Fedora Security :: Authentication For Editing A Wireless Connection?

Aug 19, 2009

while tampering with the settings for my wireless connection by right-clicking on the icon on the top menu i was originally asked for my password for authentication. i selected the option to remember the password for future sessions unintentionally.

how do i get it back to the original setting so that it asks for a password before allowing me into the editing screen? i tried preferences > system > authorisations > network-manager-settings, but it didnt work.

View 2 Replies


ADVERTISEMENT

Fedora :: Wireless Connection Hangs On Waiting For Authentication

Mar 20, 2011

Has anyone else been having problems with their wireless network connections since the network manager updates? I have two different networks that I connect to and have in the past had no problems since figuring out what files were missing and had to be either created or corrected and copied into the correct locations. I have tried everything I know to get my secondary wireless connection working to no avail(currently connected through my neighbors unprotected network), from deleting the connection, rebooting and recreating it, editing the files and copying them back into the correct locations and nothing works.

I have even had many crashes while using network manager. Using system-network-config eliminated the crashes but still does not allow the connection to connect. It attempts to connect and just hangs on waiting for authentication after prompting for the WEP key and clicking OK. What in the heck is going on since the devs created all these updates and have once again broken the most important aspect of any usable system, the network? I'm running F14 and KDE 4.6.1.

View 8 Replies View Related

Security :: Wireless Authentication For Home Hotspot

Mar 1, 2010

I would like to have a web site pop-up on the persons laptop that connects to my wifi network. The page will let them know this is my network and give a list of shares on the network. Then click ok to get wireless authentication. Something like you get when you connect to a wireless connection in a hotel. software i can install on my Ubuntu 9.10 server to do this.

View 1 Replies View Related

Debian :: Wireless Connection Dropping Out Constantly Or Failing Authentication?

Mar 12, 2011

Using Wicd and it keeps dropping out or telling me "bad password" when the password is in fact correct. I even know it works because the first couple of times it worked, but the connection wasn't sustained for more than a few seconds each time. My reasoning is my wireless is functional in Ubuntu, there's no reason it shouldn't be in Debian. Wireless network card is ASUS PCE-N13. Ralink driver is installed. WPA-supplicant is installed. Gnome Network Manager is also present, though I've heard that it doesn't support my particular situation.

View 5 Replies View Related

Ubuntu Security :: Configure SSH Key-based Authentication And SSH Password Authentication In Same Machine For Different User?

Jan 10, 2010

I want to configure SSH key-based authentication and SSH password Authentication in same machine for different user .

View 1 Replies View Related

Security :: Make A Choice On What Authentication Protocol To Use For Authentication And Authorization?

Jan 17, 2011

I need to make a choice on what authentication protocol I want to use for Authentication and Authorization. I was looking at Radius and then literature suggested that Diameter was a better protocol. Keep in mind I need this on a hetrogeneous setup ( linux & windows together). Diameter seemed like a good fit until I discovered that the open source code no longer seems to be maintained ( C/C++).

I was also looking at Kerberos as an option though there is alot overhead with the server. SSL/TLS or EAP? I am looking for simple but secure and am new at the security protocols.

View 2 Replies View Related

Fedora Security :: Reset The Root Password By Booting Into Single Usermode By Editing Grub

Apr 17, 2009

Being able to reset the root password by booting into single usermode by editing grub. This is a MAJOR flaw. I know it makes no real difference against internet bourne attacks, but even so I must say I found it shocking. The only way I've found to stop this is to encrypt the entire HDD, so noone could get into single user mode without first knowing the encryption key/password.

View 14 Replies View Related

Fedora Security :: Ssh Authentication Slow From Remote?

Aug 17, 2010

My server is connected to the Internet for ssh on port 22 with root logon disabled, a single non-dictionary word user name allowed, and pki authentication only (about as secure as I can make it). I've previously run fc5 and 9 servers using the same sshd config since 2006 and had no security troubles, so I'm happy, but.. After the fc13 install and configuration, logins from a host on a remote network are taking about 1m 30s to complete! A (partial) console output for ssh -vv appears below. The lines marked with "**" were the lines after which significant pauses happen. This is fully repeatable.

