similar to: PAM & Configure

Displaying 20 results from an estimated 5000 matches similar to: "PAM & Configure"

2000 Dec 22
3
SecurID patch.
What are the chances of getting the SecurID patch integrated into OpenSSH? I think I asked before and was told that it could be done with PAM, but I (and others) are not satisfied with the PAM support. This "tight" integration seems to work much better. If not, I'll just sit on my rogue patches :-( -- Theo Schlossnagle 1024D/A8EBCF8F/13BD 8C08 6BE2 629A 527E 2DC2 72C2 AD05 A8EB
2000 Dec 02
2
pam, openssh and opie
Hello folks, this looks about the only place I can find on issues dealing with the subject line. The message that got me posting is included below the line of *'s. Basically I've tried getting this working with Pam authentication and using the new login binary that comes with Opie 2.32. No joy. I am using RedHat 6.0 OpenSSH 2.3.0p1 Pam 0.66-18 I can get the opie challenge only on a
2000 Dec 30
1
[Re: openSSH/openSSL question.]
Damien Miller <djm at mindrot.org> wrote: On 29 Dec 2000, sunil vallamkonda wrote: > Hello, > > Looking at: > http://www.openssh.com/features.html > > Under 'Free Licensing' section: > > "any licensed or patented components are chosen from > external libraries (e.g. OpenSSL)" > > Can someone please enlighten me which > components
2000 Dec 27
5
PAM configuration
To stem the tide of support requests from people who don't read the INSTALL file when installing OpenSSH and then complain about password auth failing. I am considering the idea of automagically installing a PAM file into /etc/pam.d if it exists, PAM support is enabled and no such file already exists. I have a couple of questions: - How is PAM controlled on Solaris? Is there a pam.d
2002 Feb 14
2
[Bug 117] OpenSSH second-guesses PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=117 ------- Additional Comments From djm at mindrot.org 2002-02-15 10:10 ------- > OpenSSH traditionally would not even start PAM, and > now starts it specifying 'NOUSER' as the login name. We have always used NOUSER, the recent patch just makes it consistent between protocols 1 and 2. > The second is to prevent username guessing
2000 Nov 07
1
ANNOUNCE: openssh-2.3.0p1
This is to announce the release of portable openssh-2.3.0p1. This release includes many new features and bug fixes. This is a recommended upgrade if you are using 2.2.0p1 or an older release. Portable OpenSSH is available from one of the many mirrors listed at http://www.openssh.com/portable.html Some of the more notable features include: - Rijndael support for SSH2. Use the "Ciphers"
2000 Nov 07
1
ANNOUNCE: openssh-2.3.0p1
This is to announce the release of portable openssh-2.3.0p1. This release includes many new features and bug fixes. This is a recommended upgrade if you are using 2.2.0p1 or an older release. Portable OpenSSH is available from one of the many mirrors listed at http://www.openssh.com/portable.html Some of the more notable features include: - Rijndael support for SSH2. Use the "Ciphers"
2000 Dec 13
1
Anonymous CVS, Snapshot mirrors available
Thanks to the generosity of Rob Hagopian <rob at hagopian.net>, portable OpenSSH now has a public anonymous CVS tree and a mirror of the snapshots on a fast (colocated) machine. The nightly snapshots are now available from: http://bass.directhit.com/openssh_snap/ Please use these instead of the mindrot.org ones (which will be going away soon). To checkout the CVS tree, issue the
2000 Dec 13
1
Anonymous CVS, Snapshot mirrors available
Thanks to the generosity of Rob Hagopian <rob at hagopian.net>, portable OpenSSH now has a public anonymous CVS tree and a mirror of the snapshots on a fast (colocated) machine. The nightly snapshots are now available from: http://bass.directhit.com/openssh_snap/ Please use these instead of the mindrot.org ones (which will be going away soon). To checkout the CVS tree, issue the
2000 Oct 19
1
[Fwd: OpenSSH - scp - transfer rate patch] (fwd)
-- | ``We've all heard that a million monkeys banging on | Damien Miller - | a million typewriters will eventually reproduce the | <djm at mindrot.org> | works of Shakespeare. Now, thanks to the Internet, / | we know this is not true.'' - Robert Wilensky UCB / http://www.mindrot.org ---------- Forwarded message ---------- Date: Thu, 17 Aug 2000 14:27:31 +1000 From: Damien
2000 Oct 26
3
Happy Birthday portable OpenSSH!
