/etc/pam.d/quagga: auth required pam_permit.so This causes quagga not to ask for a password as it uses pam authentication methods. I do not see a security risk because: 1) Only quagga user or quaggavty group has access to the sockets 2) Any admin who compiles their own vtysh w/o asking for a password will do the exact same thing.
There is really no reason that I can see to authenticate the calling user. -- Lab tests show that use of micro$oft causes cancer in lab animals Got Gas??? -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]