On 26/03/25 20:55, Daniel Jakots wrote:
> On Thu, 27 Mar 2025 10:55:13 +1100, Jon Higgs <j...@altos.au> wrote:
> 
> > Is there any way to control this? Or am I holding something wrong, and
> > these warnings are an artifact of that.
> 
> passwd(5) says
> 
>      The password field is the encrypted form of the password.  If the
>      password field is empty, no password will be required to gain
>      access to the machine.  This is almost invariably a mistake.  By
>      convention, accounts that are not intended to be logged in to
>      (e.g. bin, daemon, sshd) only contain a single asterisk in the
>      password field.  Note that there is nothing special about ???*???, it
>      is just one of many characters that cannot occur in a valid
>      encrypted password (see crypt(3)). Similarly, login accounts not
>      allowing password authentication but allowing other authentication
>      methods, for example public key authentication, conventionally
>      have 13 asterisks in the password field. Because master.passwd
>      contains the encrypted user passwords, it should not be readable
>      by anyone without appropriate privileges.
> 
> so just use 13 asterisks?
> 
> Cheers,
> Daniel
> 

Thanks Daniel,

I think this might fall onto the almost side of "almost invariably a
mistake". As I understand it, when /usr/local/bin/gotsh is the user's
shell, it enforces access control according to the rules from
gotd.conf(5).

The gotsh(1) says:

        The anonymous user account should have a publicly known
        password, or can be set up with an empty password in which case
        the user's vipw(8) entry would look similar to this example:

        anonymous::1002:1002::0:0:Anonymous:/home/anonymous:/usr/local/bin/gotsh

I've also confirmed that changing password to * as suggested by the docs
prevents any anonymous access using the git user. It's not the desired
behaviour.

--  
Cheers, 
Jon

Reply via email to