[EN] Enable key authentication on Win32-OpenSSH

After you have configured “sshd_config” in Win32-OpenSSH to enable key authentication feature and have copied your public key to “%systemdrive%\users\user\.ssh\authorized_keys” as written on their Wiki, the publickey authentication still does not work.

The missing step, not well documented, consists in copying “ssh_lsa.dll” to “%WINDIR%/System32” directory, and adding “ssh-lsa” string to the “HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/Lsa/Authentication Packages” registry key.

Hey man, you’re on windows, don’t forget to reboot! 😉

[EN] VeeamVixProxy 0day (CVE-2015-5742)

Pasquale `sid` Fiorillo, Francesco `ascii` Ongaro from ISGroup, an Italian Security firm, and Antonio `s4tan` Parata from ush team, have released a critical security advisory for any version of Veeam Backup & Replication prior to 8 Update 3.

The issue potentially involves 157,000 customers and 9.1 million Virtual Machines worldwide and could lead to full Domain Administrator compromise of the affected infrastructures.

Veeam Software provides backup, disaster recovery and virtualization management software for the VMware and Hyper-V environments.

[EN] PGP: merging subkeys and primary private key

Work dir

$ mkdir keys1
$ mkdir keys2

Export private key

$ cd keys1
$ gpg --export-secret-keys  | gpgsplit
$ cat * | gpg --list-packets

Get subkeys

$ cd keys2
$ cp /path/to/backup/with/subkeys/privatekey.pgp ./
$ cat privatekey.pgp | gpgsplit
$ cat * | gpg --list-packets

Assemble the new key

$ cd..
$ cat keys1/000001-005.secret_key keys1/000002-013.user_id keys1/000003-002.sig keys2/000006-007.secret_subkey keys2/000007-002.sig > finalkey.pgp


$ gpg --delete-secret-and-public-keys 
$ gpg --import finalkey.pgp