Displaying 20 results from an estimated 2000 matches similar to: "recompile sshd with OPIE?"
2001 Nov 04
2
OPIE patch for current CVS
I redid my previous OPIE patch for the current ssh tree. It seems
to work fine here, and I'ld love to see it merged before the 3.0
release.
Wichert.
diff -x CVS -wNur ../cvs/other/openssh_cvs/Makefile.in openssh_cvs/Makefile.in
--- ../cvs/other/openssh_cvs/Makefile.in Mon Oct 22 02:53:59 2001
+++ openssh_cvs/Makefile.in Sun Nov 4 01:18:19 2001
@@ -50,7 +50,7 @@
SSHOBJS= ssh.o
2001 Jun 03
1
OPIE support patch
I just cobbled up a little patch to add support for OPIE to
OpenSSH. Currently untested, but feedback is welcome.
Wichert.
--
_________________________________________________________________
/ Nothing is fool-proof to a sufficiently talented fool \
| wichert at cistron.nl http://www.liacs.nl/~wichert/ |
| 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0 2805 3CB8 9250
2006 Jun 30
1
Determining vulnerability to issues described by SAs
Hi,
I've been trying for the past few days to come up with a method for
checking a FreeBSD system to see if it is vulnerable to an issue
described by a FreeBSD security advisory in some automated way, similar
to the way portaudit can use VuXML to check for vulnerabilities in
ports. Right now, I'm a bit stuck--there seem to be fairly major issues
with all the methods I've come up
2002 Jul 03
4
opie support?
I see that you have s/key support in ssh, any plans to add opie support as
well ?
just asking ..
2006 Jul 28
2
Ruby vulnerability?
Hi,
FYI, Red Hat released an advisory today about a vulnerability in Ruby. So
far it doesn't appear in the VuXML, but am I correct in presuming it will
soon?
https://rhn.redhat.com/errata/RHSA-2006-0604.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3694
cheers,
-- Joel Hatton --
Infrastructure Manager | Hotline: +61 7 3365 4417
AusCERT - Australia's national
2006 Nov 20
1
OPIE + single user mode
Hallo all,
Have a problem and while OPIE seems to be the solution, not sure it
will work. The issue here is the only way I can access my remote box
in single user mode is via telnetting to a termserv I have setup that
connects to the FBSD servers serial port. Problem of course being that
to log on to FBSD in single user mode I have to provide the root
password in the clear.
What I would like
2000 Dec 02
2
pam, openssh and opie
Hello folks, this looks about the only place I can find on issues dealing
with the subject line. The message that got me posting is included below the
line of *'s.
Basically I've tried getting this working with Pam authentication and using
the new login binary that comes with Opie 2.32. No joy.
I am using
RedHat 6.0
OpenSSH 2.3.0p1
Pam 0.66-18
I can get the opie challenge only on a
2000 Aug 27
0
patch for TIS (skey/opie) *and* passwd auth via PAM
Hello,
appended is a patch that makes it possible to use PAM both for
password authentication and TIS (i.e. s/key or opie or any other
interactive challenge/response scheme). I have developed this starting
from the patch at http://www.debian.org/Bugs/db/61/61906.html on
Debian with openssh-2.1.1p4-3. After configuring ssh with
--with-pam-tis, there are two PAM services, "sshd" and
2003 Nov 02
1
opie bug or ..?
Hi. I have a question related to freebsd opie implementation.
I am running 4.9-RELEASE and I've tried to setup opie.
