Subject: Re: now using rsa key, so zapped password; is that okay?
To: None <netbsd-help@netbsd.org>
From: Keith Mastin <kmastin@beechtree.ca>
List: netbsd-help
Date: 09/25/2002 12:09:50
>The more I use ssh, the more I like it, but the more I find I don't
>understand. So today I got rsa authorization to work, and realized
>I don't need a password anymore (this particular user never logs
>in via the console, only remotely via ssh). I did vipw as root and
>replaced the password string with '*' as it seemed like it would make
>things only that more secure for users like that.
>
>Question1: will that cause trouble in some unforeseen way? Question2:
>is there a "better" or more "standard" way of blocking logins with a plain
>password? TIA
Question 1): Yes. You are creating your own syntax in passwd that shadow
will likely barf on. x is the standard.
Question 2): Be more specific here? I can see a multi-layerd solution, but
it may not do what you want. For a system where there are Internet
services running, such as web, ftp and mail, I do the following:
-Create/use /bin/nologin to allow untrusted users only mailserver usage,
not shell or ftp access on the system at all, including console access.
-Use sshd to allow trusted remote users shell access if they are not
denied shell access as above.
-Deny remote logins using any other system but sshd using tcp_wrappers.
-Configure sshd_config to disallow rhosts authentication except from the
local network. Sshd should not be considered 100% secure.
--
Keith Mastin BeechTree Information Technology Services Inc.
137 Laird Drive Toronto M4G 3V5 http://www.beechtree.ca
(416)696-6070 Fax(416)696-6072 kmastin@beechtree.ca