View | Details | Raw Unified | Return to bug 843 | Differences between
and this patch

Collapse All | Expand All

(-)sshd_config.5 (-6 / +28 lines)
Lines 624-635 If Link Here
624
.Cm UsePrivilegeSeparation
624
.Cm UsePrivilegeSeparation
625
is specified, it will be disabled after authentication.
625
is specified, it will be disabled after authentication.
626
.It Cm UsePAM
626
.It Cm UsePAM
627
Enables PAM authentication (via challenge-response) and session set up.
627
Enables the Pluggable Authentication Module interface.
628
If you enable this, you should probably disable
628
To authenticate via PAM you must use
629
.Cm PasswordAuthentication .
629
.Cm ChallengeResponseAuthentication
630
If you enable
630
(keyboard-interactive for SSHv2, TIS for SSHv1) so you should also set
631
.CM UsePAM
631
.Cm PasswordAuthentication
632
then you will not be able to run sshd as a non-root user.  The default is
632
to
633
.Dq no .
634
.Pp
635
If
636
.Cm UsePAM
637
and
638
.Cm PasswordAuthentication
639
are both enabled, then users may authenticate via the native password
640
mechanism, bypassing the PAM
641
.Ar auth
642
module.
643
In such a case, the PAM
644
.Ar account
645
and
646
.Ar session
647
modules will still be checked.
648
.Pp
649
If
650
.Cm UsePAM
651
is enabled, you will not be able to run
652
.Xr sshd 8
653
as a non-root user.
654
The default is
633
.Dq no .
655
.Dq no .
634
.It Cm UsePrivilegeSeparation
656
.It Cm UsePrivilegeSeparation
635
Specifies whether
657
Specifies whether

Return to bug 843