Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

how to detect (and kill) tunnel-only ssh connections?



On Oct 13, 2009, at 2:19 PM, John Abreau wrote:

> The question is whether the OpenBSD user expiration merely
> disables the user account, or actually deletes it.  This thread
> seems to be asuming the user is deleted and not just disabled.

I didn't.  The OP specifically wrote:

>>> hostA for tunneling purposes even if the user's shell on hostA is  
>>> set to nologin (or /bin/false, etc).  As there is no shell or  
>>> command running,

The password file entry exists.  The account is locked; it is not  
deleted.  The simple solution is to look for any processes owned by  
that user and kill them.

--Rich P.







BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org