similar to: recompile sshd with OPIE?

Displaying 20 results from an estimated 2000 matches similar to: "recompile sshd with OPIE?"

2001 Nov 04
2
OPIE patch for current CVS
I redid my previous OPIE patch for the current ssh tree. It seems to work fine here, and I'ld love to see it merged before the 3.0 release. Wichert. diff -x CVS -wNur ../cvs/other/openssh_cvs/Makefile.in openssh_cvs/Makefile.in --- ../cvs/other/openssh_cvs/Makefile.in Mon Oct 22 02:53:59 2001 +++ openssh_cvs/Makefile.in Sun Nov 4 01:18:19 2001 @@ -50,7 +50,7 @@ SSHOBJS= ssh.o
2001 Jun 03
1
OPIE support patch
I just cobbled up a little patch to add support for OPIE to OpenSSH. Currently untested, but feedback is welcome. Wichert. -- _________________________________________________________________ / Nothing is fool-proof to a sufficiently talented fool \ | wichert at cistron.nl http://www.liacs.nl/~wichert/ | | 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0 2805 3CB8 9250
2006 Jun 30
1
Determining vulnerability to issues described by SAs
Hi, I've been trying for the past few days to come up with a method for checking a FreeBSD system to see if it is vulnerable to an issue described by a FreeBSD security advisory in some automated way, similar to the way portaudit can use VuXML to check for vulnerabilities in ports. Right now, I'm a bit stuck--there seem to be fairly major issues with all the methods I've come up
2002 Jul 03
4
opie support?
I see that you have s/key support in ssh, any plans to add opie support as well ? just asking ..
2006 Jul 28
2
Ruby vulnerability?
Hi, FYI, Red Hat released an advisory today about a vulnerability in Ruby. So far it doesn't appear in the VuXML, but am I correct in presuming it will soon? https://rhn.redhat.com/errata/RHSA-2006-0604.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3694 cheers, -- Joel Hatton -- Infrastructure Manager | Hotline: +61 7 3365 4417 AusCERT - Australia's national
2006 Nov 20
1
OPIE + single user mode
Hallo all, Have a problem and while OPIE seems to be the solution, not sure it will work. The issue here is the only way I can access my remote box in single user mode is via telnetting to a termserv I have setup that connects to the FBSD servers serial port. Problem of course being that to log on to FBSD in single user mode I have to provide the root password in the clear. What I would like
2000 Dec 02
2
pam, openssh and opie
Hello folks, this looks about the only place I can find on issues dealing with the subject line. The message that got me posting is included below the line of *'s. Basically I've tried getting this working with Pam authentication and using the new login binary that comes with Opie 2.32. No joy. I am using RedHat 6.0 OpenSSH 2.3.0p1 Pam 0.66-18 I can get the opie challenge only on a
2000 Aug 27
0
patch for TIS (skey/opie) *and* passwd auth via PAM
Hello, appended is a patch that makes it possible to use PAM both for password authentication and TIS (i.e. s/key or opie or any other interactive challenge/response scheme). I have developed this starting from the patch at http://www.debian.org/Bugs/db/61/61906.html on Debian with openssh-2.1.1p4-3. After configuring ssh with --with-pam-tis, there are two PAM services, "sshd" and
2003 Nov 02
1
opie bug or ..?
