 07
4
[Bug 1374] New: sshd -D produces zombies if authentication is interrupted
http://bugzilla.mindrot.org/show_bug.cgi?id=1374 Summary: sshd -D produces zombies if authentication is interrupted Product: Portable OpenSSH Version: 4.7p1 Platform: All OS/Version: FreeBSD Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: bitbucket at