/titanic_41/usr/src/cmd/ssh/doc/ |
H A D | README.Ylonen | 7 from one machine to another. It provides strong authentication and 20 o Strong authentication. Closes several security holes (e.g., IP, 21 routing, and DNS spoofing). New authentication methods: .rhosts 22 together with RSA based host authentication, and pure RSA 23 authentication. 29 authentication, and no passwords or other information is 46 authentication if administration installs host key files. 50 authentication never trusts anything but the private key. 56 /etc/hosts.equiv authentication (to prevent DNS, routing, or 59 o Host authentication key distribution can be centrally by the [all …]
|
H A D | OVERVIEW | 71 implement X11 forwarding, TCP/IP forwarding, and authentication 77 - Code to communicate with the authentication agent is in authfd.c. 81 - Code for various authentication methods resides in auth-*.c 88 - In the client end, authentication code is in sshconnect.c. It 91 authentication agent using authfd.c. 98 proxy), and performs authentication (ssh_login in sshconnect.c). 140 negotiate encryption, then perform authentication, preparatory 150 - authentication
|
H A D | README | 32 all logins, not just when using password authentication.
|
H A D | WARNING.RNG | 13 authentication), entails the use of a 160 bit random number. If an
|
H A D | ChangeLog | 360 - (djm) Cleanup auth-passwd.c and unify HP/UX authentication. Patch from 611 disable kerberos authentication by default 614 disallow kerberos authentication if we can't verify the TGT; from 616 kerberos authentication is on by default only if you have a srvtab. 1074 accept an empty shell in authentication; bug reported by 1090 - Applied Tom Bertelson's <tbert@abac.com> AIX authentication fix 1764 - split key exchange (kex) and user authentication (user-auth), 1769 - split key exchange (kex) and user authentication (user-auth), 1935 - PAM authentication was incorrectly interpreting 2007 - Cleanup and bugfix of PAM authentication code [all …]
|
/titanic_41/usr/src/cmd/ssh/ |
H A D | README.altprivsep | 64 authentication. Network security typically requires the use of 65 cryptographic keys for authentication. 91 f) a protocol for user authentication 127 For key exchange and server authentication (e) an ssh server requires: 135 authentication (f) (at least PAM does), particularly 139 Post-authentication an ssh server requires the following privileges: 180 do) using "hostbased" user authentication. 184 user authentication succeeds. Such an implementation would make 202 authentication, and one process running as the actual user that logs 204 authentication. [all …]
|
/titanic_41/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | README | 51 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise") 52 Following authentication methods are supported with an integrate IEEE 802.1X 72 authentication) 80 authentication. 83 * pre-authentication 158 machines. However, there can be used as inner authentication 193 protection, and non-keyed authentication does not protect against bit 201 keyed packet authentication mechanism (Michael MIC). 204 an external authentication server (e.g., RADIUS) and EAP just like 229 messages in initial key handshake, pre-authentication, key caching). [all …]
|
/titanic_41/usr/src/cmd/ssh/etc/ |
H A D | sshd_config | 58 # Banner to be printed before authentication starts. 96 # authentication is disconnected. 100 # Maximum number of retries for authentication 130 # Should sshd use .rhosts and .shosts for password less authentication. 143 # Is pure RSA authentication allowed.
|
/titanic_41/usr/src/cmd/krb5/kadmin/kclient/ |
H A D | pam_krb5_first | 26 # PAM include module for Kerberos authentication foremost and then fall-back 27 # to crypt authentication.
|
H A D | pam_krb5_only | 26 # PAM include module for Kerberos authentication foremost and then fall-back 27 # to crypt authentication.
|
H A D | pam_krb5_optional | 26 # PAM include module for Kerberos authentication foremost and then fall-back 27 # to crypt authentication.
|
/titanic_41/usr/src/uts/common/smbsrv/ndl/ |
H A D | rpcpdu.ndl | 153 #define NDR_C_AUTHN_NONE 0x00 /* No authentication */ 384 /* optional authentication verifier if auth_length != 0 */ 414 /* optional authentication verifier if auth_length != 0 */ 445 /* optional authentication verifier iff auth_length != 0 */ 473 /* optional authentication verifier iff auth_length != 0 */ 503 /* optional authentication verifier iff auth_length != 0 */ 524 /* optional authentication verifier iff auth_length != 0 */ 556 /* optional authentication verifier iff auth_length != 0 */ 586 /* optional authentication verifier iff auth_length != 0 */
|
/titanic_41/usr/src/cmd/svr4pkg/libinst/ |
H A D | setadmin.c | 58 &adm.authentication, "authentication", 225 if (ADM(authentication, "nocheck")) in web_ck_authentication()
|
/titanic_41/usr/src/cmd/svr4pkg/hdrs/ |
H A D | install.h | 98 char *authentication; member
|
/titanic_41/usr/src/cmd/svr4pkg/pkgscripts/ |
H A D | default | 38 authentication=quit
|
/titanic_41/usr/src/cmd/cmd-inet/etc/secret/ |
H A D | ike.preshared | 28 # ike.preshared - Pre-shared secrets for IKE authentication.
|
/titanic_41/usr/src/cmd/cmd-inet/etc/ |
H A D | wanboot.conf.sample | 60 # server authentication should be requested during SSL connection 66 # client authentication should be requested during SSL connection
|
/titanic_41/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | kerberos.ldif | 533 ##### The time at which the principal's last successful authentication happened. 545 ##### The time at which the principal's last failed authentication happened. 557 ##### This attribute stores the number of failed authentication attempts 558 ##### happened for the principal since the last successful authentication. 637 ##### kerberos authentication or administration server in an realm and holds
|
/titanic_41/usr/src/lib/libdscp/svc/ |
H A D | dscp.ppp.options | 87 # Disable all authentication.
|
/titanic_41/usr/src/cmd/cmd-inet/etc/ppp/ |
H A D | options.tmpl | 30 # name <name> -- set local system name for authentication
|
H A D | pap-secrets | 26 # Passwords for authentication using PAP (Password Authentication Protocol)
|
H A D | chap-secrets | 26 # Secrets for authentication using CHAP (Challenge Handshake Authentication
|
/titanic_41/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | ClientLib_en.properties | 120 missing_auth = No authentication blocks in input 150 auth_classes_missing = No authentication classes available
|
H A D | Server_en.properties | 198 ssim_mis_auth = Missing authentication on request or record 230 v1_no_security = SLPv1 compatibility doesn't handle authentication.
|
/titanic_41/usr/src/cmd/sendmail/cf/m4/ |
H A D | proto.m4 | 85 ifdef(`_USE_AUTH_', `"550 Relaying denied. Proper authentication required."', `"550 Relaying denied… 629 # list of authentication mechanisms 635 # default authentication information for outgoing connections 1828 dnl done first: we can require authentication for every mail transaction 2611 ### Relay_Auth: allow relaying based on authentication? 2793 # authentication required: give appropriate error 2809 R<$-:$+><VERIFY $*> <$*> $#error $@ $2 $: $1 " authentication required" 2810 R<$-:$+><VERIFY $*> <$*> FAIL $#error $@ $2 $: $1 " authentication failed" 2812 R<$-:$+><VERIFY $*> <$*> NOT $#error $@ $2 $: $1 " no authentication requested" 2815 R<$-:$+><VERIFY $*> <$*> $+ $#error $@ $2 $: $1 " authentication failure " $4 [all …]
|