Displaying 20 results from an estimated 1100 matches similar to: "Support for PKCS cryptocards.."
2012 Feb 09
1
Tukey HSD
Hey Folks:
New to R and learning as I go, but really, I know just enough to get myself
into trouble. I've waded through everything up till now, and don't see
anything in the search that is directly helpful for the POS that I've
created.
The GOAL: All I want in the world is a program that performs 1-way ANOVA's
on every column in a data set (taking the first column as the
2003 Jan 16
0
[ANNOUNCE] netfilter bug tracking system
--yrj/dFKFPuw6o+aM
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Hi!
Today the netfilter core team announces the new bug-tracking system for
netfilter/iptables. This step really was necessarry, because I started
to get the feeling that I'm losing track of all the concurrent issues.
So if you are aware of any bugs in the
2000 Nov 24
0
KbdInteract not mentioned on sshd.8, cryptocard?
Hello all,
I just noticed that 'KbdInteractiveAuthentication' is not mentioned in
sshd.8 or anywhere else on the man page. Someone with better knowledge
about it than me, please fix this :-)
Also, there were talks about supporting cryptocards about 3 months ago.
Is there work being done on this?
--
Pekka Savola "Tell me of difficulties surmounted,
Pekka.Savola at
2000 Sep 13
6
CryptoCard patch
Hi,
I had a contractor write a patch to allow CryptoCard support in
OpenSSH. It works with portable openssh-2.1.1p4, and it was posted to
the SSH mailing lists, but I see that it hasn't been included in the
openssh-2.2.0p1 release. Would it be possible to include this patch
in the official release? The reason why I ask is because it will not
be difficult to do that, it will support the
2006 Sep 19
1
CryptoCard - PAM or RADIUS?
Greetings all,
I'm working on attempting to get SAMBA to work with a product line
called CryptoCard. I *should* be able to get it to work one of two ways,
either through the use of CryptoCard's provided PAM module, or through
RADIUS authentication.
Currently, I cannot seem to get PAM authentication to work at all. This
is what is in the 'samba' file for PAM:
auth
[Bug 2186] New: ssh-agent crashes when removing PKCS#11 library keys if non-PKCS#11 keys are present
2013 Dec 17
7
[Bug 2186] New: ssh-agent crashes when removing PKCS#11 library keys if non-PKCS#11 keys are present
https://bugzilla.mindrot.org/show_bug.cgi?id=2186
Bug ID: 2186
Summary: ssh-agent crashes when removing PKCS#11 library keys
if non-PKCS#11 keys are present
Product: Portable OpenSSH
Version: 6.3p1
Hardware: All
OS: Mac OS X
Status: NEW
Severity: minor
Priority: P5
2005 Oct 05
2
ssh-agent add PKCS#11 support
Hello,
PKCS#11 is a standard API interface that can be used in
order to access cryptographic tokens. You can find the
specification at
http://www.rsasecurity.com/rsalabs/node.asp?id=2133, most
smartcard and other cryptographic device vendors support
PKCS#11, opensc also provides PKCS#11 interface.
I can easily make the scard.c, scard-opensc.c and
ssh-agent.c support PKCS#11.
PKCS#11 is
2005 Oct 11
0
openssh and pkcs#11
Hello Andreas,
On 10/11/05, Andreas Jellinghaus <aj at dungeon.inka.de> wrote:
> Peter Koch pointed me to your posting on openssh-devel mailing list.
I am very glad that he did.
> I'm one of the opensc people, and from my point of view your idea
> is a good one. The current openssh-opensc code has a number of issues,
> for example the ssh-agent does not test the pin
2007 Jan 05
0
Announce: PKCS#11 support version 0.18 in OpenSSH 4.5p1
Hi All,
The version of "PKCS#11 support in OpenSSH" is ready for download.
On download page http://alon.barlev.googlepages.com/openssh-pkcs11 you
can find a patch for OpenSSH 4.5p1.
Most of PKCS#11 code is now moved to a standalone library which I call
pkcs11-helper, this library is used by all projects that I added
PKCS#11 support into. The library can be downloaded from:
2006 Feb 12
0
[ANNOUNCE] PKCS#11 support in OpenSSH 4.3p2 (version 0.07)
Hello,
The version 0.07 of "PKCS#11 support in OpenSSH" is published.
Changes:
1. Updated against OpenSSH 4.3p1.
2. Ignore '\r' at password prompt, cygwin/win32 password
prompt support.
