similar to: newbie: Verification of the downloaded Samba source

Displaying 20 results from an estimated 20000 matches similar to: "newbie: Verification of the downloaded Samba source"

2004 Feb 10
1
Bad signature in samba sources?
Hello What should I do in this case? It seems the signature of Samba sources is bad. I tried downloading from CZ and FI mirrors and both had the same problem. I got this key by bash-2.05b$ gpg --keyserver wwwkeys.pgp.net --recv-keys 2F87AF6F gpgkeys: WARNING: this is an *experimental* HKP interface! gpg: key 2F87AF6F: "Samba Distribution Verification Key <samba-bugs@samba.org>"
2015 Dec 11
4
Support for ChallengeResponseAuthentication in Match section
Hi, I'm using 2-factor authentication (pubkey+googe_authenticator) and have an issue with rsync. It's configured to use pubkey to authenticate to server so when google_authentication is bypassed by not creating .google_authenticator file for particular user (thanks to nullok option in PAM) it still sends to stderr "Authenticated with partial success." message although it
2006 Feb 16
4
newbie question regarding basic AJAX form verification
Hi, I''m confused about how form verification with AJAX works. Let''s say I have a ''new.rhtml'' view that contains a form with two fields, and the form action is ''create''. Let''s assume that I also want to do some type of data validation on one of the two fields via AJAX before I submit the form. But since I''ve already
2008 Jan 04
2
[Bug 1426] New: ssh key verification hint (on remote side)
https://bugzilla.mindrot.org/show_bug.cgi?id=1426 Summary: ssh key verification hint (on remote side) Classification: Unclassified Product: Portable OpenSSH Version: 4.7p1 Platform: Other OS/Version: Linux Status: NEW Severity: enhancement Priority: P2 Component: sshd AssignedTo: bitbucket at
2015 Apr 28
2
CentOS 6.6 x86_64, rpm error: rpmdbNextIterator: skipping h# ...
Hi All, I had some health issues for a few months and I barely recall dealing with Heartbleed ... it's all just a blur. Now I'm getting back up to speed, but I have a pair of CentOS 6.6 x86_64 + Virtualmin 4.13 GPL servers which no longer seem to be picking up available updates. 'yum check' ran for about 25 minutes this evening on one of them and returned nothing useful. rpm -qa
2013 Apr 04
2
AuthorizedKeysCommand question
Hi, is there a particular reason why this feature is "user" based and not "user-pubkey" based? What I mean is that it works for installation with small number of pubkeys per user. But imagine i.e. a GitHub scale - all users logging in as user "git". On each auth request all the keys from database would be fetched and feeded to OpenSSH. Now I am only asking this out
2004 Mar 22
1
PermitRootLogin issues
Hello, I'm currently experiencing the issue laid out in this thread from last year: http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=106908815129641&w=2 The discussion that ensued resulted in a number of ideas on how best to 'fix' this issue. The two that seemed most reasonable were: 1. implement a pubkey-only option to PermitRootLogin that would only allow root to login
2011 Dec 23
2
yum --import of RPMforge
Using the instructions on: http://wiki.centos.org/AdditionalResources/Repositories/RPMForge#head-f0 c3ecee3dbb407e4eed79a56ec0ae92d1398e01 I enter the command: rpm --import http://apt.sw.be/RPM-GPG-KEY.dag.txt and it comes back to the prompt, like it worked, but attempting to confirm the download: rpm -K rpmforge-release-0.5.2-2.el6.rf.*.rpm results in: error:
2005 Oct 29
1
how to restrict rscync to ONLY use ssh-pubkey transport & auth?
