Displaying 20 results from an estimated 700 matches similar to: "Patch to restrict other auth methods from allowing root password authentication"
2003 Apr 22
2
Kerberos password change patch
Attached is a patch that allows for an interactive Kerberos password
change via keyboard-interactive, and also reports any banners received
from krb5_g_i_c_p() (e.g., password expiration notification if you have
krb5-1.2.x patched appropriately).
This could probably be refactored a bit and probably done better, but
I'm sending this in in case anyone finds it useful.
The major drawback is
2006 Mar 23
1
Samba PDC/Windows BDC domain sync
I have everything in place to move to a Samba/Heimdal/OpenLDAP auth
database and have just discovered that some of the Windows products
we use are required to run on a domain controller. Since domain
sync doesn't work between Samba and NT4 it looks like I'm stuck:
either ditch all the software we run on domain controllers, stay with
our current 2-auth-db system, or move at least our
2003 May 01
2
Kerberos password auth/expiry kbdint patch
I took Markus Friedl's advice and set up a KbdintDevice for Kerberos
password authentication/expiry. It took me a bit to wrap my head
around privsep, but I think it's working properly (code stolen
shamelessly from FBSD's PAM implementation :->).
The hardest part was working out how to get the interaction
between krb5_get_init_creds_password() (along with the prompter)
to work
2006 Nov 01
0
No subject
of the remotely connected socket is in in monitor_read(). The easiest way to
pass them in would be to add fields to the Authctxt structure, which gets
passed down into auth_krb5_password(), although possibly not the best. Perhaps
using a prompter isn't the best way to go, either, I'm not sure.
Ultimately, I'm simply looking for any pointers as to the best way to proceed,
even if
2006 Mar 01
1
Patch to src/auth/mech-gssapi.c
This bug causes a segfault when compiled against heimdal, but not
MIT krb5. Either way, I think this code is correct.
HTH.
----------------------------------------------------------------------
| Jim Hranicky, Senior SysAdmin UF/CISE Department |
| E314D CSE Building Phone (352) 392-1499 |
| jfh at cise.ufl.edu
2003 Sep 22
4
[Bug 701] With 'PermitRootPassword without-password' set, root w/pass can still log in with a using 'keyboard-int/pam'
http://bugzilla.mindrot.org/show_bug.cgi?id=701
Summary: With 'PermitRootPassword without-password' set, root
w/pass can still log in with a using 'keyboard-int/pam'
Product: Portable OpenSSH
Version: 3.7.1p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority:
2003 May 15
2
[Bug 568] Kerberos password auth/expiry kbdint patch
http://bugzilla.mindrot.org/show_bug.cgi?id=568
Summary: Kerberos password auth/expiry kbdint patch
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P4
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
2003 Jan 29
2
PermitRootLogin=yes no longer lets root login
Hi All,
While testing another patch, I found that I could not longer log in as
root, even if PermitRootLogin was yes. It seems to be the following
code in auth_password:
$ cvs diff -r1.48 -r1.49 auth-passwd.c
[snip]
#ifndef HAVE_CYGWIN
- if (pw->pw_uid == 0 && options.permit_root_login != PERMIT_YES)
+ if (pw->pw_uid == 0 && options.permit_root_login !=
2002 Jul 30
0
patch: disable credential forwarding after password auth.
Dear list,
since the order of authentication and AFS token/KRB TGT forwarding
changed (around 3.0), we have had problems with users accidentally
overwriting their credentials from a "password" login with forwarded
credentials. E.g. user A logs in as user B, but stays with the AFS
permissions of user A. A workaround is to use "-k" on these sessions,
but "it worked without
2006 Sep 14
3
[PATCH] PermitRootLogin woes
Hi all,
among other things, we provide shell access to various unix based
platforms for our students and university staff. Recently, there has been
increasing number of root login attacks on one particular Tru64 machine
running OpenSSH.
The host is configured with "PermitRootLogin no" but every once in a while
SIA auth with TCB enhanced security locks the root account.
I suppose
2003 Mar 20
4
Call for testing for 3.6: password expiry?
I have tried this patch (against 3.5p1) and would very much like it to be in the OpenSSH 3.6p1 release, if possible:
http://bugzilla.mindrot.org/show_bug.cgi?id=14
On that note, I'd like the Sun BSM patch to be included also, if possible. I have it working applied to 3.5p1:
http://bugzilla.mindrot.org/show_bug.cgi?id=125
In fact, both patches work together, apparently.
