Date: Sat, 15 Jan 2000 17:33:50 -0500 (EST) From: "Crist J. Clark" <cjc@cc942873-a.ewndsr1.nj.home.com> To: danh@wzrd.com (Dan Harnett) Cc: ncb@zip.com.au (Nicholas Brawn), freebsd-security@FreeBSD.ORG Subject: Re: Disallow remote login by regular user. Message-ID: <200001152233.RAA53004@cc942873-a.ewndsr1.nj.home.com> In-Reply-To: <20000114034446.6B2CA5D01E@mail.wzrd.com> from Dan Harnett at "Jan 13, 2000 10:44:46 pm"
index | next in thread | previous in thread | raw e-mail
Dan Harnett wrote,
> Hello,
>
> You could also set this particular user's shell to /sbin/nologin and make the
> others use the -m option to su.
But if you do this, remember,
-m Leave the environment unmodified. The invoked shell is your lo-
gin shell, and no directory changes are made. As a security pre-
caution, if the target user's shell is a non-standard shell (as
defined by getusershell(3)) and the caller's real uid is non-ze-
ro, su will fail.
You have to add '/sbin/nologin' to /etc/shells.
--
Crist J. Clark cjclark@home.com
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200001152233.RAA53004>
