Displaying 15 results from an estimated 15 matches similar to: "Combining RSA host authentication with another method"
2000 Jan 13
2
sshd doesn't set SSH_AUTH_RHOSTS as supported authentication
Okay...I've got it narrowed down, just don't know why this is happening...
In sshd.c, auth_mask is set to "supported authentication methods":
/* Declare supported authentication types. */
auth_mask = 0;
if (options.rhosts_authentication)
auth_mask |= 1 << SSH_AUTH_RHOSTS;
if (options.rhosts_rsa_authentication)
2006 Feb 12
1
sshd double-logging
Hi all.
As Corinna pointed out, there are some cases where sshd will log some
authentications twice when privsep=yes.
This can happen on any platform although it seems most obvious on the
ones that don't do post-auth privsep. It also occurs when sshd logs
to stderr (eg running under daemontools) or when you have a /dev/log in
the privsep chroot.
The patch below attempts to solve this for
2001 Jul 27
2
OpenSSH-RSAAuth-NFS
Here's a bunch of changes I've made to the current portable version of
OpenSSH.
The aim is that the rsa_authentication flag in sshd_config can be given the
values "without-nfs" This is really handy within a large organization where
incorrectly secured home directories can allow authorized_keys(2) to be
modified by someone other than the owner.
So now rsa_authentication can take
2006 Nov 15
11
OpenSSH Certkey (PKI)
This patch against OpenBSD -current adds a simple form of PKI to
OpenSSH. We'll be using it at work. See README.certkey (the first chunk
of the patch) for details.
Everything below is BSD licensed, sponsored by Allamanda Networks AG.
Daniel
--- /dev/null Wed Nov 15 15:14:20 2006
+++ README.certkey Wed Nov 15 15:13:45 2006
@@ -0,0 +1,176 @@
+OpenSSH Certkey
+
+INTRODUCTION
+
+Certkey allows
2002 Jan 25
1
bug in readconf.c
Hi,
there is a tiny bug in readconf.c: options->use_privileged_port is always
set to 0 regardless of whether -P is specified or not. This has the effect
that RhostsAuthentication is disabled even if "RhostsAuthentication yes"
is specified.
The (trivial) patch is appended below.
Martin
========================================================================
Martin Siegert
Academic
2003 Oct 20
1
[Bug 746] host authentication requires RSA1 keys
http://bugzilla.mindrot.org/show_bug.cgi?id=746
Summary: host authentication requires RSA1 keys
Product: Portable OpenSSH
Version: 3.7p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Documentation
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2001 Nov 12
4
Please test -current
Could people please test -current? We will be making a release fairly
soon.
-d
--
| By convention there is color, \\ Damien Miller <djm at mindrot.org>
| By convention sweetness, By convention bitterness, \\ www.mindrot.org
| But in reality there are atoms and space - Democritus (c. 400 BCE)
2001 Oct 02
2
AFS and tokenforwarding
For some reasons the afs tokenforwarding stuff has changed
siginificantly from v 2.9p2 to 2.9.9p2.
This makes it impossible to use public key authenticication in a
standart AFS environment.
I don't know the reasons for these changes.
In any case attached is a patch which restores the old behaviour.
Regards
Serge
--
Serge Droz
Paul Scherrer Institut mailto:serge.droz at
2001 Nov 20
3
problem with AFS token forwarding
Hello,
I came across an interoperability problem in OpenSSH 3.0p1 and 3.0.1p1
concerning the AFS token forwarding. That means that the new versions are
not able to exchange AFS tokens (and Kerberos TGTs) with older OpenSSH
releases (including 2.9p2) and with the old SSH 1.2.2x. In my opinion this
problem already existed in Openssh 2.9.9p1, but I have never used this
version (I only looked at the
2000 Jun 06
0
connection timeout
Attached is a patch which adds a ConnectionTimeout option, and corrects
the ConnectionAttempts documentation.
Previously, ssh would try to make a connection ConnectionAttempts times,
sleeping 1 second between tries. But each connection attempt could take a
very long time to fail if the packets die before the get to the host. So
if ssh is being run in a script or what-have-you, it might be
2003 Oct 20
12
[Bug 747] host authentication requires RSA1 keys
http://bugzilla.mindrot.org/show_bug.cgi?id=747
Summary: host authentication requires RSA1 keys
Product: Portable OpenSSH
Version: 3.7.1p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Documentation
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2000 Nov 14
1
[PATCH] Added option 'RetryDelay'
Being rather aggrevated when testing at the enforced 1 second
delay between each connection attempt and the useless 1 second delay
done after all connection attempts have failed I wrote a patch to make
the number of seconds delayed between each connection attempt
configurable.
Stephen
-------------- next part --------------
diff -u --recursive openssh-2.3.0p1/ChangeLog
2000 Oct 30
2
RhostsAuthentication + nondefault port doesn't work?
Hello all,
It seems that RhostsAuthentication does not work on non-default port no
matter what when connecting from OpenSSH (2.1.1, 2.2.0 tried) either with
protocol 1 or protocol 2 (shouldn't work either..).
_However_ when connecting with SSH.COM Ltd's ssh, RhostsAuthentication
works just fine!
Checking the port number of ssh client you can see that OpenSSH doesn't
assign
2001 Feb 27
4
AllowHosts / DenyHosts
I'd like to see a feature of the commercial ssh in openssh:
AllowHosts xxx.yyy.xxx.yyy *.domain.net
DenyHosts xxx.yyy.xxx.* name.domain.net
This allows or denies connects from certain machines (including wildcard
matching).
Is there any chance for this feature to be included? No, we don't want to
use tcp-wrapper for this.
Bye.
2002 Jun 26
1
[Fwd: Kerberos buglet in OpenSSH-3.3p1]
Can anyone with Heimdal KrbV verify this?
-------------- next part --------------
An embedded message was scrubbed...
From: Dag-Erling Smorgrav <des at ofug.org>
Subject: Kerberos buglet in OpenSSH-3.3p1
Date: 25 Jun 2002 14:52:10 +0200
Size: 1291
Url: http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20020626/347e123e/attachment.mht