If I have any
2002 Jun 14
1
[PATCH]: auth-passwd.c: Eliminate a Cygwin special case
Hi,
as it turned out on the Cygwin mailing list, the special handling
of empty password in auth-passwd.c when running under Windows NT
results in problems.
Cause: The authentication methode "none" calls auth_password()
with an empty password. A piece of HAVE_CYGWIN code allows empty
passwords even if PermitEmptyPasswords is set to "no". This in
turn results in calling
2000 Jan 27
1
Long awaited round 1 of NeXT patches.
This is about 90% of the core work. I omited a few files from the patch
set since they are basicly small blocks of #ifndef HAVE_NEXT/#endif to
get it to compile.
Daimen, feel free to let me know what you applied and what your
rejecting and why.. so I can work on cleaning things up.
Andre, Only thing of note you may want to look into is NeXT does not
use "ut_user" in it's lastlog.
2001 Feb 08
0
BindView advisory: sshd remote root (bug in deattack.c)
Remote vulnerability in SSH daemon crc32 compensation attack detector
-----------------------------------------------------------------------
Issue date: 8 February 2001
Author: Michal Zalewski <lcamtuf at razor.bindview.com>
Contact: Scott Blake <blake at razor.bindview.com>
CVE: CAN-2001-0144
Topic:
Remotely exploitable vulnerability condition exists in most ssh daemon
2003 Aug 09
0
Timing attacks and owl-always-auth
Hi All.
Attached is a patch against OpenBSD, based in part on the owl-always-auth
patch.
The idea is that the only way out of auth_passwd for the failure case is
the "return 0" at the bottom.
I don't know if this is a good way to do it or not, it's presented for
discussion.
Also, I don't think 3.6.1p2 is quite right WRT these timing issues (eg,
you get a fast failure
2012 Mar 23
0
CFP: Special Issue on Cloud Computing in Science & Engineering, in the the IEEE Computing in Science & Engineering (CiSE)
*Call for Papers*
*IEEE Computing in Science & Engineering*
**
*Special Issue on Cloud Computing in Science & Engineering*
http://www.computer.org/portal/web/computingnow/cise **
*Submissions due: November 04, 2012*
*Estimated Publication date: July/August, 2013*
Cloud computing has emerged as a dominant paradigm that has been widely
adopted by enterprises. Clouds provide on-demand
2012 Mar 23
0
CFP: Special Issue on Cloud Computing in Science & Engineering, in the the IEEE Computing in Science & Engineering (CiSE)
*Call for Papers*
*IEEE Computing in Science & Engineering*
**
*Special Issue on Cloud Computing in Science & Engineering*
http://www.computer.org/portal/web/computingnow/cise **
*Submissions due: November 04, 2012*
*Estimated Publication date: July/August, 2013*
Cloud computing has emerged as a dominant paradigm that has been widely
adopted by enterprises. Clouds provide on-demand
2005 Nov 09
2
Solaris 8 password inactivity with openssh
All,
We have recently updated our password aging to include setting inactivity days. We are running ossh 4.1p1 in a Solaris 8 environment. It appears that ossh isn't picking up on inactivity. Accounts that have been inactive still prompt to change passwords - if you telnet the same servers you get kicked out immediately. On the Solaris 9 servers running SUN's ssh the inactive accounts are
2002 Jun 07
4
openssh for UWIN
I am enclosing a context diff of the changes that I made to get
openssh working on UWIN. UWIN is a UNIX operating system layer
that runs on Win32 systems. For more information on UWIN
go to http://www.research.att.com/sw/tools/uwin/.
I also ran configure using -with-cppflags=-D_BSDCOMP=2. I don't
know where that information would go with the source code.
Let me know if you need more
2006 Apr 25
1
NIS - netgroup
Hello;
Sorry for the crosspost/repost, but I am getting desparate here.
I am having difficulties setting up ssh (ossh4.3p2 - NIS -Solaris8/Sparc) to
authenticate and allow ossh access based on NIS netgroup. So, users and/or
host should be from a valid netgroup triple, contained within the ossh
servers .rhosts, .shosts, hosts.equiv and/or shosts.equiv.
I am having alot of trouble getting NIS