I'm sorry guys, but we had a minor problem with the tar.gz on the previous
RPM.
Can I have +1's for a new update on app1 to the 0.5.1-2 building?
http://buildsys.fedoraproject.org/plague-results/fedora-5-epel/transifex/0.5.1-2.el5/noarch/
Thanks
--
Diego Búrigo Zacarão
http://diegobz.net
Linux
On Mon, 30 Mar 2009, Diego Búrigo Zacarão wrote:
I'm sorry guys, but we had a minor problem with the tar.gz on the previous
RPM.
Can I have +1's for a new update on app1 to the 0.5.1-2 building?
http://buildsys.fedoraproject.org/plague-results/fedora-5-epel/transifex/0.5.1-2.el5/noarch/
For those not on the announce list:
https://www.redhat.com/archives/fedora-announce-list/2009-March/msg00010.html
-Mike
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
Hello,
What about the use of S/Key (one-time passwords) I think it is possible
to deploy SSH with S/Key authentication. I haven't look into it that
much but it could be a possible solution?
susmit shannigrahi wrote:
So I'm not quite sure how to 'fix' this problem. By that I mean, even if
Opps Sorry I didn't check the link Susmit posted.
susmit shannigrahi wrote:
So I'm not quite sure how to 'fix' this problem. By that I mean, even if
we knew this attack was going to happen I'm not totally sure of a feasible
solution, using only free software, that we could have used to fix it.
Xavier Lamien wrote:
2009/3/30 Mike McGrath mmcgr...@redhat.com:
On Mon, 30 Mar 2009, Diego Búrigo Zacarão wrote:
I'm sorry guys, but we had a minor problem with the tar.gz on the previous
RPM.
Can I have +1's for a new update on app1 to the 0.5.1-2 building?
On Mon, 30 Mar 2009, Damian Myerscough wrote:
Hello,
What about the use of S/Key (one-time passwords) I think it is possible to
deploy SSH with S/Key authentication. I haven't look into it that much but it
could be a possible solution?
If someone had my username, password, and ssh key.
I have just done some research on SSH and S/Key and I read that S/Key
cannot withstand a brute forced attack [1]
[1] http://www.gentoo-wiki.info/OpenSSH_skey
Mike McGrath wrote:
On Mon, 30 Mar 2009, Damian Myerscough wrote:
Hello,
What about the use of S/Key (one-time passwords) I think it
If someone had my username, password, and ssh key. How would that prevent
them from getting a otp?
Supposedly, they will not have access to the mobile device/pager where
this single time password will be sent.
--
Regards,
Susmit.
=
ssh
Mike McGrath wrote:
On Mon, 30 Mar 2009, Damian Myerscough wrote:
What about the use of S/Key (one-time passwords) I think it is possible to
deploy SSH with S/Key authentication. I haven't look into it that much but it
could be a possible solution?
If someone had my username, password, and
On Mon, 30 Mar 2009, susmit shannigrahi wrote:
If someone had my username, password, and ssh key. How would that prevent
them from getting a otp?
Supposedly, they will not have access to the mobile device/pager where
this single time password will be sent.
Interestingly I saw someone
On Mon, Mar 30, 2009 at 9:22 PM, Damian Myerscough
damian.myersco...@gmail.com wrote:
I have just done some research on SSH and S/Key and I read that S/Key cannot
withstand a brute forced attack [1]
[1] http://www.gentoo-wiki.info/OpenSSH_skey
True, but We can lock out an account after 10
Supposedly, they will not have access to the mobile device/pager where
this single time password will be sent.
Interestingly I saw someone doing something very similar to this at pycon
using asterisk.
You mean, pretend to be another number using asterix
and grab this single time passwd?
