Hi Tim,

> From the man page:
> 
>     --disabled-login
>         Do not run passwd to set the password.  The user won't be able
>         to use her account  until  the password is set.
> 
>     --disabled-password
>         Like --disabled-login, but logins are still possible (for
>         example using SSH RSA keys) but not using password
>         authentication.
> 
> --disabled-login inserts a ! in the password field of /etc/shadow,
> --disabled-password inserts a * in the password field.
> 
> Testing on Debian 10, either way it's possible to log in with SSH using
> a keypair.  So I'm guessing this gets overridden by PAM setup.  Does
> anyone have a better insight into this.

It may be PAM.  sshd(8) here says it checks for a ‘locked’ account to
prohibit access by checking shadow(5) for a leading ‘!’ so
--disabled-login should do.  shadow(5) also mentions the meaning of ‘*’.

You could try usermod(8) to set the shadow expiry date for the account.
See what it is beforehand and then either set it to a date in the past
or just 1.  Not 0 though.  See if that stops sshd.

Also, pam_unix(8) has ‘no_pass_expiry’ and mentions SSH; might be worth
checking what PAM you have configured.

-- 
Cheers, Ralph.

-- 
  Next meeting: BEC, Bournemouth, Tuesday, 2020-02-04 20:00
  Check to whom you are replying
  Meetings, mailing list, IRC, ...  http://dorset.lug.org.uk/
  New thread, don't hijack:  mailto:dorset@mailman.lug.org.uk

Reply via email to