On Sat, Apr 25, 2009 at 5:48 PM, Aaron Martinez <m...@proficuous.com> wrote:
>> So:
>> 1) what does the /etc/passwd entry for one of these users look like?
>
> lgf:*:1010:10000::/home/ght:/usr/local/bbox/bin/login_script

Are there any other passwd entries with that uid?
What's the output of
   ls -l /usr/local/bbox/bin/login_script


>> 2) when you say "they get a standard shell", what *EXACTLY* do you mean?
>>    (If you mean "they get a /bin/sh prompt and it runs their
>> .profile", then please say that)
>
> when logging in as user ght
> $ env
> _=/usr/bin/env
> SSH_CONNECTION=192.168.7.128 39782 192.168.7.254 22
>
PATH=/home/lgf/bin:/bin:/sbin:/usr/bin:/usr/sbin:/usr/X11R6/bin:/usr/local/bi
n:/usr/local/sbin:/usr/games:.
> SHELL=/usr/local/bin/login_script
> USER=lgf
> MAIL=/var/mail/ght
> HOME=/home/ght
> SSH_CLIENT=192.168.7.128 39782 22
> TERM=xterm
> SSH_TTY=/dev/ttyp0
> LOGNAME=ght
>
> $ lss
> ksh: lss: not found
>
> (looks like i'm getting ksh as my shell)

It's interesting how it mixes USER=lgf with LOGNAME=ght.  sshd (and
login) set those to the same value, so it would seem user lgf's
.profile or similar is being parsed along the way.  I wonder what the
'id' command would show at that point: ght, lgf, or something
completely different?

I guess my next step would be to use ktrace -i on a virtual console
'getty' process, log in and out on that console to reproduce it, then
stop the ktrace and examine the output of kdump to see what's actually
being invoked, when, and by what.  Follow the fork() and execve()
calls.

Good luck!


Philip Guenther

Reply via email to