Displaying 20 results from an estimated 2000 matches similar to: "Generating Encrypted smbpasswd file"
2002 Feb 12
4
SRP Patch Integration?
>Simply stated, SRP is a strong password authentication protocol that
>resists passive/active network attack, and when used in conjunction with
>OpenSSH, solves the "unknown host key" problem without requiring host
>key fingerprint verification or PKI deployment (e.g. X.509 certs). Put
>another way, is there any good reason *not* to fold these patches into
>OpenSSH
2000 Mar 30
1
reconsider SRP, it's way cool
I just joined the list, and I see in the archives that about a month ago
there was a brief discussion of SRP, but it was dismissed.
I urge people to take a look at this site:
http://srp.stanford.edu/srp/
It's very cool.
Let's say I'm on vacation visiting a friend, and I want to log in to
my account back home. I trust my friend's machine, but I don't have
my home
2003 Sep 17
4
SRP secure remote password authentication
Are there any plans to include support for SRP or a similar zero-knowledge password
protocol into OpenSSH?
--
Jeremy
2001 Apr 03
2
the "primes" file
In message <Pine.LNX.4.30.0104031615270.8678-100000 at holly.crl.go.jp>, Tom Holro
yd writes:
>SRP has different requirements from Diffie-Hellman. In particular,
>for SRP the generator must be primitive. It turns out that the "primes"
>file contains only safe primes with primitive generators, and is thus
>ideal for SRP, but so far in OpenSSH it has only been used for
2001 Mar 30
2
BETA release of OpenSSH-2.5.2p2 with SRP
This is to announce the availability of SRP (Secure Remote Password)
support for OpenSSH. A tarball is available on Tripod:
http://members.tripod.com/professor_tom/archives/
http://members.tripod.com/professor_tom/archives/openssh-2.5.2p2-srp5.tar.gz
(Note: Tripod requires you to LEFT click on links to download files.)
To install, unpack, configure --with-srp, and make install, then create an
2004 Aug 02
1
OpenSSH SRP 3.8.1p1 patch
G'day,
First off, I'm not subscribed to the list, so if there are any responses that
should be directed to me, feel free to CC me in :)
The below url is an updated patch of Professor Tom's earlier SRP patches for
SSH. The only things changed was so that it would compile on a newer openssh
version. For more information regarding SRP, see http://srp.stanford.edu
This isn't
2000 Feb 24
1
Making password driven SSH 'immune' to MTM attacks.
[I know this is the 'port' list, but I can't find a better place to post
this, and with the garbage going on @slashdot I figured I'd get this out.
This belongs on sci.crypt or a general OpenSSH mailing list]
First, a quick rehash of stuff everyone here already knows,
OpenSSH can use two major forms of authentication:
1. Password
2. RSA keys
The RSA method is good because it
2001 May 01
3
SRP unencumbered license statement
On Sun, 29 Apr 2001, RJ Atkinson wrote:
> At 06:26 27/04/01, Tom Wu wrote:
> >For those of you who were following the discussion about the new draft
> >and implementation of SRP-based password authentication in OpenSSH, I
> >promised to have Stanford issue the IETF an official, explicit,
> >statement reiterating the unencumbered royalty-free licensing terms.
> >The
2011 Jan 22
1
SRP for OpenSSH
Hello all
Support for Secure Remote Password (SRP) for OpenSSH was last discussed in 2004:
http://marc.info/?l=openssh-unix-dev&w=2&r=1&s=SRP&q=b
There's a SRP patch for OpenSSL that's about 2 years in the making:
http://rt.openssl.org/Ticket/Display.html?id=1794
Tom Wu from Stanford has been working on that.
Has anything changed since 2004 that would make inclusion
1998 Jun 08
27
Services not required?
I''m in the process of locking down as much of my systems here
as possible as to available ports. I am down to only a handful
but am not sure how much of a security risk they pose and was
wondering if anyone here might be able to comment, or suggest
secure versions to run:
21/FTP (WU-ftpd v2.4.2 BETA 14)
22/SSH (1.22)
23/TELNET (Netkit 0.09)
25/SMTP (Sendmail
2002 Jun 18
1
remote rsync process dies, local hangs
I've got an rsync job which is consistently failing, but I've been
unable to diagnose the problem. FAQ/Google/docs/etc. checked and
no luck.
