Date: Fri, 8 Oct 2004 18:18:12 +0200 From: Jeremie Le Hen <jeremie@le-hen.org> To: Jim Hatfield <subscriber@insignia.com> Cc: freebsd-security@freebsd.org Subject: Re: Question restricting ssh access for some users only Message-ID: <20041008161812.GC806@obiwan.tataz.chchile.org> In-Reply-To: <kp8dm054h3kcnm4chrm2gupsmospi6cnai@4ax.com> References: <3203DF3DDE57D411AFF4009027B8C36760563C@exchange-uk.isltd.insignia.com> <kp8dm054h3kcnm4chrm2gupsmospi6cnai@4ax.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> >have you tried using /etc/login.access? > > Hmm, looks like sshd does not consult this file! login.conf(5) is indeed the configuration file for login(1) which is not used sshd(8) with the default configuration. You have to use the `UseLogin' option described in sshd_config(5) : UseLogin Specifies whether login(1) is used for interactive login ses- sions. The default is ``no''. Note that login(1) is never used for remote command execution. Note also, that if this is enabled, X11Forwarding will be disabled because login(1) does not know how to handle xauth(1) cookies. If UsePrivilegeSeparation is specified, it will be disabled after authentication. Apart from that, `AllowUsers' and `AllowGroups' have been mentioned multiple times, but it might be easier to use `DenyUsers' and `DenyGroups' options for the described situation. Regards, -- Jeremie Le Hen jeremie@le-hen.org
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20041008161812.GC806>