Displaying 20 results from an estimated 500 matches similar to: "patch: disable credential forwarding after password auth."
2002 Feb 15
0
[Bug 118] New: Implement TIS (protocol 1) via PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=118
Summary: Implement TIS (protocol 1) via PAM
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P3
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: fcusack at
2003 Aug 09
0
Timing attacks and owl-always-auth
Hi All.
Attached is a patch against OpenBSD, based in part on the owl-always-auth
patch.
The idea is that the only way out of auth_passwd for the failure case is
the "return 0" at the bottom.
I don't know if this is a good way to do it or not, it's presented for
discussion.
Also, I don't think 3.6.1p2 is quite right WRT these timing issues (eg,
you get a fast failure
2000 Aug 27
0
patch for TIS (skey/opie) *and* passwd auth via PAM
Hello,
appended is a patch that makes it possible to use PAM both for
password authentication and TIS (i.e. s/key or opie or any other
interactive challenge/response scheme). I have developed this starting
from the patch at http://www.debian.org/Bugs/db/61/61906.html on
Debian with openssh-2.1.1p4-3. After configuring ssh with
--with-pam-tis, there are two PAM services, "sshd" and
2000 Oct 15
1
Patch for Digital Unix SIA authentication
A while back, I sent in a patch that added Digital Unix SIA
authentication to OpenSSH. Well, I just figured out that it didn't
handle everything correctly (locked accounts could still log in). I
thought I had checked that, but I guess I missed it.
Anyway, here is a patch against OpenSSH 2.2.0p1 that fixes this.
--
Chris Adams <cmadams at hiwaay.net>
Systems and Network Administrator
2001 Mar 05
0
Portable openssh-2.5.1p1, auth-passwd.c, yellow pages, expire field
Hi,
I'm having trouble with auth_password() failing on my linux box using
yellow pages. I've tracked the problem down to the following:
pw_password = "RMf.YivanoZc2,o01N"
encrypted_password = "RMf.YivanoZc2"
This fails on the return(strcmp(encrypted_password, pw_password) == 0).
because crypt() only returns 13 characters. I seem to remember the
2005 Aug 26
0
Patch for UnixWare 7
Hi Openssh developers,
Attached please find patch to support long passwords (> 8-char) on
UnixWare 7.
Thanks,
Ahsan
--
Ahsan Rashid
Escalations Research Group arms at sco.com
The SCO Group Inc., Murray Hill, NJ 908 790 2279
-------------- next part --------------
--- openssh/CREDITS.old 2004-05-26 16:59:31.000000000 -0700
+++ openssh/CREDITS 2005-08-25 13:53:08.602447006 -0700
@@ -3,6 +3,7
2006 Sep 14
3
[PATCH] PermitRootLogin woes
Hi all,
among other things, we provide shell access to various unix based
platforms for our students and university staff. Recently, there has been
increasing number of root login attacks on one particular Tru64 machine
running OpenSSH.
The host is configured with "PermitRootLogin no" but every once in a while
SIA auth with TCB enhanced security locks the root account.
I suppose
2002 Jun 14
1
[PATCH]: auth-passwd.c: Eliminate a Cygwin special case
Hi,
as it turned out on the Cygwin mailing list, the special handling
of empty password in auth-passwd.c when running under Windows NT
results in problems.
Cause: The authentication methode "none" calls auth_password()
with an empty password. A piece of HAVE_CYGWIN code allows empty
passwords even if PermitEmptyPasswords is set to "no". This in
turn results in calling
2001 Nov 07
2
Flaw in empty password authentication in sshd
The auth-pam.c of sshd server contains a small flaw that allows empty
password logins even if "PermitEmptyPasswords" option in the sshd config
file is set to "no". The scenario is as follows:
Using ssh the user tries to logon to the machine using an account that has
empty password. If the user presses enter on the password prompt (NULL
password) access is
2002 Nov 20
0
[PATCH #9] Password expiration via /bin/passwd.
This is an attempt to simplify the AIX expiry-via-passwd stuff and make
it more generic. (There's actually a net reduction in #ifdefs).
Patch against CVS:
1) configure finds passwd.
2) sshd uses passwd during session if required.
3) sshd uses passwd for PAM change if privsep disabled.
4) sshd uses Buffers for expire and post-login messages (no longer AIX
specific).
