12-28-2017
I have to close using # same line because ssh daemon using weak algorithm such as hmac-sha1-96 and hmac-md5-96.
We have to close it according to penetration test.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
ok I have a list of files for example:
130-4-32.HindIII.0.ids
130-4-32.HindIII.0.ppm
130-4-32.HindIII.0.ppm.gz
130-4-33.HindIII.0.bands
130-4-33.HindIII.0.ics
130-4-33.HindIII.0.ids
130-4-33.HindIII.0.ppm
130-4-33.HindIII.0.ppm.gz
130-4-34.HindIII.0.bands ... (1 Reply)
Discussion started by: lorcet222
1 Replies
2. UNIX for Dummies Questions & Answers
Hello Everyone
I am new to this forum.
I am having a requirement to edit the file(the file is having some sql code).
And this file is in my colleagues login. This is readonly
Now I would like to edit this file.
In which way can I do this? (1 Reply)
Discussion started by: pradkumar
1 Replies
3. UNIX for Advanced & Expert Users
Hi,
I have to create an sftp configuration file. the requirement is like this
Encryption algorithm :
ArcFour (Implementation of the 128bit RC4 algorithm) ‘arcfour128'
Fallback:
(3DES algorithm) ‘3des'
How do I check the arcfour128 is implementation of RC4?
Also I dont see 3des algorithm... (0 Replies)
Discussion started by: shihabvk
0 Replies
4. Shell Programming and Scripting
Hi,
Can anybody brief me the difference between ssh_config & sshd_config. I am looking for the functionality difference.
any help appreciated
Shihab (4 Replies)
Discussion started by: shihabvk
4 Replies
5. UNIX for Dummies Questions & Answers
I have a .fs file that I want to edit, (or just be able to see what is in it) preferably through a windows environment. Does anyone know how to do that? Thanks (4 Replies)
Discussion started by: kiterboy
4 Replies
6. Shell Programming and Scripting
I have a file oratab with entry like this
SCADAG:/esitst1/oracle/product/9.2.0.8:Y
I am trying to discover a way to change the 9.2.0.8 part of this to something like 10.2.0.4 as part of an upgrade script.
I have tried
cat /etc/oratab >>/tmp/oratab... (1 Reply)
Discussion started by: sewood
1 Replies
7. Shell Programming and Scripting
I have a requirement, which is as follows
*. Folder contains list of xmls. Script has to create new xml files by copying the existing one and renaming it by appending "_pre.xml" at the end.
*. Each file has multiple <Name>fileName</Name> entry. The script has to find the first occurance of... (1 Reply)
Discussion started by: sudesh.ach
1 Replies
8. Shell Programming and Scripting
I have file like
cp -p /var/adm/ /tmp1/tmp1.log
cp -p /var/adm/ /tmp1/tmp2.log
cp -p /var/adm/ /tmp1/tmp3.log
cp -p /var/adm/ /tmp1/tmp4.log
I need to re-write the file like:
cp -p /var/adm/tmp1.log /tmp1/
cp -p /var/adm/tmp2.log /tmp1/
cp -p /var/adm/tmp3.log /tmp1/
cp -p... (3 Replies)
Discussion started by: h_banka
3 Replies
9. UNIX for Dummies Questions & Answers
Hi all,
I have installed Cygwin on my PC and am trying to modify the ssh_config file in the folder 'c:\cygwin\etc\defaults\etc'. However I noticed the owner of that file belongs to root. Unfortunately when I'm opening cygwin each time the default displayed path = 'username@PC', which means I... (1 Reply)
Discussion started by: isaacniu
1 Replies
10. UNIX for Advanced & Expert Users
Hi All,
I have file with 200K Records and each line with 400 character. I need to edit the some part of the file.
For example, i need to edit character from 115 to 125, 135to 145 and 344 to 361
Can you please anyone help me to do this?
Regards, (1 Reply)
Discussion started by: balasubramani04
1 Replies
LEARN ABOUT CENTOS
userdbpw
USERDBPW(8) Double Precision, Inc. USERDBPW(8)
NAME
userdbpw - create an encrypted password
SYNOPSIS
userdbpw [[-md5] | [-hmac-md5] | [-hmac-sha1]] |userdb {name} set {field}
DESCRIPTION
userdbpw enables secure entry of encrypted passwords into /etc/courier/userdb.
userdbpw reads a single line of text on standard input, encrypts it, and prints the encrypted result to standard output.
If standard input is attached to a terminal device, userdbpw explicitly issues a "Password: " prompt on standard error, and turns off echo
while the password is entered.
The -md5 option is available on systems that use MD5-hashed passwords (such as systems that use the current version of the PAM library for
authenticating, with MD5 passwords enabled). This option creates an MD5 password hash, instead of using the traditional crypt() function.
-hmac-md5 and -hmac-sha1 options are available only if the userdb library is installed by an application that uses a challenge/response
authentication mechanism. -hmac-md5 creates an intermediate HMAC context using the MD5 hash function. -hmac-sha1 uses the SHA1 hash
function instead. Whether either HMAC function is actually available depends on the actual application that installs the userdb library.
Note that even though the result of HMAC hashing looks like an encrypted password, it's really not. HMAC-based challenge/response
authentication mechanisms require the cleartext password to be available as cleartext. Computing an intermediate HMAC context does scramble
the cleartext password, however if its compromised, it WILL be possible for an attacker to succesfully authenticate. Therefore,
applications that use challenge/response authentication will store intermediate HMAC contexts in the "pw" fields in the userdb database,
which will be compiled into the userdbshadow.dat database, which has group and world permissions turned off. The userdb library also
requires that the cleartext userdb source for the userdb.dat and userdbshadow.dat databases is also stored with the group and world
permissions turned off.
userdbpw is usually used together in a pipe with userdb, which reads from standard input. For example:
userdbpw -md5 | userdb users/john set systempw
or:
userdbpw -hmac-md5 | userdb users/john set hmac-md5pw
These commands set the systempw field in the record for the user john in /etc/courier/userdb/users file, and the hmac-md5pw field. Don't
forget to run makeuserdb for the change to take effect.
The following command does the same thing:
userdb users/john set systempw=SECRETPASSWORD
However, this command passes the secret password as an argument to the userdb command, which can be viewed by anyone who happens to run
ps(1) at the same time. Using userdbpw allows the secret password to be specified in a way that cannot be easily viewed by ps(1).
SEE ALSO
userdb(8)[1], makeuserdb(8)[2]
NOTES
1. userdb(8)
userdb.html
2. makeuserdb(8)
makeuserdb.html
Double Precision, Inc. 08/23/2008 USERDBPW(8)