Hi. I have a question related to freebsd opie implementation. I am running 4.9-RELEASE and I've tried to setup opie. *** 1 *** opiepasswd/opiekey I've added user using `opiepasswd -c "ssa"` mx2# opiepasswd -c "ssa" Adding ssa: Only use this method from the console; NEVER from remote. If you are using telnet, xterm, or a dial-in, type ^C now or exit with
2009 Apr 08
1
[Bug 330] Add OPIE support
https://bugzilla.mindrot.org/show_bug.cgi?id=330 --- Comment #4 from Alessandro Soraruf <soraruf at ntd.homelinux.org> 2009-04-09 03:59:33 --- Created an attachment (id=1626) --> (http://bugzilla.mindrot.org/attachment.cgi?id=1626) Patch to add support to OPIE -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because:
1996 Sep 18
1
CERT Advisory CA-96.20 - Sendmail Vulnerabilities
-----BEGIN PGP SIGNED MESSAGE----- ============================================================================= CERT(sm) Advisory CA-96.20 Original issue date: September 18, 1996 Last revised: -- Topic: Sendmail Vulnerabilities - ----------------------------------------------------------------------------- *** This advisory supersedes CA-95:05 *** The CERT Coordination Center
2005 Oct 02
11
Repeated attacks via SSH
Everyone: We're starting to see a rash of password guessing attacks via SSH on all of our exposed BSD servers which are running an SSH daemon. They're coming from multiple addresses, which makes us suspect that they're being carried out by a network of "bots" rather than a single attacker. But wait... there's more. The interesting thing about these attacks is that
2001 Jun 19
1
s/key
Hello Can someone tell me, how to enable s/key auth via OpenSSH ? I tried to enable ChallengeResponseAuthentication yes in sshd_config and SkeyAuthentication yes ChallengeResponseAuthentication yes in ssh_config As i can read in man: -v Verbose mode. Causes ssh to print debugging messages about its progress. This is helpful in debugging connection, authentica-
2000 Apr 09
2
Password Login Failing... (Not sure this went through)
Appologise if this did make it to the list but I just subscribed and didn't see it come back... I am attmepting to install ssh/sshd on my RH6.1 Intel Box. Everything seems to be working (not quite smooth sailing - I had to resort to precompiled RPM for OpenSSL). I did however get it "working." I generated a host key as root and then changed back to joe-user. I created a key for
2006 Mar 22
0
FreeBSD Security Advisory FreeBSD-SA-06:12.opie
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-06:12.opie Security Advisory The FreeBSD Project Topic: OPIE arbitrary password change Category: contrib Module: contrib_opie Announced:
2006 Mar 22
0
FreeBSD Security Advisory FreeBSD-SA-06:12.opie
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-06:12.opie Security Advisory The FreeBSD Project Topic: OPIE arbitrary password change Category: contrib Module: contrib_opie Announced:
2004 Jul 02
0
[Bug 330] Add OPIE support
http://bugzilla.mindrot.org/show_bug.cgi?id=330 ------- Additional Comments From dtucker at zip.com.au 2004-07-02 13:10 ------- I tried compiling this with opie-2.4 (from http://www.inner.net/opie) but configure wouldn't detect OPIE ("undefined reference to `opie_keyinfo"). Even making configure find opie.h and libopie, sshd won't link: undefined reference to
2000 Apr 29
0
PAM support, OPIE
Hello, on my Debian woody system, I tried to get sshd to accept OPIE (one time password) authorization through PAM. This currently fails because there is no way to permit the OPIE challenge to be displayed at the password prompt. Starting from the patch at http://www.debian.org/Bugs/db/61/61906.html I managed to get OPIE working. However, the patch above is not very clean in that it replaces
2002 Jul 02
0
[Bug 330] New: Add OPIE support
http://bugzilla.mindrot.org/show_bug.cgi?id=330 Summary: Add OPIE support Product: Portable OpenSSH Version: -current Platform: All URL: http://people.freebsd.org/~des/software/opie.diff OS/Version: All Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo:
2000 Jul 21
0
OpenSsh 2.1.1p4 - OPIE patch
Welcome :) This patch is ported version of opie patch to 1.2pre release which never be released. Why ? I don't known. Ask Damien. ;) -- Piotr "Charvel" Majka | PGP & GPG Public Key: finger charvel at link.pl | Uin: 20873695 GCM d- s-:- a- C++ UL++++ P+ L+++ E--- W+ N+++ !o !K w--- !O M V- PS+ PE !Y PGP+ t--- !5 X R tv- b !DI D+ G++ e h r y++** -------------- next part