Sponsored Content
Full Discussion: Solaris 10 OS - SA-100-S10
Operating Systems Solaris Solaris 10 OS - SA-100-S10 Post 302311951 by incredible on Thursday 30th of April 2009 04:12:54 AM
Old 04-30-2009
GOOGLE Smilie See if you can get any.
 

10 More Discussions You Might Find Interesting

1. Solaris

Solaris 9 Installation on Sunblade 100

I have a sunblade 100. It is preloaded with Solaris 8 but I do not have root password. I want to erase and install Solaris 9 on it. What are my options? I have a CD ROM. Could any one help me in getting started to install in from CDs? Appreciate your help guyz. (3 Replies)
Discussion started by: stevelrf
3 Replies

2. Solaris

configuring xdm on s10\open solaris

can someone hlpe me to use a X display manger to oepnsolaris I'm using 79a & have setup XMING on a windows client On the Solaris box I notice that XDM is not running, which i assume is essential for xming\client. I've read somewhere that to enable XDM i need to run gdmconfig so i've # xhost+... (5 Replies)
Discussion started by: stevie_velvet
5 Replies

3. Solaris

Who has "Solaris 10 Advanced System Administration(SA-202-S10)" latest revision doc?

Dear All, I am going to examine SA202 but I got SA-202-S10 revision A.1 so it might be out of date. Who has "Solaris 10 Advanced System Administration(SA-202-S10)" latest revision document? Could you share it ? Thank you in advance (2 Replies)
Discussion started by: unitipon
2 Replies

4. Solaris

Help! Trying to install Solaris 10 on a Sunblade 100

I recently bought a sunblade 100 for $150 from a guy that posted it on craigslist. I'm trying to learn Solaris 10. Prior to giving me the system he had Ubuntu installed. He removed it for before giving it to me. I basically have a hard disk that has nothing installed in it. I tried installing... (6 Replies)
Discussion started by: haloy
6 Replies

5. Solaris

WAS7 migration, port not persisted on S10

Hi all. So, im upgrading from WAS6 to WAS7 on S10 containers and am running in to a problem. Although i can successfully complete a migration (or so i thought) when i come to start the servers it bombs outs. This is because for some reason the migration process does not migrate the nodeagent... (0 Replies)
Discussion started by: boneyard
0 Replies

6. Solaris

Problem with S10 Update Manager

Hi, The green shield at the bottom right of the screen says 'Updates Available', so I click on it to get the latest updates. Then I select the first update in the list by clicking the checkbox and then clicking 'Install Update'. After a few seconds of trying to install the update an error... (1 Reply)
Discussion started by: patcom
1 Replies

7. Solaris

/home unwritable after new S10 install

I bought Solaris 10 some years ago and am now trying to use it. The install (on an Ultra 5) went ok but /home is unwritable. ls -l shows only Total 0. chmod won't add any permissions and the file manager shows the permissions to be n/a. Trying to write to /home results in a cannot create... (5 Replies)
Discussion started by: snorkack59
5 Replies

8. Solaris

Routing problem on new S10 install

I have a small network with a PC running FreeBSD, a DSL router/modem, an Ultra 10 running Solaris 2.6 and an Ultra 5 with a new Solaris 10 install. The network config. was set up similar to the S2.6 box. The S10 box can access all hosts on the network including the DSL modem but an attempt go... (2 Replies)
Discussion started by: snorkack59
2 Replies

9. Solaris

S10 Live Upgrade w/ VxVM unencapsulated

Hello All, I will be upgrading a Solaris 10 (11/06 u3) server to 09/10 u9. I am aware of all the patching necessary and the Live Upgrade procedure for this. This system has VxVM (5.0) installed and used for managing SAN data disks only. Root disk(s) are not encapsulated. The info I can... (4 Replies)
Discussion started by: btny
4 Replies

10. Solaris

Create New Group/User/Password in S10

I have performed the following with lower case group and usernames and the only difference is that the error message under groupadd goes away, yet I am still unable to successfully add a user WITH a home directory. This is in Solaris 10. I am able to add a group, add a user, add the users... (3 Replies)
Discussion started by: Showflash
3 Replies
SASL(n) 					  Simple Authentication and Security Layer (SASL)					   SASL(n)

__________________________________________________________________________________________________________________________________________________

