Displaying 20 results from an estimated 500 matches similar to: "Proposed libguestfs API for implementing libvirt virConnectOpenAuth"
2012 Oct 13
0
[PATCH] New APIs: Model libvirt authentication events through the API.
From: "Richard W.M. Jones" <rjones at redhat.com>
This commit models libvirt authentication events through the API,
adding one new event (GUESTFS_EVENT_LIBVIRT_AUTH) and several new
APIs:
guestfs_set_libvirt_supported_credentials
guestfs_get_libvirt_requested_credentials
guestfs_get_libvirt_requested_credential_prompt
guestfs_get_libvirt_requested_credential_challenge
2015 Oct 22
1
Centos User Privileges.
On 10/22/2015 2:20 AM, John Hodrien wrote:
> On Thu, 22 Oct 2015, Alessandro Baggi wrote:
>
>> Hi J,
>> thank you for the suggestion. Why team make this possible? What is
>> the purpose?
>
> It's a nice flexible setup for a workstation situation. I can have
> CentOS
> installed on a workstation, and allow users to reboot it as long as
> there's
2010 Feb 10
3
saslauthd attack
I'm seeing a lot of activity over the last two days with what looks to
be a kiddie script. Mostly trying to access several of our servers with
the username anna. All failed... in fact I don't think we have a user
anna on any of our servers. Meanwhile...
I'm running Sendmail. This pertains to Centos 4 and 5 servers. I'm also
running fail2ban on some and Ossec on others. So far,
2017 Sep 21
6
prevent users from fiddling with network?
Dear Experts,
"this is system from the hell!"
Than was my first reaction when I realized that logged in with GUI (X11)
user can turn off (and on) network interfaces. Without being in sudoers
file. Wow, this is scary to see on workstations I manage centrally. Even
though I did consider local user to be able to execute the command
"shutdown" (which distinguished RedHat and
2019 Apr 23
0
[nbdkit PATCH 6/7] nbd: Implement NBD_OPT_GO client request
The NBD spec was recently patched (nbd.git commit 7827f3ae and friends)
to require NBD_OPT_GO for baseline interoperability, with the aim of
fewer servers and clients falling back to NBD_OPT_EXPORT_NAME. And
since nbdkit as server recently started supporting NBD_OPT_GO (commit
f7dd9799), our nbd client as plugin should take advantage of it.
This patch is a prerequisite to teaching the nbd plugin
2019 Jun 14
0
[libnbd PATCH 5/7] states: Factor out NBD_REP payload prep
Instead of repeating a check for valid reply headers in each sub-state
machine, let's have a common helper function do all the
work. Additionally, a central location will make it easier to
uniformly capture any NBD_REP_ERR message payloads.
---
generator/generator | 8 +--
generator/states-newstyle-opt-go.c | 40 +++----------
2017 Oct 17
2
Auth failure messages
Folks
I am using sendmail as my mail server. SELINUX is disabled.
I observe messages in Centos 7 (and 6) in /var/log/messages, similar to:
saslauthd[2765]: do_auth : auth failure: [user=bettie]
[service=smtp] [realm=] [mech=pam] [reason=PAM auth error]
I guess that this is because somebody tried to access one of the SMTP
ports with a logon attempt. This is understandable; there are
2005 Mar 15
0
cyrus - sieveshell - su - named issues (selinux?) on
sieveshell cannot connect as any user
Mar 14 23:53:45 srv1 saslauthd[22038]: do_auth : auth failure:
[user=root] [service=sieve] [realm=] [mech=shadow] [reason=Unknown]
Mar 14 23:53:45 srv1 sieve[22047]: Password verification failed
Mar 14 23:53:45 srv1 perl: No worthy mechs found
Mar 15 00:01:54 srv1 saslauthd[22164]: do_auth : auth failure:
[user=root] [service=sieve] [realm=]
2019 May 30
0
[nbdkit PATCH 3/4] nbd: Use libnbd 0.1
This conversion should be feature compatible with the standalone nbd
code. Note that the use of libnbd makes the binary for this particular
plugin fall under an LGPLv2+ license rather than BSD; but the source
code in nbd.c remains BSD.