5) password_change_required
2001 Oct 09
1
TISviaPAM patch
Here is a patch that does TIS auth via PAM. It's controlled by a switch
in the sshd_config. You'd use it by having a PAM module that sets
PAM_PROMPT_ECHO_ON. eg, you could use it with pam_skey or pam_smxs.
The patch is against the 2.9.9p2 distribution.
I'm not on the list, a reply if this patch is accepted would be great.
(But not required, I know some folks have a distaste for
2000 May 12
0
SunOS 4.x port
This is based on openssh-2.0.0beta1. There are a few rough spots:
1) SunOS doesn't have ut_type in struct utmp so I just whacked
in the old login() from openssh-1.2.3.
2) There is a SUNOS4 section added to defines.h -- this could probably
be a bit cleaner.
3) sigaction on SunOS is implemented via #defines to sigvec, thus there
is no SA_RESTART (this is the default behavior).
2001 Mar 01
1
Bug report against openssh-2.3.0p1
I am writing to report a bug in openssh-2.3.0p1, and to suggest
a fix.
I have OpenSSH installed on a Solaris 8 box. The output of
uname -a is:
> SunOS dipper.csi.cam.ac.uk 5.8 Generic_108528-06 sun4u sparc SUNW,Ultra-5_10
OpenSSH was configured with the following options:
> ./configure --prefix=/jackdaw --with-default-path=/jackdaw/bin:/usr/bin
On this OS, with this configuration, it
2001 Feb 12
1
pam protocol 1 fix
is this ok?
symptom is:
debug1: Starting up PAM with username "stevesk"
debug1: Trying to reverse map address 127.0.0.1.
debug1: PAM setting rhost to "localhost"
debug1: Attempting authentication for stevesk.
debug1: PAM Password authentication for "stevesk" failed[9]: Authentication failed
Failed rsa for stevesk from 127.0.0.1 port 49568
Index: auth1.c
2003 Jan 29
2
PermitRootLogin=yes no longer lets root login
Hi All,
While testing another patch, I found that I could not longer log in as
root, even if PermitRootLogin was yes. It seems to be the following
code in auth_password:
$ cvs diff -r1.48 -r1.49 auth-passwd.c
[snip]
#ifndef HAVE_CYGWIN
- if (pw->pw_uid == 0 && options.permit_root_login != PERMIT_YES)
+ if (pw->pw_uid == 0 && options.permit_root_login !=
2003 Jan 29
0
[PATCH] features for restricted shell environments
The patch below implements a couple of features which are useful
in an environment where users do not have a regular shell login.
It allows you to selectively disable certain features on a
system-wide level for users with a certain shell; it also allows
you to control and audit TCP forwarding in more detail.
Our system is an email server with a menu for the login shell;
we selectively allow port
2003 Sep 08
2
Variable declarations in xcrypt.c
Hi All.
I noticed that xcrypt.c now has some variable declarations after code
within a block (for some sets of #ifdef's). Won't that choke some
compilers? Should it do something like the attached?
--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69
Good judgement comes with experience. Unfortunately, the experience
usually
2003 Jul 09
0
[PATCH] Add expired password handling for AIX.
Hi All.
Attached is a patch which adds AIX native password expiry support to
sshd. It will only apply to -current and is a subset of the patch I have
been working on in the last few months (see bug #14 [1]). It contains
code by Pablo Sor, Mark Pitt and Zdenek Tlusty and fixes for bugs reported
by many others (see [2] for a full list).
It adds a do_tty_change_password function that execs
2001 Jun 19
0
Empty password patch
For every (successful) ssh-connection we got an additional annoying entry
in /var/log/messages like the following:
Jun 19 09:06:57 LIN3135 pam_afs[5913]: AFS Won't use illegal password for
user usenbinz
The OpenAFS PAM module posts this message when it is called for
authentication with an (disallowed) empty password. The simple patch below
checks PermitEmptyPasswords in sshd_config before
2015 Jul 17
0
[PATCH 1/2] mllib: add and use read_first_line_from_file
Move the read_password_from_file helper in Password to mllib with a more
generic name, and use it in place of the former.
Also, use it in v2v instead of reading the whole file contaning a
password: given that the documentation says that the whole content is
used, there will not be newlines in the password file, so the behaviour
will be preserved. The oly difference is that newline is no more an