Hi,
I'm getting daily insecurity (i.e. security(8)) nags about userids that are off but still have a valid shell and access files. (Specifically, I'm getting the nag from check_access_files() in /usr/libexec/security.)

Since ports (at least in my experience) regularly creates userids that will trigger this warning, what's the "best" way to disable the warning? I'm reluctant to mess with permissions on directories created by packages, but maybe that's the best way?

Otherwise, it looks like I can disable the warning by setting a password on the userid in question.

However, that leads to the question: what if I don't *want* a password on the account, because it's supposed to be a SFTP-only, public-key-authentication-only account, but still needs to be readable and needs a valid shell for various cron jobs to be happy? If I'm following the logic correctly, one of the warnings I'm getting is for ~/.ssh being readable on a userid with no password - exactly the scenario I just mentioned. But AFAIK they can't login if I take away S_IRUSR on ~/.ssh?

The most distasteful option is to hack /usr/libexec/security to ignore certain userids, but ... it's there for a reason.

The cleanest example I have right now from ports is _rancid, created by the rancid package, and triggered by the existence of ~_rancid/.ssh with S_IRUSR (u+r) permissions.

Suggestions / advice?

Thanks,
-Adam

Reply via email to