-----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 hi all, i have two OSX boxes set up for ssh via pubkey auth only. i'm setting up rsync comms for the first time. i have rsyncd running on box A. no-auth rsync from box B to/from box A's rsyncd works as expected. rsync@B to/from rsyncd@A using pubkey-auth'd-ssh trasport: rsync --verbose --stats --recursive -e "ssh -F
2013 Mar 24
6
[Bug 2082] New: Please add pubkey fingerprint to authentication log message
https://bugzilla.mindrot.org/show_bug.cgi?id=2082 Bug ID: 2082 Summary: Please add pubkey fingerprint to authentication log message Classification: Unclassified Product: Portable OpenSSH Version: 6.2p1 Hardware: All OS: All Status: NEW Severity: enhancement Priority: P5
2017 May 24
1
gpg import and verify
thewolf at xxxthewolf:~/samba$ gpg --import samba-pubkey.asc  gpg: key 6F33915B6568B7EA: "Samba Distribution Verification Key <samba-bugs at samba.org>" not changed gpg: Total number processed: 1 gpg:              unchanged: 1 thewolf at xxxthewolf:~/samba$ gpg --verify samba-4.6.4.tar.asc  gpg: assuming signed data in 'samba-4.6.4.tar' gpg: Signature made ter 23 mai
2012 Jan 20
2
Regarding Pubkey Enumeration
HD Moore from MetaSploit has noted that, given a pubkey (and not the corresponding private key, as might be found in authorized_keys), he can determine if he'd be able to log into an account. It's a small thing, but he's using it for very interesting recon/deanonymization. He'll be releasing a paper shortly, not overplaying the characteristic, but certainly showing it can be used
2002 Dec 20
1
Installation of SAMBA 2.2.7a
Hello, I had downloaded the samba 2.2.7a tarball, the pubkey and the samba-2.2.7a.tar.asc files from your website. The import of the samba-pubkey.asc works probably, but by the verify I get the errormessage that no path to this signature is defined and the signature can't verified. The distribution of Linux is the SuSE 8.0 and I used this lines. gpg --import samba-pubkey.asc
2024 Aug 15
2
Certificates are not trusted
Hi, After returning home from holiday I tried to update my Fedora installation with the command 'sudo dnf update -y'. This command now terminates with the following error: error: Verifying a signature using certificate 3124D2EF76DA4D972F6BE4AC9D60CBB71A3B4456 (iucar_cran (None) <iucar#cran at copr.fedorahosted.org>): 1. Certificiate 9D60CBB71A3B4456 invalid: certificate is
2020 Jun 03
2
Auth via Multiple Publickeys, Using Multiple Sources, One Key per Source
Peter, On 2020-06-03 12:14, Peter Stuge wrote: > mailto428496 wrote: >> We would like to associate two different types of public keys >> with each user's account.? One would be a "client machine" public key >> (of which there could be several, if the user is allowed to login from >> multiple systems) and the other would be a public key from a user token,
2003 Nov 14
2
Samba 3.0.1pre3 available for download
This is another preview release of the Samba 3.0.1 code base and is provided for testing only. This release is *not* intended for production servers. Use at your own risk. There have been several bug fixes since 3.0.0 that we feel are important to make available to the Samba community for wider testing. This release does fix a few core dumps in the 3.0.1pre2 release and corrects point-n-print
2003 Nov 14
2
Samba 3.0.1pre3 available for download
This is another preview release of the Samba 3.0.1 code base and is provided for testing only. This release is *not* intended for production servers. Use at your own risk. There have been several bug fixes since 3.0.0 that we feel are important to make available to the Samba community for wider testing. This release does fix a few core dumps in the 3.0.1pre2 release and corrects point-n-print
2013 Feb 14
1
auth2-pubkey.c - change an error message
Hi. The error message 'AuthorizedKeyCommandUser \"%s\" not found' in user_key_command_allowed2() should inform about non-existing username, not about command. --- auth2-pubkey.c 14 Nov 2012 08:04:02 -0000 1.36 +++ auth2-pubkey.c 14 Feb 2013 16:50:04 -0000 @@ -480,7 +480,7 @@ pw = getpwnam(username); if (pw == NULL) { error("AuthorizedKeyCommandUser
2013 Apr 04
1
OpenSSH 6.2 Not Allowing Pubkey Auth
I'm running a Debian VPS that was originally configured with OpenSSH 5.5 and I could use pubkey auth without issue. A few days ago, I decided to compile and install OpenSSH 6.2 for the AES-GCM support, and now I cannot login to my server with pubkey auth. I can't seem to figure out what the problem is, and when I replace the new sshd with the one originally included with my server, it
2003 Feb 09
1
Logging of comments on keys
Hi, during our usual work I found it anoying that one can not easily see who logged in using public key authentication. In newer versions of SSH the fingerprint of the public key gets logged, but who can tell which key belongs to whom from his head? So I wrote a little ad-hoc patch (vs. 3.5.p1) so that the comment field on the keys in the authorized_keys[2] files get logged to make life