Basically, it looks like the rsync process invoked on the far end
is exiting, and then the local process waits until the timeout and
exits.
Both systems are Sun boxes, Ultra 10 or better with 256+ MB of memory.
Rsync version is 2.5.0 on the local
2023 Apr 12
2
LAPS support
Op 12-04-2023 om 09:57 schreef Rowland Penny via samba:
>
>
> On 12/04/2023 08:51, Kees van Vloten via samba wrote:
>>
>> Op 12-04-2023 om 09:47 schreef Arnaud FLORENT via samba:
>>> Hello everybody
>>>
>>>
>>> does/will samba AD support t LAPS GPO ?
>>>
>>>
2018 Jul 30
2
2.3.2.1 - EC keys suppport?
>>>>>> facing [ no shared cipher ] error with EC private keys.
>>>>> the client connecting to your instance has to support ecdsa
>>>>>
>>>>>
>>>> It does - Thunderbird 60.0b10 (64-bit)
>>>>
>>>> [ security.ssl3.ecdhe_ecdsa_aes_256_gcm_sha384;true ]
>>>>
>>>> It seems there is
2018 Jul 30
2
2.3.2.1 - EC keys suppport?
>>>> facing [ no shared cipher ] error with EC private keys.
>>> the client connecting to your instance has to support ecdsa
>>>
>>>
>> It does - Thunderbird 60.0b10 (64-bit)
>>
>> [ security.ssl3.ecdhe_ecdsa_aes_256_gcm_sha384;true ]
>>
>> It seems there is a difference between the private key (rsa vs. ecc ->
>>
2013 May 07
1
Syslinux 5.01 fails to boot iPXE
I have an issue to boot iPXE with Syslinux 5.01. However, the same
method works for Syslinux 4.06.
The error messages I got is (see attached png file):
===================================
iPXE 1.0.0+git-20120202.f8840ba-3 -- Open Source Network Boot Firmware
-- http://ipxe.org
Features: VLAN HTTP iSCSI DNS TFTP AoE SRP BzImage COMBOOT ELF MBOOT PXE
PXEXT
/syslinux/ipxe.lkn: command not found
2014 Dec 02
4
disabling certain ciphers
On Mon, Dec 01, 2014 at 09:27:48PM -0800, Darren Pilgrim wrote:
> On 12/1/2014 4:43 PM, Will Yardley wrote:
> > Can you use both ssl_protocols *and* ssl_cipher_list in the same config
> > (in a way that's sane)?
>
> > Is there a way to exclude these ciphers, while still keeping my config
> > easy to parse and avoiding duplicative or deprecated configs?
>
>
2017 Apr 26
3
Apache + SSL: default configuration rated "C" by Qualys Labs
On 26 April 2017 at 13:16, Steven Tardy <sjt5atra at gmail.com> wrote:
>
>> On Apr 26, 2017, at 2:58 AM, Nicolas Kovacs <info at microlinux.fr> wrote:
>>
>> The site is rated "C"
>
> The RHEL/CentOS out-of-the-box apache tls is a little old but operational. This Mozilla resource is excellent for getting apache tls config up-to-date.
>
>
2001 Apr 03
1
user:style
I noticed that (perhaps because ':' is invalid in a username) you can
say ssh -l user:style host, where the "user:style" is sent by the client,
and the server strips the ":style" part off and makes it available as
part of the authentication context. It's currently unused.
What are the plans for this, if any? I was experimenting with the idea of
using it with SRP
2019 Oct 28
3
changing cipher for imap clients
When my client connects, I see this in my log:
dovecot: imap-login: TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128
bits)
Whereas, when client connects to my postfix server, I see:
Anonymous TLS connection established from * TLSv1 with cipher
ECDHE-RSA-AES256-SHA (256/256 bits)
how can I tell dovecot to use AES256, instead of AES128 ?
is this set by ssl_cipher_list ? Here are my current
2010 Apr 08
1
ZFS monitoring - best practices?
We''re starting to grow our ZFS environment and really need to start
standardizing our monitoring procedures.
OS tools are great for spot troubleshooting and sar can be used for
some trending, but we''d really like to tie this into an SNMP based
system that can generate graphs for us (via RRD or other).
Whether or not we do this via our standard enterprise monitoring tool
or