Displaying 20 results from an estimated 20000 matches similar to: "[Bug 1282] Log which key used for authentication"
2007 Jun 12
3
[Bug 1282] Log which key used for authentication
http://bugzilla.mindrot.org/show_bug.cgi?id=1282
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |WORKSFORME
CC|
2008 May 22
6
[Bug 1468] New: sshd does not log failed attempts using key-based authentication only
https://bugzilla.mindrot.org/show_bug.cgi?id=1468
Summary: sshd does not log failed attempts using key-based
authentication only
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.0p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: security
Priority: P2
2007 Jan 03
0
asterisk sip peer/user matching methods for authentication backwards?
Take an example where there is two sip users defined in sip.conf as
follows;
[peer1]
Host=192.168.1.1
...
[peer2]
Host=dynamic
Secret=password
...
[Peer3]
Config not relevant
...
The intention is to accept calls from peer1 without authentication (ip
address authentication only), but require authentication from peer2
If by chance a SIP invite comes "From"
2006 Mar 08
4
[Bug 1172] [PATCH] Restrict public key authentication to scp access only
http://bugzilla.mindrot.org/show_bug.cgi?id=1172
Summary: [PATCH] Restrict public key authentication to scp access
only
Product: Portable OpenSSH
Version: 4.3p2
Platform: All
OS/Version: Linux
Status: NEW
Keywords: patch
Severity: enhancement
Priority: P2
Component: scp
2007 Nov 27
2
[Bug 1394] New: SCP used to overwrite key
https://bugzilla.mindrot.org/show_bug.cgi?id=1394
Summary: SCP used to overwrite key
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.7p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: scp
AssignedTo: bitbucket at mindrot.org
2007 May 06
1
[Bug 1286] SFTP keeps reading input until it runs out of buffer space
http://bugzilla.mindrot.org/show_bug.cgi?id=1286
thuejk at gmail.com changed:
What |Removed |Added
----------------------------------------------------------------------------
OS/Version|Linux |All
Keywords| |low-hanging-fruit
------- You are receiving this mail because: -------
You are
2006 Aug 24
6
[Bug 1221] Banner only suppressed at log level = QUIET (used to be at log level < INFO)
http://bugzilla.mindrot.org/show_bug.cgi?id=1221
Summary: Banner only suppressed at log level = QUIET (used to be
at log level < INFO)
Product: Portable OpenSSH
Version: 4.3p2
Platform: All
OS/Version: All
Status: NEW
Severity: minor
Priority: P2
Component: ssh
AssignedTo:
2007 Jun 28
5
[Bug 1326] New: Allow non-public-key credentials in authorized_keys file ( Kerberos, etc.)
http://bugzilla.mindrot.org/show_bug.cgi?id=1326
Summary: Allow non-public-key credentials in authorized_keys file
(Kerberos, etc.)
Product: Portable OpenSSH
Version: 4.4p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: enhancement
Priority: P2
Component: Kerberos support
2006 Dec 03
6
[Bug 1266] incompatibility between s/key and keys Autentification
http://bugzilla.mindrot.org/show_bug.cgi?id=1266
Summary: incompatibility between s/key and keys Autentification
Product: Portable OpenSSH
Version: 4.4p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Miscellaneous
AssignedTo: bitbucket at mindrot.org
2017 May 06
3
[Bug 2712] New: Add fingerprint of key used for public key authentication to PAM handle
https://bugzilla.mindrot.org/show_bug.cgi?id=2712
Bug ID: 2712
Summary: Add fingerprint of key used for public key
authentication to PAM handle
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
2006 Dec 22
3
[Bug 1270] Public key (DSA) authentication works on 3.8p1 but not on 4.5p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1270
Summary: Public key (DSA) authentication works on 3.8p1 but not
on 4.5p1
Product: Portable OpenSSH
Version: v4.5p1
Platform: HPPA
OS/Version: HP-UX
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: bitbucket at
2017 Sep 18
0
0-client_t: null client [Invalid argument] & high CPU usage (Gluster 3.12)
Sam,
You might want to give glusterfs-3.12.1 a try instead.