NAME
SASL - Implementation of SASL mechanisms for Tcl SYNOPSIS
package require Tcl 8.2 package require SASL ?1.3? ::SASL::new option value ?...? ::SASL::configure option value ?...? ::SASL::step context challenge ?...? ::SASL::response context ::SASL::reset context ::SASL::cleanup context ::SASL::mechanisms ?type? ?minimum? ::SASL::register mechanism preference clientproc ?serverproc? _________________________________________________________________ DESCRIPTION
The Simple Authentication and Security Layer (SASL) is a framework for providing authentication and authorization to comunications proto- cols. The SASL framework is structured to permit negotiation among a number of authentication mechanisms. SASL may be used in SMTP, IMAP and HTTP authentication. It is also in use in XMPP, LDAP and BEEP. See MECHANISMS for the set of available SASL mechanisms provided with tcllib. The SASL framework operates using a simple multi-step challenge response mechanism. All the mechanisms work the same way although the num- ber of steps may vary. In this implementation a callback procedure must be provided from which the SASL framework will obtain users details. See CALLBACK PROCEDURE for details of this procedure. COMMANDS
::SASL::new option value ?...? Contruct a new SASL context. See OPTIONS for details of the possible options to this command. A context token is required for most of the SASL procedures. ::SASL::configure option value ?...? Modify and inspect the SASL context option. See OPTIONS for further details. ::SASL::step context challenge ?...? This is the core procedure for using the SASL framework. The step procedure should be called until it returns 0. Each step takes a server challenge string and the response is calculated and stored in the context. Each mechanism may require one or more steps. For some steps there may be no server challenge required in which case an empty string should be provided for this parameter. All mecha- nisms should accept an initial empty challenge. ::SASL::response context Returns the next response string that should be sent to the server. ::SASL::reset context Re-initialize the SASL context. Discards any internal state and permits the token to be reused. ::SASL::cleanup context Release all resources associated with the SASL context. The context token may not be used again after this procedure has been called. ::SASL::mechanisms ?type? ?minimum? Returns a list of all the available SASL mechanisms. The list is sorted by the mechanism preference value (see register) with the preferred mechanisms and the head of the list. Any mechanism with a preference value less than theminimum (which defaults to 0) is removed from the returned list. This permits a security threshold to be set. Mechanisms with a preference less that 25 transmit authentication are particularly susceptible to eavesdropping and should not be provided unless a secure channel is in use (eg: tls). The type parameter may be one of client or server and defaults to client. Only mechanisms that have an implementation matching the type are returned (this permits servers to correctly declare support only for mechanisms that actually provide a server implementa- tion). ::SASL::register mechanism preference clientproc ?serverproc? New mechanisms can be added to the package by registering the mechanism name and the implementing procedures. The server procedure is optional. The preference value is an integer that is used to order the list returned by the mechanisms command. Higher values indicate a preferred mechanism. If the mechanism is already registered then the recorded values are updated. OPTIONS
-callback Specify a command to be evaluated when the SASL mechanism requires information about the user. The command is called with the cur- rent SASL context and a name specifying the information desired. See EXAMPLES. -mechanism Set the SASL mechanism to be used. See mechanisms for a list of supported authentication mechanisms. -service Set the service type for this context. Some mechanisms may make use of this parameter (eg DIGEST-MD5, GSSAPI and Kerberos). If not set it defaults to an empty string. If the -type is set to 'server' then this option should be set to a valid service identity. Some examples of valid service names are smtp, ldap, beep and xmpp. -server This option is used to set the server name used in SASL challenges when operating as a SASL server. -type The context type may be one of 'client' or 'server'. The default is to operate as a client application and respond to server chal- lenges. Mechanisms may be written to support server-side SASL and setting this option will cause each step to issue the next chal- lenge. A new context must be created for each incoming client connection when in server mode. CALLBACK PROCEDURE
When the SASL framework requires any user details it will call the procedure provided when the context was created with an argument that specfies the item of information required. In all cases a single response string should be returned. login The callback procedure should return the users authorization identity. Return an empty string unless this is to be different to the authentication identity. Read [1] for a discussion about the specific meaning of authorization and authentication identities within SASL. username The callback procedure should return the users authentication identity. Read [1] for a discussion about the specific meaning of authorization and authentication identities within SASL. password The callback procedure should return the password that matches the authentication identity as used within the current realm. For server mechanisms the password callback should always be called with the authentication identity and the realm as the first two parameters. realm Some SASL mechanisms use realms to partition authentication identities. The realm string is protocol dependent and is often the current DNS domain or in the case of the NTLM mechanism it is the Windows NT domain name. hostname Returns the client host name - typically [info host]. MECHANISMS
