mirror of
https://github.com/freebsd/freebsd-src.git
synced 2024-12-02 04:13:39 +00:00
Add warning about interaction of S/Key and login(1) for users without S/Key
passwords attempting to invoke login(1) on a pty. PR: 3289
This commit is contained in:
parent
9ba8bd6557
commit
53e85f8664
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=36153
@ -76,6 +76,15 @@ For the sake of backwards compatibility, the
|
||||
.I internet
|
||||
keyword may be omitted from net/mask patterns.
|
||||
.SH WARNINGS
|
||||
When the S/Key control table (\fI/etc/skey.access\fR)
|
||||
exists, users without S/Key passwords will be able to login only
|
||||
where its rules allow the use of UNIX passwords. In particular, this
|
||||
means that an invocation of \fIlogin(1)\fR in a pseudo-tty (e.g. from
|
||||
within \fIxterm(1)\fR or \fIscreen(1)\fR) will be treated as a login
|
||||
that is neither from the console nor from the network, mandating the use
|
||||
of an S/Key password. Such an invocation of \fIlogin(1)\fR will necessarily
|
||||
fail for those users who do not have an S/Key password.
|
||||
.PP
|
||||
Several rule types depend on host name or address information obtained
|
||||
through the network. What follows is a list of conceivable attacks to
|
||||
force the system to permit UNIX passwords.
|
||||
|
Loading…
Reference in New Issue
Block a user