From owner-freebsd-security Fri Dec 11 21:49:15 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id VAA18418 for freebsd-security-outgoing; Fri, 11 Dec 1998 21:49:15 -0800 (PST) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from isr3277.urh.uiuc.edu (isr3277.urh.uiuc.edu [130.126.65.13]) by hub.freebsd.org (8.8.8/8.8.8) with SMTP id VAA18413 for ; Fri, 11 Dec 1998 21:49:14 -0800 (PST) (envelope-from ftobin@bigfoot.com) Received: (qmail 3312 invoked by uid 1000); 12 Dec 1998 05:49:03 -0000 Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 12 Dec 1998 05:49:03 -0000 Date: Fri, 11 Dec 1998 23:47:32 -0600 (CST) From: Frank Tobin X-Sender: ftobin@isr3277.urh.uiuc.edu To: FreeBSD-security Mailing List Subject: Limiting which users can login via xdm Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I was wondering if there was a way to limit access to xdm according to users. A major reason I'd like to be able to do this is that it could ensure that I could keep track of logins to xdm that are done remotely. Can one get xdm to use login(1), and consequently, check access via /etc/login.access? - -- Frank Tobin "To learn what is good and what is to be http://www.bigfoot.com/~ftobin valued, those truths which cannot be shaken or changed." Myst: The Book of Atrus FreeBSD: The Power To Serve If you use Pine and PGP 5.0(i), try pgpenvelope. http://www.bigfoot.com/~ftobin/resources.html -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Charset: noconv iQA/AwUBNnH1vgL4UDr0DrZeEQJo0ACgrulKFqcHLUqw10DwJHF1/NSew/oAoLaR c5IhVzfZKi2Rsq+z7iWFNvX9 =nSD+ -----END PGP SIGNATURE----- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message