Code:

debug1: Next authentication method: publickey
debug1: Offering public key:
debug2: we sent a publickey packet, wait for reply

[code]....

View 3 Replies View Related

Fedora Security :: Root Login Via Ssh 12 Password Authentication?

Jan 27, 2010

Can't seem to do it, wondering if anyone knows how? Normally there's something in sshd_config that can be switched to true or yes to allow root login but I can't see it in fedora 12.I can login via root at a terminal no problem, just not via ssh, I get access denied every time. Also, I need to login using password authentication.I've done: 227169 but that's just for GUI which I don't really need since I rarely ever log into the GUI.I have also searched through here and mostly only found info such as above, how to enable root login for GUI, or billions of posts about how logingin as root is bad but I cannotswer to my question.DISCLAIMER: Please do not reply to this thread if all you can contribute is the question of why I need root or to put some message telling me I can do everything using su, etc, etc. Please only contribute if you can answer my question. A: My machine and a valid quesiton. B: Spirit of Linux is open, not restrictive

View 3 Replies View Related

Fedora Security :: Authentication Method For Home And Office Networks?

Mar 9, 2010

The first is regarding my home network that I've setup. It mainly consists of two laptops, both running fedora. I find myself using rsync, ssh, scp, and the like quite often, but it is very annoying constantly needing to provide a password. This sounds like a job for RSA keys, but is it safe to do so on my laptop I take whenever I travel? If my laptop were to be stolen, my personal and private keys would be available to the thief. Is it instead better to use something like kerberos (which I'm not very familiar with, ie. I've used it at work but never took the time to learn how it works).

This isn't much of an issue with my home network since it is protected behind my router. However, I have the same issue with rsync, and ssh to my work PC. These are the RSA keys I'm worried about if my laptop were to be stolen.

View 3 Replies View Related

Fedora Security :: Dovecot User Authentication Failed With Selinux

Jun 24, 2010

I'm using FC8 and have installed a mailserver(postfix+dovecot),when I trying to enable the selinux mode to enforcing and i'm have some issue, the user authentication failed.if turn the selinux mode to permissive, then it work right.How can i to fix this problem?

View 14 Replies View Related

Fedora Security :: Connecting Machine To A Microsoft VPN Server Using RSA Authentication?

Jul 28, 2011

Has anyone got experience connecting a linux machine to a Microsoft VPN server using RSA authentication? What puzzles me perhaps most about this topic is the absolute dirth of information. If it is not possible, can anyone tell me why?

View 9 Replies View Related

Fedora Networking :: Authentication Wireless Fail?

Feb 19, 2011

is there a "debug" method for your wireless connection. My authentication for 2 laptops Dell d600 and IBM t42 both are unable to connectreless routers (2 different ones).Fedora 14 32bit Gnome NetworkManager

View 13 Replies View Related

Fedora Networking :: 11 - Share My Internet Connection With Wireless Connection

Jun 21, 2009

I have installed Fedora 11 recently. I want to share my Internet connection.

I have e LAN connection eth0 which is connected to internet.

I have a Wireless connection wlan0.

I want to share my internet connection with wireless connection.

View 3 Replies View Related

Fedora Networking :: Unstable Wireless Connection With Broadcom Onboard Wireless?

Dec 21, 2010

I am running FC13 on a Compaq Presario 2100 using a Broadcom BCM4306. I was able to get it running thanks to Fedora Unity Project. But It's a very unstable connection. I don't know what settings to adjust or enable or disable. It's not my router, this is the only wireless connection in the house that I have trouble with.

View 1 Replies View Related

Security :: User Authentication Security Mechanisms

Feb 2, 2011

What security mechanisms are used by recent versions of the Linux operating system during user authentication?

View 3 Replies View Related

Security :: Finding And Editing Firestarter Events Log?

Aug 15, 2010

There are far too many 'events' in Firestarter's log. I can't find which file contains the log either by searching my file system or the internet.

View 4 Replies View Related

Security :: Using Sudoers To Restrict Editing Of Certain Files?