A lot of code simply disappears, now that I'm no longer directly
utilizing the NBD protocol files but relying on libnbd. Coordination
between threads from
2019 Jun 12
0
[nbdkit PATCH v3 3/5] nbd: Use libnbd 0.1.3+
This conversion should be feature compatible with the standalone nbd
code. Note that the use of libnbd makes the binary for this particular
plugin fall under an LGPLv2+ license rather than BSD; but the source
code in nbd.c remains BSD.
A lot of code simply disappears, now that I'm no longer directly
utilizing the NBD protocol files but relying on libnbd. Coordination
between threads from
2020 Mar 19
1
[nbdkit PATCH] nbd: Drop nbd-standalone fallback
When we first used libnbd (nbdkit 1.14), it was brand new, so we left
in the ability to build a limited nbd plugin without the use of libnbd
for comparison. But now that libnbd has had more time under its belt,
and we have learned that our nbd-standalone code is not getting much
testing, it's time to follow through with our plan to finish off the
old code, and now build the nbd plugin only
2005 Sep 19
1
pam and sasl2-sample-server failure
I'm setting up a postfix server using "The Book of Postfix". In ch 15
there is a section on testing saslauthd which I can't get to work. I
can get it to work using shadow password authentication, but it fails
on pam. I don't kow squat about troubleshooting pam. Any PAM wizzes
out there that can help? I saw a unrelated post talking about
something needing to be in the pam
2008 May 25
1
saslauthd for sendmail SMTP relay
Hi,
I'm running a Centos 5.1 server that uses saslauthd to allow sendmail
SMTP relaying for some clients. saslauthd is configured to use method
"shadow" to lookup the username / password directly from /etc/shadow.
This setup has been working for several month now, but is broken since
last Monday. I haven't changed anything neither on the server nor on
the clients. Now whenever a
2017 Apr 26
4
saslauth logging
Hi
Not sure whether this is the correct list to ask ... if it's not please direct me to the correct one.
Is it possible on to log a bit more detail when auth failure occurs when using saslauthd?
saslauthd[2119]: do_auth : auth failure: [user=DELETED] [service=smtp] [realm=DELETED] [mech=pam] [reason=PAM auth error]
What I want is the IP address and if possible the incorrect password
2009 Aug 26
3
saslauthd
Hello,
I'm having trouble to get saslauthd running on a centos-5.3. I can't
autheticate via testsaslauthd. Here's what I do using a fresh /etc/sasldb2:
1) start saslauthd in debug mode: saslauthd -d -a shadow -O
/usr/lib64/sasl2/smtpd.conf -r -l
2) saslpasswd2 -c -a mail -u mail testuser
3) testsaslauthd -u testomat -p <mypassword> -s smtp -r mail
shell output of
2006 Jul 02
3
2 before_filters, only want one to render something
I have two before_filters for a few of my controllers. They are running
my own methods authorize and admin_authorize. authorize is called on
just about every action to make sure that a user is logged in.
admin_authorize is called on about 80% of the actions and is used to
make sure that a user is an administrator. If a user tries to access an
admin_authorize protected action without being
2015 May 26
6
[PATCH 0/6] Update the way that API versions are generated for the man page.
The existing mechanism was clunky, slow and used ~ 10 MB of
local disk.
Rich.
2009 Oct 21
1
CentOS-5.3 saslauth configuration issue
I am trying to get cyrus-imapd and saslauthd running together so
that I can get squirrelmail to work. I have accomplished this on
several other servers and have relatively complete documentation on
how to do this. What I am running into in this case has me baffled.
If I start saslauthd as a service:
# service saslauthd start
And I try testsaslauthd -u cyrus -p test
Then I see this:
0: NO
2017 Apr 26
0
saslauth logging
On 4/25/2017 7:00 PM, Jobst Schmalenbach wrote:
> Is it possible on to log a bit more detail when auth failure occurs when using saslauthd?
>
> saslauthd[2119]: do_auth : auth failure: [user=DELETED] [service=smtp] [realm=DELETED] [mech=pam] [reason=PAM auth error]
>
> What I want is the IP address and if possible the incorrect password (just to see how far they are off).
> Is
2015 May 05
2
[PATCH 0/2] v2v: -o libvirt: Check if the domain exists on the target (RHBZ#889082).
https://bugzilla.redhat.com/show_bug.cgi?id=889082