*** 1 *** opiepasswd/opiekey
I've added user using `opiepasswd -c "ssa"`
mx2# opiepasswd -c "ssa"
Adding ssa:
Only use this method from the console; NEVER from remote. If you are using
telnet, xterm, or a dial-in, type ^C now or exit with
2009 Apr 08
1
[Bug 330] Add OPIE support
https://bugzilla.mindrot.org/show_bug.cgi?id=330
--- Comment #4 from Alessandro Soraruf <soraruf at ntd.homelinux.org> 2009-04-09 03:59:33 ---
Created an attachment (id=1626)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=1626)
Patch to add support to OPIE
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because:
1996 Sep 18
1
CERT Advisory CA-96.20 - Sendmail Vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
CERT(sm) Advisory CA-96.20
Original issue date: September 18, 1996
Last revised: --
Topic: Sendmail Vulnerabilities
- -----------------------------------------------------------------------------
*** This advisory supersedes CA-95:05 ***
The CERT Coordination Center
2005 Oct 02
11
Repeated attacks via SSH
Everyone:
We're starting to see a rash of password guessing attacks via SSH
on all of our exposed BSD servers which are running an SSH daemon.
They're coming from multiple addresses, which makes us suspect that
they're being carried out by a network of "bots" rather than a single attacker.
But wait... there's more. The interesting thing about these attacks
is that
2001 Jun 19
1
s/key
Hello
Can someone tell me, how to enable s/key auth via OpenSSH ?
I tried to enable ChallengeResponseAuthentication yes in sshd_config
and SkeyAuthentication yes
ChallengeResponseAuthentication yes in ssh_config
As i can read in man:
-v Verbose mode. Causes ssh to print debugging messages about its
progress. This is helpful in debugging connection, authentica-
2000 Apr 09
2
Password Login Failing... (Not sure this went through)
Appologise if this did make it to the list but I just subscribed and
didn't see it come back...
I am attmepting to install ssh/sshd on my RH6.1 Intel Box. Everything
seems to be working (not quite smooth sailing - I had to resort to
precompiled RPM for OpenSSL). I did however get it "working." I
generated a host key as root and then changed back to joe-user. I created
a key for
2006 Mar 22
0
FreeBSD Security Advisory FreeBSD-SA-06:12.opie
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-06:12.opie Security Advisory
The FreeBSD Project
Topic: OPIE arbitrary password change
Category: contrib
Module: contrib_opie
Announced:
2006 Mar 22
0
FreeBSD Security Advisory FreeBSD-SA-06:12.opie
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-06:12.opie Security Advisory
The FreeBSD Project
Topic: OPIE arbitrary password change
Category: contrib
Module: contrib_opie
Announced:
2004 Jul 02
0
[Bug 330] Add OPIE support
http://bugzilla.mindrot.org/show_bug.cgi?id=330
------- Additional Comments From dtucker at zip.com.au 2004-07-02 13:10 -------
I tried compiling this with opie-2.4 (from http://www.inner.net/opie) but
configure wouldn't detect OPIE ("undefined reference to `opie_keyinfo").
Even making configure find opie.h and libopie, sshd won't link:
undefined reference to
2000 Apr 29
0
PAM support, OPIE
Hello,
on my Debian woody system, I tried to get sshd to accept OPIE (one
time password) authorization through PAM. This currently fails because
there is no way to permit the OPIE challenge to be displayed at the
password prompt.
Starting from the patch at
http://www.debian.org/Bugs/db/61/61906.html
I managed to get OPIE working. However, the patch above is not very
clean in that it replaces
2002 Jul 02
0
[Bug 330] New: Add OPIE support
http://bugzilla.mindrot.org/show_bug.cgi?id=330
Summary: Add OPIE support
Product: Portable OpenSSH
Version: -current
Platform: All
URL: http://people.freebsd.org/~des/software/opie.diff
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo:
2000 Jul 21
0
OpenSsh 2.1.1p4 - OPIE patch
Welcome :)
This patch is ported version of opie patch to 1.2pre release which never
be released. Why ? I don't known. Ask Damien. ;)
--
Piotr "Charvel" Majka | PGP & GPG Public Key: finger charvel at link.pl | Uin: 20873695
GCM d- s-:- a- C++ UL++++ P+ L+++ E--- W+ N+++ !o !K w--- !O M V- PS+ PE !Y
PGP+ t--- !5 X R tv- b !DI D+ G++ e h r y++**
-------------- next part