SecurID authentication for 3.6.1p2 with privsep

Scott Burch scott.burch at camberwind.com
Sat Jun 14 05:10:33 EST 2003


Vaclav,

Thanks for the update. I have tested your new patch and everything works
great with privilege separation. I was also able to apply your patch
along with Darren Tucker's password expiration patch. If anyone has
questions about using Vaclav's patch on Solaris let me know. The
packages I build for my site include support for password expiration and
securid with privilege separation enabled. Currently I target Solaris
2.6 through Solaris 8. I build static binaries so that I don't rely on
external libraries.Oh, I also build in support for tcp_wrappers.

I use the ACE Agent SDK and Ace Server 5. Previously I used your patch
with 3.5p1 and tested it with putty, SecureFX, SecureCRT, and filezilla.

Selective access to various authentication types would be useful. If I
want to enforce securid authentication currently I disable password and
publickey authentication, but it might be nice to configure this
differently for different users.

-Scott

On Tue, 2003-06-10 at 04:30, Václav Tomec wrote:
> Hello all,
> 
> I have made SecurID authentication for OpenSSH 3.6.1p2.
> 
> This patch was totaly rewritten, so please test it before use.
> 
> Kbd-int authentication is now integrated into challenge response
> auth. 
> 
> Privsep is now fully suported.
> 
> 
> PS: What do you think of selective access to the individual
> authentications, similar to AllowGroups/DenyGroups or maybe
> AllowUsers/DenyUsers ?
> 
> 
> Vaclav Tomec
> http://sweb.cz/v_t_m/
> 
> ______________________________________________________________________
> Reklama:
> Tolik věcí a výhod jako od Contactel Bonus Clubu jen tak nezískáte http://ad2.seznam.cz/redir.cgi?instance=55052%26url=http://club.razdva.cz/
> 
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev at mindrot.org
> http://www.mindrot.org/mailman/listinfo/openssh-unix-dev
-- 
Scott Burch <scott.burch at camberwind.com>




More information about the openssh-unix-dev mailing list