Aug 2, 2010

In a recent discussion I had, I was led to believe I could use sudoers to restrict using vi (for example) for the editing of say specific config files. I know how to allow root use of vi and how to lock it down from getting to a bash prompt with NOEXEC tag,but I can't figure out how to restrict the use of vi to only edit certain files. Tutorials and howtos I have checked don't address this

View 7 Replies View Related

Ubuntu Networking :: Connect The Internet By Way Of Editing Connection On Panel And Could Access The Net?

Sep 22, 2010

Recently I had installed Ubuntu 10.04 in which I had connected to the internet by way of terminal (pppoeconf) and I could access any site with ease.But one fine day suddenly I could not access the net, I try to locate the notification icon (network manager),but could not find it.I did this and that,googled it trying to find the solution but alas to my disappointment I had to format it.

After reinstallation of Ubuntu I connect the internet by way of editing connection on panel and i could access the net. The problem is that I could not access some site especially org site e.g Home - Desiring God so can anybody guide me in how to connect in most better way.

View 5 Replies View Related

Fedora Security :: SElinux Is Blocking My Internet Connection

Mar 15, 2009

SElinux is blocking my internet connection and every time when I connect t the internet (pppoe connection) I ge message.

View 2 Replies View Related

Fedora Security :: SELinux Stopping Dial Up Connection?

Aug 6, 2009

well after spending most of the morning getting help with my internet connection hanging when I dial up we discover that SELinux is causing it so when I set it to passive I can connect so how can I get it to allow me to connect while being set to enforcing?

View 5 Replies View Related

Fedora Security :: 2 Nics Internet Connection Sharing ?

Feb 2, 2010

I have several Proxy severs set up at our business. I always do the same basic config, except for my version of Fedora (I always grab the newest).

I put 2 nics in a machine Load Squid, Dansguardian and Firestarter. I use Firestarter to direct the surfing traffic from my LAN out a cable modem that I have for each store. This lessons the bandwidth on the T1.

Easy enough. My problem is Firestarter has always been a little flaky. But as of F11 the gui wont stay up for more than a few minutes at a time. It still functions, but you have to be quick if your going to use it because it will inevitable crash.

So I suppose it's time to start doing this the correct way and using IP Tables. Does anybody have a resource they can point me to that will help me understand how to do this? It looks like this might be as simple as setting it up with the GUI Firewall tool that comes with F12 but I'm still not exactly sure how.

View 6 Replies View Related

Ubuntu Networking :: Wireless - Lost It - 'wmaster0 No Wireless Extensions', But Then Refers To Wlan0 As The Wireless Connection

Mar 28, 2010

A friend who switched ISP's gave me his old Linksys WRT54-G wireless router. I went through the installation procedure and had a wireless connection up and running - smiley face. I had security set up for WPA, and decided to upgrade it to WPA2. Another smiley face. When I went to connect (had already done so successfully), I noticed it referred to my wireless as Linksys - I was expecting to see the SSID. So I started playing around in Network Manager and now I have things all effed up.

Don't know exactly what I did, but now I have no wireless. So I ran a few commands (lshw -C network, iwconfig, ifconfig, and iwlist scan), and looking at the results I see what appear to be inconsistencies in the output. I've posted them below, and make the following observations:

1. Under the lshw it refers to my wireless connection logical name as wmaster0, and has the correct MAC address, etc.

2. Under the iwconfig it says, 'wmaster0 no wireless extensions', but then refers to wlan0 as the wireless connection (although it does not seem to be running).

3. Under ifconfig I see both a wlan0 and a wlan0:avahi. The wlan0 has no IP, the wlan0:avahi does, but it is incorrect.

[Code]...

View 7 Replies View Related

Ubuntu Networking :: 802.1X Authentication For LAN (wired Connection)

Mar 15, 2010

I am using ubuntu in my new office, and I can't get the network working. The "official" OS installed was a Windows, and it has a special "dial-up" app for the LAN connection (not wireless). My network admin is apparently not helpful, since he actually knows nothing about the internals for the "dial-up" app (he did not even ever heard of TTLS, PEAP, MD5, etc), and claimed that no OS except for Windows can work...

Well, I have tested various configurations with my Mac laptop, and apparently the LAN connection requires 802.1X authentication, and it's using a very weird combination "TTLS+PEAP+MD5" (if I check these options in Mac OS X, the connection works). However, in NetworkManager, I can't select both TTLS and PEAP, and moreover, TTLS does not work with MD5. So, is there anything I could try?