It was one year ago today that I released a patch to get OpenSSH compiling on Linux. I had no idea just how much trouble releasing that patch would get me into :) Within days I was inundated with patches, improvements and portability enhancements - contributions which have made portable OpenSSH the success it is today. So allow me to thank the current developers and all of you who have
2000 Nov 14
0
2.3.0p1 + Sco3.2v5.0.5 (fwd)
-- | ``We've all heard that a million monkeys banging on | Damien Miller - | a million typewriters will eventually reproduce the | <djm at mindrot.org> | works of Shakespeare. Now, thanks to the Internet, / | we know this is not true.'' - Robert Wilensky UCB / http://www.mindrot.org ---------- Forwarded message ---------- Date: Tue, 14 Nov 2000 22:00:41 +1000 From: Robert
2000 Dec 26
0
minor bugs in openssh-2.3.0p1 (fwd)
-- | ``We've all heard that a million monkeys banging on | Damien Miller - | a million typewriters will eventually reproduce the | <djm at mindrot.org> | works of Shakespeare. Now, thanks to the Internet, / | we know this is not true.'' - Robert Wilensky UCB / http://www.mindrot.org ---------- Forwarded message ---------- Date: Tue, 26 Dec 2000 09:12:48 -0800 From: Takumi
2001 Jan 23
1
Workaround for hanging shells on exit
While browsing through bash's hugh manpage, I noticed that it has a 'huponexit' option which will send SIGHUP to all interactive processes when the shell exits. I have tested this and it does resolve the hanging at logout without causing race conditions. I now have a "shopt -s huponexit" in my /etc/bashrc and it works beautifully. -d -- | ``We've all heard that a
2001 Feb 06
16
sftp client
As of Sunday evening, OpenSSH has an interactive sftp client. It should be in the more recent snapshots. It would be appreciated if you could test new client and find all the bugs :) Please also have a read of the manpage and ensure that it matches what is implemented. I am working on fixing the ones that I know about, so please try to stay up to date with the snapshots. Thanks, Damien
2001 Jan 30
4
Detection of identical file doesn't work for localhost:
Hi, I had to notice that scp is able to detect if a file is copied to itself if you use "scp foo /path/to/foo" or "scp foo .". If you type in "scp foo localhost:/path/to/foo" it will still overwrite the old version of foo. Is it possible to change this behaviour of scp? I only had a quick glance at scp.c and I'm also not a C coder, only learning C right now, so
2000 Nov 12
1
Free Sun patch 105710-01 provides /dev/random on Solaris (fwd)
Can anyone verify this and provide a URL for the docs? -- | ``We've all heard that a million monkeys banging on | Damien Miller - | a million typewriters will eventually reproduce the | <djm at mindrot.org> | works of Shakespeare. Now, thanks to the Internet, / | we know this is not true.'' - Robert Wilensky UCB / http://www.mindrot.org ---------- Forwarded message
2000 Nov 14
0
2.3.0p1, Solaris 7 and last login (fwd)
-- | ``We've all heard that a million monkeys banging on | Damien Miller - | a million typewriters will eventually reproduce the | <djm at mindrot.org> | works of Shakespeare. Now, thanks to the Internet, / | we know this is not true.'' - Robert Wilensky UCB / http://www.mindrot.org ---------- Forwarded message ---------- Date: Tue, 14 Nov 2000 16:33:18 +0100 From: System
2000 Nov 29
0
Snapshot
I have just uploaded a new snapshot to http://www.mindrot.org/misc/openssh/ Snapshot production is now automated - new snapshots will be made at about 4:30 am (Australian Eastern time) and will be available from the URL above. This snapshot consists of mainly minor fixes over the previous. The race when sshd exits which was causing data loss (as evidenced by "ssh localhost dd
2001 Jan 18
3
BSafe toolkits for implementing RSA public key algorithm
Has anyone had any experience with any of the BSafe toolkits that are available and contain support for the RSA public key algorithms? I would like to use one of RSA's toolkits in a port of a Windows OpenSSH client that I am working on, in order to avoid any licensing issues from RSA. Can anyone recommend a good toolkit? I understand that there a number of them, such as BSafe SSL-C, SLPlus,