locked account accessable via pubkey auth
Nicolas Williams
Nicolas.Williams at ubsw.com
Thu Jan 31 03:23:31 EST 2002
Leave things as they are please - do not add a check to see if the
password field in the shadow entry is *LK*, that would not be generally
useful (think: what if you're using only Kerberos for password
validation?).
Setting a user's shell to /bin/false works quite well. So does putting
them in a deny group.
And BTW, you do have the same sort of problem with, say, Samba.
If you're using PAM you can always add write/install/use a PAM module
whose job is to return PAM_PERM_DENIED or something from its
pam_sm_acct_mgmt() for locked accounts using whatever mechanism youX
prefer for checking for locked accounts.
That's what PAM is there for. Better to write/install/use a PAM module
than to add kludges to apps like OpenSSH.
IMHO.
Cheers,
Nico
--
-DISCLAIMER: an automatically appended disclaimer may follow. By posting-
-to a public e-mail mailing list I hereby grant permission to distribute-
-and copy this message.-
Visit our website at http://www.ubswarburg.com
This message contains confidential information and is intended only
for the individual named. If you are not the named addressee you
should not disseminate, distribute or copy this e-mail. Please
notify the sender immediately by e-mail if you have received this
e-mail by mistake and delete this e-mail from your system.
E-mail transmission cannot be guaranteed to be secure or error-free
as information could be intercepted, corrupted, lost, destroyed,
arrive late or incomplete, or contain viruses. The sender therefore
does not accept liability for any errors or omissions in the contents
of this message which arise as a result of e-mail transmission. If
verification is required please request a hard-copy version. This
message is provided for informational purposes and should not be
construed as a solicitation or offer to buy or sell any securities or
related financial instruments.
More information about the openssh-unix-dev
mailing list