Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#2806 - openssh 4.1p1 login policy
|
Detailsupon updating to openssh 4.1, remote root login over ssh works no longer (PAM related)?
Without a warning at least, this could be dangerous to users who have remote systems and no user accounts (rare and bad-practice, but it happens). |
This task depends upon
Closed by Judd Vinet (judd)
Saturday, 11 June 2005, 20:18 GMT
Reason for closing: Fixed
Additional comments about closing: Fixed for next build
Saturday, 11 June 2005, 20:18 GMT
Reason for closing: Fixed
Additional comments about closing: Fixed for next build
I personally think, that this is a good thing. Unfortunately the default PAM file encforces /etc/securetty for user root. People will expect this for rsh and rlogin. But its not so obvious for openssh. I suggest to change the default pam file etc/pam.d/sshd:
< auth required pam_securetty.so #Disable remote root
---
> # auth required pam_securetty.so #Disable remote root
Jürgen