-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

gabriel wrote:
| there are a couple ways, but the one i found worked best for me was to
| configure pam to issue an "f-off" for users not in a "ssh_allowed" list
| in /etc/ssh/:
|
| edit /etc/pam.d/ssh and add this line:
|
|   auth       required     pam_listfile.so item=user sense=allow
| file=/etc/ssh/sshd_allow onerr=fail
|
|
| then create a list in /etc/ssh/sshd_allow and list the users that you're
| cool with allowing access.

I belive this would disable other ssh related services things like sftp/scp
(could be bad), but also allow say telnet or local login if it were existant
on the box. The above solution is *very* ssh specific.

Seems a bit more direct to make the shell /sbin/nologin.

I'm going to hang onto the other idea tho because it could be quite useful
in specific cases.

Thoughts?
- -Rick


- --
Rick Johnson, RHCE - [EMAIL PROTECTED]
Linux/WAN Administrator - Medata, Inc.
PGP Public Key: https://mail.medata.com/pgp/rjohnson.asc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (MingW32)
Comment: Signed and/or encpryted for everyone's protection.

iEYEARECAAYFAj4fJvwACgkQIgQdhlSHZgM4DwCg+8QkzdXpwf0Fu2BPVpr4pmzd
6+cAoL5TbO6vtcisOc0VSAyA+J+1dO8W
=x9uq
-----END PGP SIGNATURE-----



--
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to