Displaying 20 results from an estimated 5000 matches similar to: "PAM & Configure"
2000 Dec 22
3
SecurID patch.
What are the chances of getting the SecurID patch integrated into OpenSSH? I
think I asked before and was told that it could be done with PAM, but I (and
others) are not satisfied with the PAM support.
This "tight" integration seems to work much better.
If not, I'll just sit on my rogue patches :-(
--
Theo Schlossnagle
1024D/A8EBCF8F/13BD 8C08 6BE2 629A 527E 2DC2 72C2 AD05 A8EB
2000 Dec 02
2
pam, openssh and opie
Hello folks, this looks about the only place I can find on issues dealing
with the subject line. The message that got me posting is included below the
line of *'s.
Basically I've tried getting this working with Pam authentication and using
the new login binary that comes with Opie 2.32. No joy.
I am using
RedHat 6.0
OpenSSH 2.3.0p1
Pam 0.66-18
I can get the opie challenge only on a
2000 Dec 30
1
[Re: openSSH/openSSL question.]
Damien Miller <djm at mindrot.org> wrote:
On 29 Dec 2000, sunil vallamkonda wrote:
> Hello,
>
> Looking at:
> http://www.openssh.com/features.html
>
> Under 'Free Licensing' section:
>
> "any licensed or patented components are chosen from
> external libraries (e.g. OpenSSL)"
>
> Can someone please enlighten me which
> components
2000 Dec 27
5
PAM configuration
To stem the tide of support requests from people who don't read the
INSTALL file when installing OpenSSH and then complain about password
auth failing. I am considering the idea of automagically installing a
PAM file into /etc/pam.d if it exists, PAM support is enabled and no
such file already exists.
I have a couple of questions:
- How is PAM controlled on Solaris? Is there a pam.d
2002 Feb 14
2
[Bug 117] OpenSSH second-guesses PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=117
------- Additional Comments From djm at mindrot.org 2002-02-15 10:10 -------
> OpenSSH traditionally would not even start PAM, and
> now starts it specifying 'NOUSER' as the login name.
We have always used NOUSER, the recent patch just makes it consistent between
protocols 1 and 2.
> The second is to prevent username guessing
2000 Nov 07
1
ANNOUNCE: openssh-2.3.0p1
This is to announce the release of portable openssh-2.3.0p1. This
release includes many new features and bug fixes. This is a
recommended upgrade if you are using 2.2.0p1 or an older release.
Portable OpenSSH is available from one of the many mirrors listed at
http://www.openssh.com/portable.html
Some of the more notable features include:
- Rijndael support for SSH2. Use the "Ciphers"
2000 Nov 07
1
ANNOUNCE: openssh-2.3.0p1
This is to announce the release of portable openssh-2.3.0p1. This
release includes many new features and bug fixes. This is a
recommended upgrade if you are using 2.2.0p1 or an older release.
Portable OpenSSH is available from one of the many mirrors listed at
http://www.openssh.com/portable.html
Some of the more notable features include:
- Rijndael support for SSH2. Use the "Ciphers"
2000 Dec 13
1
Anonymous CVS, Snapshot mirrors available
Thanks to the generosity of Rob Hagopian <rob at hagopian.net>, portable
OpenSSH now has a public anonymous CVS tree and a mirror of the
snapshots on a fast (colocated) machine.
The nightly snapshots are now available from:
http://bass.directhit.com/openssh_snap/
Please use these instead of the mindrot.org ones (which will be going
away soon).
To checkout the CVS tree, issue the
2000 Dec 13
1
Anonymous CVS, Snapshot mirrors available
Thanks to the generosity of Rob Hagopian <rob at hagopian.net>, portable
OpenSSH now has a public anonymous CVS tree and a mirror of the
snapshots on a fast (colocated) machine.
The nightly snapshots are now available from:
http://bass.directhit.com/openssh_snap/
Please use these instead of the mindrot.org ones (which will be going
away soon).
To checkout the CVS tree, issue the
2000 Oct 19
1
[Fwd: OpenSSH - scp - transfer rate patch] (fwd)
--
| ``We've all heard that a million monkeys banging on | Damien Miller -
| a million typewriters will eventually reproduce the | <djm at mindrot.org>
| works of Shakespeare. Now, thanks to the Internet, /
| we know this is not true.'' - Robert Wilensky UCB / http://www.mindrot.org
---------- Forwarded message ----------
Date: Thu, 17 Aug 2000 14:27:31 +1000
From: Damien
2000 Oct 26
3
Happy Birthday portable OpenSSH!