On Mon, Mar 30, 2009 at 9:46 AM, Mike McGrath mmcgr...@redhat.com wrote:
On Mon, 30 Mar 2009, Damian Myerscough wrote:
Hello,
What about the use of S/Key (one-time passwords) I think it is possible to
deploy SSH with S/Key authentication. I haven't look into it that much but it
could be a
Damian Myerscough wrote:
I have just done some research on SSH and S/Key and I read that S/Key
cannot withstand a brute forced attack [1]
[1] http://www.gentoo-wiki.info/OpenSSH_skey
OTPW looks better:
http://en.wikipedia.org/wiki/OTPW
___
On Mon, 30 Mar 2009, susmit shannigrahi wrote:
Supposedly, they will not have access to the mobile device/pager where
this single time password will be sent.
Interestingly I saw someone doing something very similar to this at pycon
using asterisk.
You mean, pretend to be another
So doing a liitle looking around I cane across some options that look
interesting, the following options would mean you need to physically have
something to login.
yubikey
http://www.yubico.com/products/yubikey/
It would require a pam module and for us to setup a server for managing keys.
Date: Mon, 30 Mar 2009 12:57:23 -0500
From: Dennis Gilmore den...@ausil.us
Reply-To: Fedora Infrastructure fedora-infrastructure-list@redhat.com
To: Fedora Infrastructure fedora-infrastructure-list@redhat.com
Subject: More auth options
So doing a liitle looking around I cane across some
On Mon, Mar 30, 2009 at 2:12 PM, Matthew Galgoci mgalg...@redhat.com wrote:
Date: Mon, 30 Mar 2009 12:57:23 -0500
From: Dennis Gilmore den...@ausil.us
Reply-To: Fedora Infrastructure fedora-infrastructure-list@redhat.com
To: Fedora Infrastructure fedora-infrastructure-list@redhat.com
Subject:
Date: Mon, 30 Mar 2009 12:57:23 -0500
From: Dennis Gilmore den...@ausil.us
Reply-To: Fedora Infrastructure fedora-infrastructure-list@redhat.com
To: Fedora Infrastructure fedora-infrastructure-list@redhat.com
Subject: More auth options
So doing a liitle looking around I cane across some
On Mon, Mar 30, 2009 at 11:57 AM, Dennis Gilmore den...@ausil.us wrote:
So doing a liitle looking around I cane across some options that look
interesting, the following options would mean you need to physically have
something to login.
yubikey
http://www.yubico.com/products/yubikey/
It
Hello, my name is Ferino Mardo but you can call me Rino. I am a
network professional having been in the industry for more than 18
years. I used to be a coder (from assembler to C) but now working as a
network manager. I don't consider myself a newbie though I also don't
call myself a h4ck3r :-)
ok i found a FIG and it's called sysadmin. i think this is the closest
to my actual experience.
i want to join sysadmin. should i apply now or wait for a nod?
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
Dennis Gilmore wrote:
ubikey is max USD$25 where the etoken is probably at least USD$30.
I would think that with yubikey we could work out a deal with them
to get a discount in return for us being a case study/prominent user
of there product. all of the software for yubikey AFAICT is open
We're allowing for early branching now.
---
configs/build/update-static-repos.py |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/configs/build/update-static-repos.py
b/configs/build/update-static-repos.py
index 16ee6ac..98d48c9 100755
---
On 2009-03-30 08:44:29 PM, Jesse Keating wrote:
We're allowing for early branching now.
---
configs/build/update-static-repos.py |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/configs/build/update-static-repos.py
b/configs/build/update-static-repos.py
index
On Mon, 30 Mar 2009, Rino Mardo wrote:
Hello, my name is Ferino Mardo but you can call me Rino. I am a
network professional having been in the industry for more than 18
years. I used to be a coder (from assembler to C) but now working as a
network manager. I don't consider myself a newbie
On Mon, 30 Mar 2009, Rino Mardo wrote:
ok i found a FIG and it's called sysadmin. i think this is the closest
to my actual experience.
i want to join sysadmin. should i apply now or wait for a nod?
Yep, that's a good one to apply for as any other sysadmin-* groups require
it. Let me know
On Mon, 30 Mar 2009, Todd Zullinger wrote:
Dennis Gilmore wrote:
ubikey is max USD$25 where the etoken is probably at least USD$30.
I would think that with yubikey we could work out a deal with them
to get a discount in return for us being a case study/prominent user
of there product.
29 matches
Mail list logo