summaryrefslogtreecommitdiffstats
path: root/lib/libskey
diff options
context:
space:
mode:
authorjkoshy <jkoshy@FreeBSD.org>1998-05-18 09:36:31 +0000
committerjkoshy <jkoshy@FreeBSD.org>1998-05-18 09:36:31 +0000
commitb4dd89037bb7c6ccd45eb36e21d058671e6454c5 (patch)
treeaba4de9973f9eac7692aebac41fdf5658e4ca268 /lib/libskey
parentd40a1af7e08585baef50c2b39e2084a2895d94f9 (diff)
downloadFreeBSD-src-b4dd89037bb7c6ccd45eb36e21d058671e6454c5.zip
FreeBSD-src-b4dd89037bb7c6ccd45eb36e21d058671e6454c5.tar.gz
Add warning about interaction of S/Key and login(1) for users without S/Key
passwords attempting to invoke login(1) on a pty. PR: 3289
Diffstat (limited to 'lib/libskey')
-rw-r--r--lib/libskey/skey.access.59
1 files changed, 9 insertions, 0 deletions
diff --git a/lib/libskey/skey.access.5 b/lib/libskey/skey.access.5
index 2e12ad1..9fff8f9 100644
--- a/lib/libskey/skey.access.5
+++ b/lib/libskey/skey.access.5
@@ -76,6 +76,15 @@ For the sake of backwards compatibility, the
.I internet
keyword may be omitted from net/mask patterns.
.SH WARNINGS
+When the S/Key control table (\fI/etc/skey.access\fR)
+exists, users without S/Key passwords will be able to login only
+where its rules allow the use of UNIX passwords. In particular, this
+means that an invocation of \fIlogin(1)\fR in a pseudo-tty (e.g. from
+within \fIxterm(1)\fR or \fIscreen(1)\fR) will be treated as a login
+that is neither from the console nor from the network, mandating the use
+of an S/Key password. Such an invocation of \fIlogin(1)\fR will necessarily
+fail for those users who do not have an S/Key password.
+.PP
Several rule types depend on host name or address information obtained
through the network. What follows is a list of conceivable attacks to
force the system to permit UNIX passwords.
OpenPOWER on IntegriCloud