Re: brute force ssh attempt mitigation
- From: Olav Vitters <olav vitters nl>
- To: Christer Edwards <christer edwards gmail com>
- Cc: gnome-infrastructure gnome org, jeffschroeder computer org
- Subject: Re: brute force ssh attempt mitigation
- Date: Wed, 31 Mar 2010 16:50:27 +0200
On Wed, Mar 31, 2010 at 08:39:57AM -0600, Christer Edwards wrote:
> On Wed, Mar 31, 2010 at 8:36 AM, Olav Vitters <olav vitters nl> wrote:
> > No, /etc/passwd + /etc/shadow entries are only for sysadmins, and only
> > to ensure sudo access. Login is still done using key based
> > authentication (it is copied from LDAP every hour). In case LDAP is
> > down, the old SSH key will still be available (latest create-auth
> > versions).
> >
> > Normal users should not be in /etc/passwd.
>
> This create-auth? (from puppet.gnome.org Cron emails)
>
> /etc/cron.hourly/create-auth: line 2: /home/admin/bin/create-auth:
> Permission denied
Yes.
Error message is due to the NFS mounts on puppet being broken
(/home/admin, /home/users). You can still log in though (aside from home
dir not existing complaints)
--
Regards,
Olav
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]