Hi,

Is there a way to create logins that are only accessed via authorized_keys so that security(8) doesn't complain about them every day?

The general goal is to disable remote root login via SSH and allow an unprivileged "admin" user access via key files and pass phrases (and then sudo or su).

My problem is security(8) complains about this every day:

"Login admin is off but still has a valid shell and alternate access files in home directory are still readable."

Which, taking a look at the newly rewritten /usr/libexec/security script, is a result of the .ssh files existing and being readable by anyone:

  or check_access_file "$home/.$_", $name
    foreach qw(ssh rhosts shosts klogin);

and:

  nag $mode & (S_IRUSR | S_IRGRP | S_IROTH) && ! -O $filename,

It seems to me I need to learn how to make these types of logins in such a way that security(8) doesn't whine about them; or, if that is not possible, I will write a patch for /usr/libexec/security that works the way I want it to and post it.

Thanks all,
Tyler

Reply via email to