Displaying 20 results from an estimated 2000 matches similar to: "(Open)SSH as a TOTP *Token*?"
2023 Feb 20
1
(Open)SSH as a TOTP *Token*?
On Mon, 20 Feb 2023 at 20:03, Jochen Bern <Jochen.Bern at binect.de> wrote:
> A quick question, if I may: Today, I heard a rumour that "ssh" can be
> used as a TOTP *token* (i.e., accept or generate a secret for a
> configuration and generate TOTP codes from there on out, to be entered
> into some *other* software requesting them for 2FA).
I'm not aware of any way
2024 Jul 04
1
Request for a Lockdown option
On 04.07.24 01:41, Manon Goo wrote:
> - some users private keys are lost
Then you go and remove the corresponding pubkeys from wherever they're
configured.
Seriously, even if you do not scan which pubkey is configured where
*now* (as is part of our usual monitoring), it'll be your "number <3"
task *then* to go hunt it down.
> And you want to lock down the sshd
2024 Jul 04
4
Request for a Lockdown option
Jochen Bern <Jochen.Bern at binect.de> writes:
> (And since you mention "port knocking", I'd like to repeat how fond I
> am of upgrading that original concept to a single-packet
> crypto-armored implementation like fwknop.)
I am reluctantly considering to use some kind of port knocking mechanism
on some machines, however I really don't want to carry around shared
2024 Oct 24
1
Developer mailing list delivery issue
On 24.10.24 02:06, Mabry Tyson wrote:
> I [...] sent mail to openssh at openssh.com but the mail was not delivered.
> 24 hours after I sent email to that address, I got a DSN indicating
>
>> Remote server returned '550 5.4.300 Message expired -> 451 Temporary
>> failure, please try again later.'
... yeaaahhh whatever it takes to convince the MX that it's *not*
2018 May 16
3
end-to-end encryption
On 05/16/2018 06:07 AM, Aki Tuomi wrote:
>> On 15 May 2018 at 22:43 Gandalf Corvotempesta <gandalf.corvotempesta at gmail.com> wrote:
>> Is possible to implement and end-to-end encryption with dovecot, where
>> server-side there is no private key to decrypt messages?
>
> You could probably automate this with sieve and e.g. GnuPG, which would mean
> that all your
2016 Oct 22
0
MFA 2FA TOTP razz-ma-tazz!
I'd like to start offering my server's users multi-factor
authentication. Right now, I funnel all authentication through dovecot.
Before I get too far down the fantasy design path, I'm wondering if
anyone else has already done this and could share some details or code.
(I loaded up the subject line with acronyms to show how serious I am. :-))
I am specifically thinking of
2018 Dec 15
1
Overrideing pop delete?
On 12/15/2018 12:34 AM, @lbutlr wrote:
> On 14 Dec 2018, at 16:30, @lbutlr <kremels at kreme.com> wrote:
>> Is it possible to override the POP3 delete on download command and make
>> sure that messages stay on the server for at least X hours or X days?
>> It is important that the messages be around long enough to hit a snapshot
>> cycle (using rsnapshot to backup
2018 Jun 19
2
Is there such a thing as "Password Safe Forwarding"?
Hello everyone,
I work in a setting where remote logins are usually authenticated with
SSH user keypairs, but many target accounts need to have a password set
nonetheless (to use with sudo, log in via remote KVM, etc.) and cannot
be put under a central user administration like LDAP.
Enter a corporate password policy that requires passwords to be complex,
different everywhere, and of limited
2024 Jul 04
1
Request for a Lockdown option
Simon Josefsson wrote in
<87jzi1fg24.fsf at kaka.sjd.se>:
|Jochen Bern <Jochen.Bern at binect.de> writes:
|> (And since you mention "port knocking", I'd like to repeat how fond I
|> am of upgrading that original concept to a single-packet
|> crypto-armored implementation like fwknop.)
|
|I am reluctantly considering to use some kind of port knocking
2024 Mar 28
3
Compounding global and individual settings in ssh-config files?
