Subject: Re: BSD/PAM Authentication requirements
To: Ted Lemon <mellon@hoffman.vix.com>
From: None <seebs@plethora.net>
List: current-users
Date: 11/23/1998 19:26:48
In message <199811232127.QAA01220@grosse.fugue.com>, Ted Lemon writes:
>> 	2. accounts can ftp, pop, but not SSH in.

>Will logincap actually do this?

It certainly could, if sshd were told to use the authentication scheme.
You'd create a login class with
	auth-ssh=reject
and *poof*, can't ssh.

>> 	3. accounts can POP in, and SSH in, but not with a password, at the
>> 	same time, the same IP may have to be permitted to telnet in to use
>> 	a different account (i.e. one that doesn't let them out of the
>> 	program) 

>What about this?

Seems easy enough.  Each account (or style of account) can use different
authorization methods for everything.

>> 	4. all of the above, but now with CryptoCard, SecureID and s/key.
>> 	i.e. you can telnet in with your password from host1, you must use
>> 	your SSH RSA Auth key from host2, but I'll let you do FTP with
>> 	SecureID from host3.

>And this?

Should be no problem.

>Would you be offended if I pointed out that you've described an
>surprisingly complicated authentication scheme?   Is this really what
>you want, or are you being forced into it because of failings of the
>technology that's currently available?

It's really not nearly so complicated as it sounds.  The reason I started
this whole nightmarish debate is that I've suddenly realized just how
powerful BSD/OS's authentication is.

But it's very good about keeping everything isolated.  Every authentication
scheme has its own self-contained program, and ones that don't need setuid
can run as a regular user, and so on.

-s