Mark Post wrote:
On Fri, Jul 20, 2007 at  5:54 PM, in message <[EMAIL PROTECTED]>,

Larry Ploetz <[EMAIL PROTECTED]> wrote:
-snip-

in your sshd_config file, to keep them all in one place. Then you could
allow/prevent users from updating their own authorized_keys. Or even put
all authorized keys for all users in one file (replace the "%u" with a
static file name).


I would think that this last suggestion would allow any user to log in as any 
other user.  Probably not a good idea.


Only if they had the corresponding key half, which was the point IIRC. I
was confused, by the way, why anyone would want to put an entry in every
users authorize_keys file to allow anyone with the other half (stated as
`root', but if anyone got a copy, then anyone) to log in as them -- why
not just su/"sudo -u" to the target userid? Why add additional potential
security holes? Not to mention confusing users with entries in their
.ssh/authorized_keys file they didn't put there, and may delete and/or
claim to have been hacked...

or maybe I misremember...
--
Carnegie Institution - At the Frontiers of Science



Larry Ploetz
Systems Administrator
Carnegie Institution of Washington
Department of Plant Biology, TAIR
650 325 1521 x 296 [EMAIL PROTECTED]

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390

Reply via email to