Hello everyone,
my workplace has gotten the idea of centrally maintaining a file in
ssh_config syntax so that employees do not need to discover every new
machine and configure it on their own. Since it's a case of "let's get
started now, and properly think it through later", right now, a typical
entry might look like
> Host [product]-[Customer]
> Hostname
2020 Feb 12
2
Identify multiple users doing reverse port FWD with their pubkeys
Hi Jochen,
On Wed, 12 Feb 2020 at 00:16, Jochen Bern <Jochen.Bern at binect.de> wrote:
>
> On 02/11/2020 07:07 PM, Cl?ment P?ron wrote:
> > - I have X devices (around 30) and one SSH server
> > - Each of them have a unique public key and create one dynamic reverse
> > port forwarding on the server
> > - All of them connect with the same UNIX user (I don't
2019 Feb 20
4
[Bug 2971] New: Prevent OpenSSH from advertising its version number
On 02/20/2019 07:51 AM, Mark D. Baushke wrote:
> There are too just many cases where both OpenSSH interoperating with
> itself as well as other SSH implementations have needed this version
> number to properly deal with bugs in the code via negitations.
FWIW, and without dismissing the possibility of fingerprinting a server
in other ways, the fact that clients that *can* pass
2024 Apr 25
1
how to block brute force attacks on reverse tunnels?
On 25.04.24 17:15, openssh-unix-dev-request at mindrot.org digested:
> Subject: how to block brute force attacks on reverse tunnels?
> From: Steve Newcomb <srn at coolheads.com>
> Date: 25.04.24, 17:14
>
> For many years I've been running ssh reverse tunnels on portable Linux,
> OpenWRT, Android etc. hosts so they can be accessed from a server whose
> IP is stable
2024 Jun 18
1
Call for testing: openssh-9.8
On 18.06.24 13:36, Stuart Henderson wrote:
> Not sure whether anything should be done with it, but I noticed so
> thought I'd mention: if you pass ssh-keygen -R a known_hosts file with
> DSA sigs, you get "invalid line" warnings.
Out of interest, did you, perchance, try running an ssh-keygen -l on a
DSA-infested file?
(I added a bit of extra IDS to our monitoring that
2018 Mar 22
1
why is dovecot "Allowing any password"
On 03/22/2018 09:34 AM, Aki Tuomi wrote:
>>> I have no idea why you would have nopassword=y set in the first
>>> place, so it seems the simplest way to eliminate this problem is to
>>> take that out and have a secure environment for sending mail.
>>
>> Yes, however, for SOGo with Native Outlook compatibility or SAML
>> logon, the config is required.
2023 Jul 06
1
Subsystem sftp invoked even though forced command created
On 05.07.23 18:01, MCMANUS, MICHAEL P wrote:
> It appears the forced command either does not run or runs to completion
> and exits immediately, as there is no process named "receive.ksh" in
> the process tree.
FWIW, two cents of mine:
-- The script *exiting* should *not* prompt sshd to execute the
requested subsystem "as a second thought", or else it'd happen
2023 Jul 05
1
Subsystem sftp invoked even though forced command created
On 05.07.23 02:50, Damien Miller wrote:
> Some possibilities:
> 1. the receive.ksh script is faulty in some way that causes it to invoke
> sftp-server
How would the script even *know* that the client requested the SFTP
subsystem? Is a subsystem's executable/path, supposedly internally
overwritten with the forced command at that point, exposed through
$SSH_ORIGINAL_COMMAND ?
2020 Oct 27
2
SV: Looking for a guide to collect all e-mail from the ISP mail server
I would have to also hack the email client since I don't enter my 20 character high entropy password when I send or retrieve email.
You really need an email standard to integrate TOTP. To be realistic, you need Gmail to use it. Whatever Gmail wants is essentially a defacto standard. I live in the real world, so whatever Google wants, I comply.
? Original Message ?
From: jtam.home at
2023 Jul 07
1
Subsystem sftp invoked even though forced command created
On 06.07.23 23:37, MCMANUS, MICHAEL P wrote:> So changing the forced
command as stated will break the application. I
> would need to create a test bed to simulate the listener rather than
> use the server as is, where is. That may produce false or misleading
> results.
Since the forced command is tied to the specific keypair in the
authorized_keys, you could
-- test with a different
2017 Oct 25
0
authenticate as userA, but get authorization to user userB's account
On 10/25/2017 12:58 PM, Heiko Schlittermann wrote:
> We could create new "role" users, share the password and create an
> additional account within the mail client (thunderbird) they use. From
> users perspective it is exactly what they want. But I dislike the idea
> of sharing the password.
For what reason exactly? It not being personalized, too easy to leak,
potentially