On Fri, Sep 15, 2017 at 6:42 AM, Sam McLeod <mailinglists at smcleod.net>
wrote:
> Howdy,
>
> I'm setting up several gluster 3.12 clusters running on CentOS 7 and have
> having issues with glusterd.log and glustershd.log both being filled with
> errors relating to null client errors and client-callback
2013 Mar 31
1
Feature request: Need to INVITE to peer with other domain without peer domain addition
Hi, asterisk admin and users.
I need to SIP INVITE uri with domain via peer. And uri domain differ
then peer domain.
dialplan:
exten => s,n,Dial(SIP/peer1/number at domain2.com,60,r)
[peer1]
type=friend
host=domain1.com
fromdomain=domain1.com
As a result in SIP packet uri: number at domain2.com@domain1.com
I need: number at domain2.com
I can't use "SIP uri dial", i need
2014 Apr 29
1
IAX2 trunk on IPV6
Hi,
I have installed asterisk-1.8.25.0 on an Ubuntu server which has both an
ipv6 ip and ipv4 ip(real ip) assigned. And I have a client ubuntu with only
ipv4 ip(local ip) installed asterisk-1.8.25.0 . I want to configure the
client asterisk with the server asterisk as IAX2 peer and want to connect
to the IPV6 ip. I bind the server with ipv6 and also sending the
registration request from the
2007 Jan 04
0
asterisk sip peer/user matching methods forauthentication backwards?
Hi,
I too have found this matching to be frustrating. I would like it to
behave as you describe.
Doug
--
Doug Meredith
506-854-7997 ext. 801
________________________________
From: asterisk-users-bounces@lists.digium.com
[mailto:asterisk-users-bounces@lists.digium.com] On Behalf Of Damon
Estep
Sent: Thursday, January 04, 2007 1:50 AM
To: Asterisk Users Mailing List - Non-Commercial
2017 Sep 25
0
0-client_t: null client [Invalid argument] & high CPU usage (Gluster 3.12)
FYI - I've been testing the Gluster 3.12.1 packages with the help of the SIG maintainer and I can confirm that the logs are no longer being filled with NFS or null client errors after the upgrade.
--
Sam McLeod
@s_mcleod
https://smcleod.net
> On 18 Sep 2017, at 10:14 pm, Sam McLeod <mailinglists at smcleod.net> wrote:
>
> Thanks Milind,
>
> Yes I?m hanging out for
2017 Sep 15
3
0-client_t: null client [Invalid argument] & high CPU usage (Gluster 3.12)
Howdy,
I'm setting up several gluster 3.12 clusters running on CentOS 7 and have having issues with glusterd.log and glustershd.log both being filled with errors relating to null client errors and client-callback functions.
They seem to be related to high CPU usage across the nodes although I don't have a way of confirming that (suggestions welcomed!).
in
2024 Mar 18
0
smbd rejects all and any authentication attempts due to a corrupted "gencache.tdb"
I run smbd 4.18.8 inside a docker container via "smbd --foreground" (see the attached config). Recently my server was abruptly
restarted due to a power outage. Upon the restart it was able to successfully start the container, but the shares became inaccessible
due to smbd rejecting all authentication attempts. In the logs I found:
[2024/03/18 08:22:50.790021, 5]
2017 Sep 18
2
0-client_t: null client [Invalid argument] & high CPU usage (Gluster 3.12)
Thanks Milind,
Yes I?m hanging out for CentOS?s Storage / Gluster SIG to release the packages for 3.12.1, I can see the packages were built a week ago but they?re still not on the repo :(
--
Sam
> On 18 Sep 2017, at 9:57 pm, Milind Changire <mchangir at redhat.com> wrote:
>
> Sam,
> You might want to give glusterfs-3.12.1 a try instead.
>
>
>
>> On Fri, Sep
2007 Oct 07
4
[Bug 1374] New: sshd -D produces zombies if authentication is interrupted
http://bugzilla.mindrot.org/show_bug.cgi?id=1374
Summary: sshd -D produces zombies if authentication is
interrupted
Product: Portable OpenSSH
Version: 4.7p1
Platform: All
OS/Version: FreeBSD
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: bitbucket at