From the sample sshd_config: === Begin === # Set this to 'yes' to enable PAM authentication (via challenge-response) # and session processing. Depending on your PAM configuration, this may # bypass the setting of 'PasswordAuthentication' and 'PermitEmptyPasswords' #UsePAM no === End === Please add an appropriate warning regarding the use of UsePAM to the PasswordAuthentication section of sshd_config.5. Thanks!
Created attachment 624 [details] Add detail to UsePAM section of sshd_config How's this? For those that don't speak nroff (I don't I just mimic the bits that look like what I want :-), the text is: UsePAM Enables the Pluggable Authentication Module interface. To authenticate via PAM you must use ChallengeResponseAuthentication (keyboard-interactive for SSHv2, TIS for SSHv1) so you should also set PasswordAuthentication to ``no''. If UsePAM and PasswordAuthentication are both enabled, then users may authenticate via the native password mechanism, bypassing the PAM auth module. In such a case, the PAM account and session modules will still be checked. If UsePAM is enabled you will not be able to run sshd as a non- root user. The default is ``no''.
Created attachment 625 [details] Update UsePAM entry in sshd_config Update nroff formatting based on feedback from jmc@
> Enables the Pluggable Authentication Module interface. To > authenticate via PAM you must use ChallengeResponseAuthentication > (keyboard-interactive for SSHv2, TIS for SSHv1) so you should > also set PasswordAuthentication to ``no''. Perhaps something like this: Enables the Pluggable Authentication Module interface. If set to ``yes'', this will enable PAM authentication using ChallengeResponseAuthentication and PAM account and session module processing for all authentication types. Because PAM challenge-response authentication usually serves an equivalent role to password authentication, you should disable either PasswordAuthentication or ChallengeResponseAuthentication.
Created attachment 632 [details] Incorporate djm's changes.
Patch #632 has been committed. Thanks for the report.