On 08/22/14 16:57, Paul Wouters wrote:
> On Fri, 22 Aug 2014, Remy van Elst wrote:
>
>>> chpasswd(8) can do that, but the pam method in pluto doesn't run
>>> anything
>>> through crypt (it will leave the password verification to the pam
>>> stac
On 08/22/14 16:44, Matt Rogers wrote:
> On 08/22, Remy van Elst wrote:
>>
>>
>> On 08/22/14 16:30, Matt Rogers wrote:
>>> On 08/22, Remy van Elst wrote:
>>>> How would I apply this to system/PAM authentication? The passwords in
>>>> the shado
On 08/22/14 16:30, Matt Rogers wrote:
> On 08/22, Remy van Elst wrote:
>> How would I apply this to system/PAM authentication? The passwords in
>> the shadow file are SHA512 ($6$...)
>>
> chpasswd(8) can do that, but the pam method in pluto doesn't run anything
>
How would I apply this to system/PAM authentication? The passwords in
the shadow file are SHA512 ($6$...)
On 08/21/14 21:15, Matt Rogers wrote:
> On 08/21, Pontus Wiberg wrote:
>> FYI did a new setup on a Ubuntu server with no additional software but
>> Libreswan and the requirements, a clean se
I'll try to make some time to reproduce the setup, the VM's are all
deleted now. I'll also try to work in Paul's suggestion.
I've not tried it on Ubuntu yet.
On 08/21/14 00:05, Matt Rogers wrote:
> On 07/21, Remy van Elst wrote:
>> Hello Paul,
>>
>>
ptables' command [OK]
Checking 'prelink' command does not interfere with FIPSChecking for
obsolete ipsec.conf options [OK]
Opportunistic Encryption [DISABLED]
On 07/21/14 16:38, Paul Wouters wrote:
> On Sun,
I'm having an issue with Libreswan 3.8 (netkey) on 3.15.4-x86_64 /
CentOS 7.
The user authentication fails. I'm using a windows 7 machine with the
Shrew client. Both with PAM as with the passwd file. I'm sure the
password is correct, tried multiple different ones, even testtest.
/etc/ipsec.conf: