I've got a bunch of "users" with no password/no way to log in, just to
keep services tidy and separated. Some of these have to connect to ssh
servers, therefore they require a .ssh/known_hosts. /etc/security thinks
this is a security risk and complains about it every night...


Index: etc/security
===================================================================
RCS file: /home/cvs/openbsd/src/etc/security,v
retrieving revision 1.88
diff -u -p -r1.88 security
--- etc/security        3 Jun 2009 14:45:39 -0000       1.88
+++ etc/security        21 Feb 2010 01:23:21 -0000
@@ -40,7 +40,7 @@ awk -F: '{
                        printf("Login %s is off but still has a valid shell and 
an entry in /etc/skey.\n", $1);
                if (system("test -d "$9" -a ! -r "$9"") == 0)
                        printf("Login %s is off but still has valid shell and 
home directory is unreadable\n\t by root; cannot check for existence of 
alternate access files.\n", $1);
-               else if (system("for file in .ssh .rhosts .shosts .klogin; do 
if test -e "$9"/$file; then if ((ls -ld "$9"/$file | cut -b 2-10 | grep -q r) 
&& (test ! -O "$9"/$file)) ; then exit 1; fi; fi; done"))
+               else if (system("for file in .ssh/authorized_keys .rhosts 
.shosts .klogin; do if test -e "$9"/$file; then if ((ls -ld "$9"/$file | cut -b 
2-10 | grep -q r) && (test ! -O "$9"/$file)) ; then exit 1; fi; fi; done"))
                         printf("Login %s is off but still has a valid shell 
and alternate access files in\n\t home directory are still readable.\n",$1);
        }
        if ($3 == 0 && $1 != "root")

Reply via email to