Subject: Re: pam, ssh, and pam_ssh
To: Geoff Wing <gcw@pobox.com>
From: maximum entropy <entropy@entropy.homeip.net>
List: current-users
Date: 03/13/2005 23:33:59
Geoff Wing wrote:
> maximum entropy <entropy@entropy.homeip.net> output:
> :4. $ ssh-keygen -t dsa -N "" -f $HOME/.ssh/id_dsa
>
> I think this is why it didn't work for me. I wasn't using one of
> (excerpt from src/lib/libpam/modules/pam_ssh/pam_ssh.c:79)
> static const char *pam_ssh_keyfiles[] = {
> ".ssh/identity", /* SSH1 RSA key */
> ".ssh/id_rsa", /* SSH2 RSA key */
> ".ssh/id_dsa", /* SSH2 DSA key */
> NULL
> };
>
> I'm guessing that these are allowed in addition to authorized_keys.
> Although I haven't confirmed it, I can't think of any other reason
> why they are in the pam_ssh.c file. In fact, pam_ssh(8) mentions
> them but doesn't mention why.
I think you may be confused about pam_ssh. It really has nothing to do
with authorized_keys. It allows you to log in to the system if you know
the passphrase for any of the private keys listed above, stored in the
target account. That's precisely why it's a problem: the passphrase
may not be secure, and previously that would only put the key at risk.
Now (in the default configuration) it puts the key *and* login access at
risk.
--
entropy -- it's not just a good idea, it's the second law.