Good afternoon, Firstly, thanks for your ongoing development and good work.
I have a question that I would like to pose to you, as I have not found any satisfactory answer despite long research. Background: We use ssh keys to distribute code and run commands. These are appropriately controlled and logged. However I wish to stop users/administrators using these as a back-door to the other systems. I have configured the "notty" option on the authorised_keys file, yet this still does not prevent the following: ssh SERVER ksh This will not return a prompt but will allow commands to be run interactively. Do you have any recommendation / setting that would prevent this? Regards, Richard Registered Office: Inveralmond House 200 Dunkeld Road Perth PH1 3AQ Registered in Scotland No. SC117119 www.sse.com **********************************************************************

