Hi all,

I set up a some sshd servers which authenticates their users through a
LDAP DB. To realize this, I used PAM. 
Everything ok until now. 

Then, via PAM (pam_filter) and the host attribute in the LDAP DB, I only
allowed logon on specifical hosts for some users.
After that, I tested this last functionality: I tried to login on a
disallowed host, and it fails - so it works as expected. For this test,
I used password authentication. Later, I tried the same test with key
authentication, and could log in...
After some more investigations, it seems sshd ignores PAM when someone
tries to log in with a key... is there some way to force sshd to
consider PAM in case of key authentication?

Thanks you,

-- 
Cédric Jonas                                        [EMAIL PROTECTED]

GPG ID:                                                         30CCFE8D
GPG Key:                 http://box.decemplex.net/~cedric/cedric.key.asc
GPG Fingerprint:      CF03 E1FD 9428 1B6B E971  B107 9044 AA99 30CC FE8D

Jabber-ID:                                          [EMAIL PROTECTED]

Attachment: signature.asc
Description: PGP signature

Reply via email to