It was one year ago today that I released a patch to get OpenSSH
compiling on Linux. I had no idea just how much trouble releasing that
patch would get me into :)
Within days I was inundated with patches, improvements and portability
enhancements - contributions which have made portable OpenSSH the
success it is today.
So allow me to thank the current developers and all of you who have
2000 Nov 14
0
2.3.0p1 + Sco3.2v5.0.5 (fwd)
--
| ``We've all heard that a million monkeys banging on | Damien Miller -
| a million typewriters will eventually reproduce the | <djm at mindrot.org>
| works of Shakespeare. Now, thanks to the Internet, /
| we know this is not true.'' - Robert Wilensky UCB / http://www.mindrot.org
---------- Forwarded message ----------
Date: Tue, 14 Nov 2000 22:00:41 +1000
From: Robert
2000 Dec 26
0
minor bugs in openssh-2.3.0p1 (fwd)
--
| ``We've all heard that a million monkeys banging on | Damien Miller -
| a million typewriters will eventually reproduce the | <djm at mindrot.org>
| works of Shakespeare. Now, thanks to the Internet, /
| we know this is not true.'' - Robert Wilensky UCB / http://www.mindrot.org
---------- Forwarded message ----------
Date: Tue, 26 Dec 2000 09:12:48 -0800
From: Takumi
2001 Jan 23
1
Workaround for hanging shells on exit
While browsing through bash's hugh manpage, I noticed that it has a
'huponexit' option which will send SIGHUP to all interactive processes
when the shell exits.
I have tested this and it does resolve the hanging at logout without
causing race conditions. I now have a "shopt -s huponexit" in my
/etc/bashrc and it works beautifully.
-d
--
| ``We've all heard that a
2001 Feb 06
16
sftp client
As of Sunday evening, OpenSSH has an interactive sftp client. It should
be in the more recent snapshots.
It would be appreciated if you could test new client and find all the
bugs :) Please also have a read of the manpage and ensure that it
matches what is implemented.
I am working on fixing the ones that I know about, so please try to
stay up to date with the snapshots.
Thanks,
Damien
2001 Jan 30
4
Detection of identical file doesn't work for localhost:
Hi,
I had to notice that scp is able to detect if a file is copied to itself
if you use "scp foo /path/to/foo" or "scp foo .". If you type in "scp
foo localhost:/path/to/foo" it will still overwrite the old version of
foo. Is it possible to change this behaviour of scp?
I only had a quick glance at scp.c and I'm also not a C coder, only
learning C right now, so
2000 Nov 12
1
Free Sun patch 105710-01 provides /dev/random on Solaris (fwd)
Can anyone verify this and provide a URL for the docs?
--
| ``We've all heard that a million monkeys banging on | Damien Miller -
| a million typewriters will eventually reproduce the | <djm at mindrot.org>
| works of Shakespeare. Now, thanks to the Internet, /
| we know this is not true.'' - Robert Wilensky UCB / http://www.mindrot.org
---------- Forwarded message
2000 Nov 14
0
2.3.0p1, Solaris 7 and last login (fwd)
--
| ``We've all heard that a million monkeys banging on | Damien Miller -
| a million typewriters will eventually reproduce the | <djm at mindrot.org>
| works of Shakespeare. Now, thanks to the Internet, /
| we know this is not true.'' - Robert Wilensky UCB / http://www.mindrot.org
---------- Forwarded message ----------
Date: Tue, 14 Nov 2000 16:33:18 +0100
From: System
2000 Nov 29
0
Snapshot
I have just uploaded a new snapshot to
http://www.mindrot.org/misc/openssh/
Snapshot production is now automated - new snapshots will be made
at about 4:30 am (Australian Eastern time) and will be available from
the URL above.
This snapshot consists of mainly minor fixes over the previous.
The race when sshd exits which was causing data loss (as evidenced by
"ssh localhost dd
2001 Jan 18
3
BSafe toolkits for implementing RSA public key algorithm
Has anyone had any experience with any of the BSafe toolkits that are
available and contain support for the RSA public key algorithms? I would
like to use one of RSA's toolkits in a port of a Windows OpenSSH client that
I am working on, in order to avoid any licensing issues from RSA. Can anyone
recommend a good toolkit? I understand that there a number of them, such as
BSafe SSL-C, SLPlus,