Date: Thu, 11 Dec 2008 09:11:26 +0100 From: Mel <fbsd.questions@rachie.is-a-geek.net> To: freebsd-questions@freebsd.org Cc: "Dan Mahoney, System Admin" <danm@prime.gushi.org>, Dan Nelson <dnelson@allantgroup.com> Subject: Re: How to block NIS logins via ssh? Message-ID: <200812110911.27184.fbsd.questions@rachie.is-a-geek.net> In-Reply-To: <alpine.BSF.2.00.0812110005480.2179@prime.gushi.org> References: <alpine.BSF.2.00.0812100440400.49382@prime.gushi.org> <20081210191617.GD82227@dan.emsphone.com> <alpine.BSF.2.00.0812110005480.2179@prime.gushi.org>
index | next in thread | previous in thread | raw e-mail
On Thursday 11 December 2008 08:10:09 Dan Mahoney, System Admin wrote:
> Given, there's several solutions to this:
>
> 1) The Kluge as above.
>
> 2) A pam module to check /etc/group (this is standard login behavior, and
> historically supported, and available on other platforms, adding a module,
> even to ports, is trivial.
>
> 3) A patch to openssh to do /etc/shells checking (I'll note that openSSH
> has the "UseLogin" option, which may also do this.
>
> 4) An option to pam_unix to check this. Differs from #2 in that it's a
> change to an existing module instead of one in ports.
5) Use AllowGroups/AllowUsers and/or their Deny equivalent in sshd_config.
6) Disable password based logins and use keys only.
--
Mel
Problem with today's modular software: they start with the modules
and never get to the software part.
home |
help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200812110911.27184.fbsd.questions>
