SUSE Support

Here When You Need Us

SSH login possible despite /etc/nologin being present

This document (7007116) is provided subject to the disclaimer at the end of this document.

Environment

SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Server 11 Service Pack 1
SUSE Linux Enterprise Desktop 11
SUSE Linux Enterprise Desktop 11 Service Pack 1

Situation

SSH users using non-password authentication (such as public key authentication) can still log in despite the file /etc/nologin being present.

Resolution

Edit /etc/pam.d/sshd and change the line

auth     requisite      pam_nologin.so

to

account  requisite      pam_nologin.so

Additional Information

The default PAM setup allowing SSH login via public key authentication despite the presence of /etc/nologin avoids accidently locking out remote monitoring scripts or (non-root) administrative staff when just regular users, which in most modern installations log in via a remote X11 server or VNC anyway, aren't supposed to log in.

Disclaimer

This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7007116
  • Creation Date: 28-Oct-2010
  • Modified Date:28-Sep-2022
    • SUSE Linux Enterprise Desktop
    • SUSE Linux Enterprise Server

< Back to Support Search

For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com

SUSE Support Forums

Get your questions answered by experienced Sys Ops or interact with other SUSE community experts.

Support Resources

Learn how to get the most from the technical support you receive with your SUSE Subscription, Premium Support, Academic Program, or Partner Program.

Open an Incident

Open an incident with SUSE Technical Support, manage your subscriptions, download patches, or manage user access.