3. Workaround for iKey PKCS#11 provider bug.
4. Some minor cleanups.
5. Allow clean merge of Roumen Petrov's X.509 patch (version
5.3) after this one.
[[[ The patch-set is too large for
2007 Dec 28
0
OpenSSH PKCS#11merge
ping.
I've been using Alon's patch and following his arguments on this list for a
while. I want to add my voice to say that the current opensc support should
be completely replaced with pkcs#11 support, since it is the right way to
handle smart cards. The use case that my organization wants is to use the TPM
chips available in most machines as our primary smartcard mechanism,
2018 Aug 13
3
Why still no PKCS#11 ECC key support in OpenSSH ?
On Sun, 12 Aug 2018, Blumenthal, Uri - 0553 - MITLL wrote:
> Tone aside, let me second what Bob said. OpenSSH maintainers seem to
> be able to find time for many updates and upgrades - but ECC support
> over PKCS#11 appears to repulse them for more than two years (I don't
> care to check for exactly how many more).
There's no "repulsion" involved, just a lack of
2006 Oct 31
0
PSARC 2005/501 ikecert PKCS#11 object migration and linkage
Author: pwernau
Repository: /hg/zfs-crypto/gate
Revision: ba16e4a9c5255b467f2d29663976000f863c3b71
Log message:
PSARC 2005/501 ikecert PKCS#11 object migration and linkage
6219636 ikecert(1m) needs to tie IKE certificate slots to existing PKCS#11 objects
6220119 ikecert certlocal migrate disk key to PKCS#11 token
6232671 Can''t add a certificate to a keystore with ikecert(1m)
6303764 IKE
2016 Dec 13
1
pkcs #11/hardware support for server keys/sshd?
On 13 December 2016 at 21:00, Kenny Simpson <theonetruekenny at gmail.com> wrote:
> Hello,
> Is there any support (existing or planned) for host keys/certs being
> managed by some hardware device (tpm,hsm,etc..) instead of a flat
> file?
man ssh
search for PKCS#11
2015 Oct 08
2
[PATCH] Enabling ECDSA in PKCS#11 support for ssh-agent
On 10/8/2015 4:49 AM, Simon Josefsson wrote:
> Mathias Brossard <mathias at brossard.org> writes:
>
>> Hi,
>>
>> I have made a patch for enabling the use of ECDSA keys in the PKCS#11
>> support of ssh-agent which will be of interest to other users.
>
> Nice! What would it take to add support for Ed25519 too? Do we need to
> allocate any new PKCS#11
2011 Feb 10
0
>PKCS#11 passthrough for Smartcards
Hi all,
Someone mentioned today to me, that the "competing virtualisation product" is capable of doing PKCS-forwarding towards a virtual client.
So, my question here, does XEN supports PKCS-passthrough?
As i also need my smartcard locally (on the hypervisor), i can not use neither pci nor usb-forwarding....
Defensie/CDC/IVENT/Research en Innovation Centrum
Ing J. (Hans) Witvliet
2011 Sep 02
1
pkcs and host keys
Hi Damien,
I see in your asia bsdcon presentation you mentioned the possibility
of storing host keys in PKCS #11. I'm interested in using a usb rsa
fob for host keys and am interested in this feature. What's the
current status? As you said: root compromise != persistent hostkey
theft.
THanks much,
Ben
2014 Jun 04
0
[patch] Tiny patch to change 'no slots' to debug in PKCS#11 situations
Folks,
Not very critical - but below would help make the PKCS#11 experience a bit smoother. The, occasionally informative, no-slots message is moved to ?debug?; as otherwise, in a mixed pkcs#11 and file-based environment virtually all non chip-card driven ssh connections spew ?no slot? on stderr. And in day to day use - the only time you want this message is when you are debugging an issue; such
2016 Dec 13
4
pkcs #11/hardware support for server keys/sshd?
Hello,
Is there any support (existing or planned) for host keys/certs being
managed by some hardware device (tpm,hsm,etc..) instead of a flat
file?
thanks,
-Kenny
2023 Nov 19
2
[Bug 3635] New: ssh-add -s always asks for PKCS#11 PIN
https://bugzilla.mindrot.org/show_bug.cgi?id=3635
Bug ID: 3635
Summary: ssh-add -s always asks for PKCS#11 PIN
Product: Portable OpenSSH
Version: 9.0p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh-add
Assignee: unassigned-bugs at