Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 22 Jun 2004 09:34:07 -0700
From:      Erick Mechler <emechler@techometer.net>
To:        Didier Wiroth <didier.wiroth@mcesr.etat.lu>
Cc:        freebsd-security@freebsd.org
Subject:   Re: Opieaccess file, is this normal?
Message-ID:  <20040622163407.GQ75424@techometer.net>
In-Reply-To: <0HZP00GS3W981A@mail.etat.lu>
References:  <0HZP00GS3W981A@mail.etat.lu>

next in thread | previous in thread | raw e-mail | index | archive | help
:: >From what I've read so far, if the user is present in opiekeys, the
:: opieaccess file determines if the user (coming from a specific host or
:: network) is allowed to use his unix password from this specific network. 
:: 
:: As my opieaccess file is empty and the default rule (as mentionned in the
:: man file) is deny, I should not be able to get an ssh shell with my standard
:: unix password.

OpenSSH on FreeBSD is PAM-enabled if ChallengeResponseAuthentication is set
to yes:

     ChallengeResponseAuthentication
             Specifies whether challenge-response authentication is allowed.
             Specifically, in FreeBSD, this controls the use of PAM (see
             pam(3)) for authentication.  Note that this affects the effec-
             tiveness of the PasswordAuthentication and PermitRootLogin vari-
             ables.  The default is ``yes''.

Does your /etc/pam.conf disble password authentication?

Cheers - Erick



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040622163407.GQ75424>