看板FB_security
標 題FW: Opieaccess file, is this normal?
發信站NCTU CSIE FreeBSD Server (Thu Jun 24 07:28:49 2004)
轉信站ptt!FreeBSD.csie.NCTU!not-for-mail
Hmm,=20
I thought using .opiealways would be the solution see:
http://www.onlamp.com/pub/a/bsd/2003/02/20/FreeBSD_Basics.html
Or
http://people.freebsd.org/~des/diary/2002.html
But I can still login with the standard password even if the opieacce=
ss file
is empty.
-----Original Message-----
=46rom:
[email protected]
[mailto:
[email protected]] On Behalf Of Didier Wirot=
h
Sent: Thursday, June 24, 2004 09:06
To:
[email protected]
Subject: RE: Opieaccess file, is this normal?
Hi,
Here is the content of /etc/pamd/ssh, it's actually the default, I di=
dn't
change it.
auth required pam_nologin.so no_warn
auth sufficient pam_opie.so no_warn
no_fake_prompts
auth requisite pam_opieaccess.so no_warn allow=
_local
auth required pam_unix.so no_warn
try_first_pass
account required pam_unix.so
session required pam_permit.so
password required pam_unix.so no_warn
try_first_pass
=CE just want to point out the I want to keep "unix password authenti=
cation"
for the users whose host or network are in opieaccess. "Unix password
authenication" should be disabled for all users present in opiekeys a=
nd
whose hosts or network is not present in opieaccess.
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "
[email protected]"