ANONYMOUS As used in FTP this mechanism only passes an email address for authentication. The ANONYMOUS mechanism is specified in [2]. PLAIN This is the simplest mechanism. The users authentication details are transmitted in plain text. This mechanism should not be pro- vided unless an encrypted link is in use - typically after SSL or TLS has been negotiated. LOGIN The LOGIN [1] mechanism transmits the users details with base64 encoding. This is no more secure than PLAIN and likewise should not be used without a secure link. CRAM-MD5 This mechanism avoids sending the users password over the network in plain text by hashing the password with a server provided ran- dom value (known as a nonce). A disadvantage of this mechanism is that the server must maintain a database of plaintext passwords for comparison. CRAM-MD5 was defined in [4]. DIGEST-MD5 This mechanism improves upon the CRAM-MD5 mechanism by avoiding the need for the server to store plaintext passwords. With digest authentication the server needs to store the MD5 digest of the users password which helps to make the system more secure. As in CRAM-MD5 the password is hashed with a server nonce and other data before being transmitted across the network. Specified in [3]. OTP OTP is the One-Time Password system described in RFC 2289 [6]. This mechanism is secure against replay attacks and also avoids storing password or password equivalents on the server. Only a digest of a seed and a passphrase is ever transmitted across the net- work. Requires the otp package from tcllib and one or more of the cryptographic digest packages (md5 or sha-1 are the most commonly used). NTLM This is a proprietary protocol developed by Microsoft [5] and is in common use for authenticating users in a Windows network envi- ronment. NTLM uses DES encryption and MD4 digests of the users password to authenticate a connection. Certain weaknesses have been found in NTLM and thus there are a number of versions of the protocol. As this mechanism has additional dependencies it is made available as a separate sub-package. To enable this mechanism your application must load the SASL::NTLM package. X-GOOGLE-TOKEN This is a proprietary protocol developed by Google and used for authenticating users for the Google Talk service. This mechanism makes a pair of HTTP requests over an SSL channel and so this mechanism depends upon the availability of the tls and http packages. To enable this mechanism your application must load the SASL::XGoogleToken package. In addition you are recommended to make use of the autoproxy package to handle HTTP proxies reasonably transparently. EXAMPLES
See the examples subdirectory for more complete samples using SASL with network protocols. The following should give an idea how the SASL commands are to be used. In reality this should be event driven. Each time the step command is called, the last server response should be provided as the command argument so that the SASL mechanism can take appropriate action. proc ClientCallback {context command args} { switch -exact -- $command { login { return "" } username { return $::tcl_platform(user) } password { return "SecRet" } realm { return "" } hostname { return [info host] } default { return -code error unxpected } } } proc Demo {{mech PLAIN}} { set ctx [SASL::new -mechanism $mech -callback ClientCallback] set challenge "" while {1} { set more_steps [SASL::step $ctx challenge] puts "Send '[SASL::response $ctx]'" puts "Read server response into challenge var" if {!$more_steps} {break} } SASL::cleanup $ctx } REFERENCES
[1] Myers, J. "Simple Authentication and Security Layer (SASL)", RFC 2222, October 1997. (http://www.ietf.org/rfc/rfc2222.txt) [2] Newman, C. "Anonymous SASL Mechanism", RFC 2245, November 1997. (http://www.ietf.org/rfc/rfc2245.txt) [3] Leach, P., Newman, C. "Using Digest Authentication as a SASL Mechanism", RFC 2831, May 2000, (http://www.ietf.org/rfc/rfc2831.txt) [4] Klensin, J., Catoe, R. and Krumviede, P., "IMAP/POP AUTHorize Extension for Simple Challenge/Response" RFC 2195, September 1997. (http://www.ietf.org/rfc/rfc2195.txt) [5] No official specification is available. However, http://davenport.sourceforge.net/ntlm.html provides a good description. [6] Haller, N. et al., "A One-Time Password System", RFC 2289, February 1998, (http://www.ieft.org/rfc/rfc2289.txt) AUTHORS
Pat Thoyts BUGS, IDEAS, FEEDBACK This document, and the package it describes, will undoubtedly contain bugs and other problems. Please report such in the category sasl of the Tcllib SF Trackers [http://sourceforge.net/tracker/?group_id=12883]. Please also report any ideas for enhancements you may have for either package and/or documentation. KEYWORDS
SASL, authentication COPYRIGHT
Copyright (c) 2005-2006, Pat Thoyts <patthoyts@users.sourceforge.net> sasl 1.3.0 SASL(n)
All times are GMT -4. The time now is 09:02 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy