Am 11.10.2013 14:51, schrieb Markus Falb:
>
> On 11.Okt.2013, at 10:58, Rainer Traut wrote:
>
>> Am 11.10.2013 09:27, schrieb Michael Schultz:
>>> Thanks everyone,
>>>
>>> secure log tells me exactly what the problem is:
>>> "User username not allowed because account is locked"
>>>
>>> Setting a
On 11.Okt.2013, at 10:58, Rainer Traut wrote:
> Am 11.10.2013 09:27, schrieb Michael Schultz:
>> Thanks everyone,
>>
>> secure log tells me exactly what the problem is:
>> "User username not allowed because account is locked"
>>
>> Setting a password for that account unlocks it and ssh works as
I question why you want accounts without passwords when logging in via
SSH and public keys does not use a password or even ask for one. Also
anyone logged in can change users with only an su - and not
need a password.
Have you tried setting PASS_MIN_LEN in /etc/login.defs to 0?
Mike
On 10/11/20
This only works when there's been a password set for the account before
locking it. For obvious reasons empty passwords are not allowed :)
Am 11.10.2013 10:58, schrieb Rainer Traut:
> Am 11.10.2013 09:27, schrieb Michael Schultz:
>> Thanks everyone,
>>
>> secure log tells me exactly what the probl
Am 11.10.2013 09:27, schrieb Michael Schultz:
> Thanks everyone,
>
> secure log tells me exactly what the problem is:
> "User username not allowed because account is locked"
>
> Setting a password for that account unlocks it and ssh works as
> expected. I guess I have to work on my account creation
You are right, that would do the trick when writing a script. But what
I'm actually trying to accomplish is creating user accounts with the
configuration manager "salt".
In a blog post someone explained how to create users with it and he
didn't set a password, so I gave it chance and came across t
On 10/11/2013 12:27 AM, Michael Schultz wrote:
> Setting a password for that account unlocks it and ssh works as
> expected. I guess I have to work on my account creation routine.
you might look into mkpasswd, its probably excessively complicated, but
it can set a users password
# mkpasswd -l 20
Thanks everyone,
secure log tells me exactly what the problem is:
"User username not allowed because account is locked"
Setting a password for that account unlocks it and ssh works as
expected. I guess I have to work on my account creation routine.
Michael
Am 10.10.2013 21:49, schrieb James H
- Original Message -
> From: "Lists"
> To: centos@centos.org
> Sent: Thursday, October 10, 2013 3:36:02 PM
> Subject: Re: [CentOS] SSH login from user with empty password
>
> On 10/10/2013 03:12 PM, David C. Miller wrote:
> > SSH by default will use
On 10/10/2013 03:12 PM, David C. Miller wrote:
> SSH by default will use a key pair if found but then drops back to
> login password. It will also fall back to password if the keypair has
> a passphrase and you just hit retrun without type it in. SSH won't
> allow you to connect because the pass
- Original Message -
> From: "Michael Schultz"
> To: centos@centos.org
> Sent: Thursday, October 10, 2013 6:44:36 AM
> Subject: [CentOS] SSH login from user with empty password
>
> Hello list,
>
> on a CentOS 6.4 machine I'm creating account
Hello,
check permissions on /.ssh/authorized_keys.
i guess issue related to permissions but i can be wrong
On 10.10.2013, at 15:44, Michael Schultz wrote:
> Hello list,
>
> on a CentOS 6.4 machine I'm creating accounts with empty passwords. Each
> user's public key is located in /.ssh/author
On 10 Oct 2013 14:45, "Michael Schultz" wrote:
> on a CentOS 6.4 machine I'm creating accounts with empty passwords. Each
> user's public key is located in /.ssh/authorized_keys.
>
> When trying to ssh into that machine, following error message is
displayed:
> Permission denied (publickey).
>
Che
On Thu, 10 Oct 2013 15:44:36 +0200
Michael Schultz wrote:
> UsePAM no
I've never been completely clear on what UsePAM yes versus UsePam no actually
does, other than that setting it to no seems to make things a lot more
complicated. Perhaps you could try setting it to yes and see if that solves
t
This error is when you ssh in (with PuTTY, for example) without
attaching the private key.
Original Message
Subject: [CentOS] SSH login from user with empty password
From: Michael Schultz
Date: Thu, October 10, 2013 3:44 pm
To: centos@centos.org
Hello list,
on a CentOS 6.4
Hello list,
on a CentOS 6.4 machine I'm creating accounts with empty passwords. Each
user's public key is located in /.ssh/authorized_keys.
When trying to ssh into that machine, following error message is displayed:
Permission denied (publickey).
In /etc/ssh/sshd_config I've set:
PasswordAuthent
16 matches
Mail list logo