Re: brute force ssh attempt mitigation
- From: Christer Edwards <christer edwards gmail com>
- To: Olav Vitters <olav vitters nl>
- Cc: gnome-infrastructure gnome org, jeffschroeder computer org
- Subject: Re: brute force ssh attempt mitigation
- Date: Wed, 31 Mar 2010 08:39:57 -0600
On Wed, Mar 31, 2010 at 8:36 AM, Olav Vitters <olav vitters nl> wrote:
> No, /etc/passwd + /etc/shadow entries are only for sysadmins, and only
> to ensure sudo access. Login is still done using key based
> authentication (it is copied from LDAP every hour). In case LDAP is
> down, the old SSH key will still be available (latest create-auth
> versions).
>
> Normal users should not be in /etc/passwd.
This create-auth? (from puppet.gnome.org Cron emails)
/etc/cron.hourly/create-auth: line 2: /home/admin/bin/create-auth:
Permission denied
--
Christer Edwards
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]