Thanks Mike,

I was slowly coming to that conclusion !
What would be best practice regarding a password for that account (i.e. system 
account such as backuppc that needs ssh access but no shell access).

If I create the user with bash as the shell, I seem to have a few options:
1) don’t set a password (i.e. no reference to password in the adduer command). 
The man page says this results in the password being “disabled”. What does this 
actually mean for security ?
2) use —disabled-password (same as 1 above ?)
3) the —disabled-password option appears to be only available on debian. Redhat 
derivatives only offer useradd which does not have this switch ?

Which would be the most secure, while still allowing ssh access ?

BRgds/Alan
On 18 Nov 2018, 19:50 +0800, Michael Howard <m...@dewberryfields.co.uk>, wrote:
> On 17/11/2018 04:28, Alan Taylor wrote:
> > Thanks Everyone.
> >
> > I am getting that together to show you.
> >
> > A question though - are you sure this is not normal behavior ?
> > Most of my research on the net (with caution I know) seems to suggest that 
> > ssh disconnection after authentication because of /bin/false is normal ?
> >
> >
> Yes, it is normal. A user with /bin/false as his ahell should not be able to 
> login. These days www-data has /bin/false too, which caught be out, until I 
> changed it back.
> --
> Mike Howard

Reply via email to