Home
last modified time | relevance | path

Searched refs:authentication (Results 1 – 25 of 30) sorted by relevance

12

/titanic_41/usr/src/cmd/ssh/doc/
H A DREADME.Ylonen7 from one machine to another. It provides strong authentication and
20 o Strong authentication. Closes several security holes (e.g., IP,
21 routing, and DNS spoofing). New authentication methods: .rhosts
22 together with RSA based host authentication, and pure RSA
23 authentication.
29 authentication, and no passwords or other information is
46 authentication if administration installs host key files.
50 authentication never trusts anything but the private key.
56 /etc/hosts.equiv authentication (to prevent DNS, routing, or
59 o Host authentication key distribution can be centrally by the
[all …]
H A DOVERVIEW71 implement X11 forwarding, TCP/IP forwarding, and authentication
77 - Code to communicate with the authentication agent is in authfd.c.
81 - Code for various authentication methods resides in auth-*.c
88 - In the client end, authentication code is in sshconnect.c. It
91 authentication agent using authfd.c.
98 proxy), and performs authentication (ssh_login in sshconnect.c).
140 negotiate encryption, then perform authentication, preparatory
150 - authentication
H A DREADME32 all logins, not just when using password authentication.
H A DWARNING.RNG13 authentication), entails the use of a 160 bit random number. If an
H A DChangeLog360 - (djm) Cleanup auth-passwd.c and unify HP/UX authentication. Patch from
611 disable kerberos authentication by default
614 disallow kerberos authentication if we can't verify the TGT; from
616 kerberos authentication is on by default only if you have a srvtab.
1074 accept an empty shell in authentication; bug reported by
1090 - Applied Tom Bertelson's <tbert@abac.com> AIX authentication fix
1764 - split key exchange (kex) and user authentication (user-auth),
1769 - split key exchange (kex) and user authentication (user-auth),
1935 - PAM authentication was incorrectly interpreting
2007 - Cleanup and bugfix of PAM authentication code
[all …]
/titanic_41/usr/src/cmd/ssh/
H A DREADME.altprivsep64 authentication. Network security typically requires the use of
65 cryptographic keys for authentication.
91 f) a protocol for user authentication
127 For key exchange and server authentication (e) an ssh server requires:
135 authentication (f) (at least PAM does), particularly
139 Post-authentication an ssh server requires the following privileges:
180 do) using "hostbased" user authentication.
184 user authentication succeeds. Such an implementation would make
202 authentication, and one process running as the actual user that logs
204 authentication.
[all …]
/titanic_41/usr/src/cmd/cmd-inet/usr.lib/wpad/
H A DREADME51 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
52 Following authentication methods are supported with an integrate IEEE 802.1X
72 authentication)
80 authentication.
83 * pre-authentication
158 machines. However, there can be used as inner authentication
193 protection, and non-keyed authentication does not protect against bit
201 keyed packet authentication mechanism (Michael MIC).
204 an external authentication server (e.g., RADIUS) and EAP just like
229 messages in initial key handshake, pre-authentication, key caching).
[all …]
/titanic_41/usr/src/cmd/ssh/etc/
H A Dsshd_config58 # Banner to be printed before authentication starts.
96 # authentication is disconnected.
100 # Maximum number of retries for authentication
130 # Should sshd use .rhosts and .shosts for password less authentication.
143 # Is pure RSA authentication allowed.
/titanic_41/usr/src/cmd/krb5/kadmin/kclient/
H A Dpam_krb5_first26 # PAM include module for Kerberos authentication foremost and then fall-back
27 # to crypt authentication.
H A Dpam_krb5_only26 # PAM include module for Kerberos authentication foremost and then fall-back
27 # to crypt authentication.
H A Dpam_krb5_optional26 # PAM include module for Kerberos authentication foremost and then fall-back
27 # to crypt authentication.
/titanic_41/usr/src/uts/common/smbsrv/ndl/
H A Drpcpdu.ndl153 #define NDR_C_AUTHN_NONE 0x00 /* No authentication */
384 /* optional authentication verifier if auth_length != 0 */
414 /* optional authentication verifier if auth_length != 0 */
445 /* optional authentication verifier iff auth_length != 0 */
473 /* optional authentication verifier iff auth_length != 0 */
503 /* optional authentication verifier iff auth_length != 0 */
524 /* optional authentication verifier iff auth_length != 0 */
556 /* optional authentication verifier iff auth_length != 0 */
586 /* optional authentication verifier iff auth_length != 0 */
/titanic_41/usr/src/cmd/svr4pkg/libinst/
H A Dsetadmin.c58 &adm.authentication, "authentication",
225 if (ADM(authentication, "nocheck")) in web_ck_authentication()
/titanic_41/usr/src/cmd/svr4pkg/hdrs/
H A Dinstall.h98 char *authentication; member
/titanic_41/usr/src/cmd/svr4pkg/pkgscripts/
H A Ddefault38 authentication=quit
/titanic_41/usr/src/cmd/cmd-inet/etc/secret/
H A Dike.preshared28 # ike.preshared - Pre-shared secrets for IKE authentication.
/titanic_41/usr/src/cmd/cmd-inet/etc/
H A Dwanboot.conf.sample60 # server authentication should be requested during SSL connection
66 # client authentication should be requested during SSL connection
/titanic_41/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dkerberos.ldif533 ##### The time at which the principal's last successful authentication happened.
545 ##### The time at which the principal's last failed authentication happened.
557 ##### This attribute stores the number of failed authentication attempts
558 ##### happened for the principal since the last successful authentication.
637 ##### kerberos authentication or administration server in an realm and holds
/titanic_41/usr/src/lib/libdscp/svc/
H A Ddscp.ppp.options87 # Disable all authentication.
/titanic_41/usr/src/cmd/cmd-inet/etc/ppp/
H A Doptions.tmpl30 # name <name> -- set local system name for authentication
H A Dpap-secrets26 # Passwords for authentication using PAP (Password Authentication Protocol)
H A Dchap-secrets26 # Secrets for authentication using CHAP (Challenge Handshake Authentication
/titanic_41/usr/src/lib/libslp/javalib/com/sun/slp/
H A DClientLib_en.properties120 missing_auth = No authentication blocks in input
150 auth_classes_missing = No authentication classes available
H A DServer_en.properties198 ssim_mis_auth = Missing authentication on request or record
230 v1_no_security = SLPv1 compatibility doesn't handle authentication.
/titanic_41/usr/src/cmd/sendmail/cf/m4/
H A Dproto.m485 ifdef(`_USE_AUTH_', `"550 Relaying denied. Proper authentication required."', `"550 Relaying denied…
629 # list of authentication mechanisms
635 # default authentication information for outgoing connections
1828 dnl done first: we can require authentication for every mail transaction
2611 ### Relay_Auth: allow relaying based on authentication?
2793 # authentication required: give appropriate error
2809 R<$-:$+><VERIFY $*> <$*> $#error $@ $2 $: $1 " authentication required"
2810 R<$-:$+><VERIFY $*> <$*> FAIL $#error $@ $2 $: $1 " authentication failed"
2812 R<$-:$+><VERIFY $*> <$*> NOT $#error $@ $2 $: $1 " no authentication requested"
2815 R<$-:$+><VERIFY $*> <$*> $+ $#error $@ $2 $: $1 " authentication failure " $4
[all …]

12