View 1 Replies View Related

Ubuntu :: SSH - Connection Closed On Password Authentication

Jan 7, 2011

I have a weird problem with ssh, I am trying to ssh to a solaris server (sparc) running solaris 10 from my Ubuntu box and as soon as it authenticates the password it closes the connection. The box is located on a internal network in a wiring closet with no ability for me to access console but i still have a working ssh session from 2 days ago with what i'm trying to comb through settings and trying to resolve the issue. It also has 2 NIC's and I cannot connect to the either ruling out hardware problem. I checked if there is a limit of the number of active connections and the was no limit. I was able to connect mitiple session till 2 days ago (at one point i had on my machine 8 active ssh sessions to the same server).

Here is the output of ssh -vvv:
Code: $ ssh -vvv -l user1 10.100.xxxxx
OpenSSH_5.5p1 Debian-4ubuntu4, OpenSSL 0.9.8o 01 Jun 2010
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug2: ssh_connect: needpriv 0 .....
debug3: channel 0: close_fds r -1 w -1 e 6
Connection to 10.100.50.4 closed.
Transferred: sent 1768, received 1688 bytes, in 0.1 seconds
Bytes per second: sent 12077.9, received 11531.4
debug1: Exit status 254

View 1 Replies View Related

Networking :: WiFi Connection And Authentication Through OpenLDAP?

May 24, 2010

Is it possible to monitor WiFi connections and identify who are connected through OpenLDAP? If so, how will authentication be possible? By the way, I'm open if OpenLDAP is inappropriate for such authentication purposes and scenario.

View 2 Replies View Related

Security :: SSH User Authentication Using Certificate

Mar 19, 2010

I was trying to configure user authentication in SSH using certificate method.As u all know the usual way of authentication is using the ssh-keygen method. But i want the another method where we create a certificate key and send it to the CA, which signs it and send back etc etc.I cannot find any unique procedure in the net to configure this method.

View 3 Replies View Related

Security :: Too Many Squid Authentication Windows?

Oct 25, 2010

I have squid proxy authenticating Internet users with LDAP. It's working well. But I have problem when I authenticate to squid proxy to login to Yahoo Messenger. Each time, I login to YM application, the squid proxy popups many authentication windows. These confuse users when they you YM. I checked in squid access log and see that: when users use YM application, the application requests the following links:

[code]...

With each link, squid requires one authentication window. Do you have any ways to squid require only one authentication window when users use YM?

View 2 Replies View Related

Security :: Web Client Authentication Through PKI And CACs?

Jul 9, 2010

I'm working on a work project related to Web (Client) authentication and DOD Common Access Cards. But I'm having difficult getting the details about what happens on the CAC side of things.

I familiar with the PKI system as it applies to e-mail. (Correct me if I err, of course.) If you want to sign an e-mail (i.e., so it can be authenticated by the receiver) you use your private key to add a digital signature to the message. Then, the receiver uses your published public key to determine if the digital signature is valid, i.e., was created using your private key (even though the receiver never actually has access to your private key).

So... my questions:

1) When a person with a DOD CAC visits a CAC-enabled web site, and the server grants access after the CAC is inserted, is the authentication process fundamentally the same as what happened with the e-mail authentication?

2) If the private key is used in this process (it would have to be, correct?) is the signature created on the CA Card electronics (i.e., the private key remains on the CAC)? Or is the private key copied onto the computer, which uses it to create the signature?

View 1 Replies View Related

Fedora Networking :: Cannot Get A Wireless Connection With KDE At All

Oct 8, 2009

In Gnome, I can get my wireless connection working no problem. However, my work PC uses KDE and I'm kind of used to it now, so I've installed KDE on to my Fedora system (v11, 64-bit). I cannot get a wireless connection with KDE at all.

As an aside, Gnome manages my dual monitor set-up just fine, whilst KDE doesn't - it gives me the same display on both screens.

why what is effectively a different front-end should make such a difference to the internal programs - a bit like respraying your car from red to blue and then finding out you need to change the engine as well.

View 2 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved