severity 425831 wishlist title 425831 please guard sudo and su sessions as well tags 425831 help thanks
> This package only works if you're still using the account you > logged in as. Logging in as a normal user, then using sudo or su > for root privileges, breaks the SSH test. I have not had the time to investigate how to test for the common cases you list. In case you want to speed things up, please consider sending precise information or even a patch. What I need are obvious characteristics that I can use to distinguish remote sessions from local ones. Unfortunately, sudo purges $SSH_CONNECTION from the environment, and su does not propagate it either. One way to do it might be to obtain the current terminal node and check whether it was created by sshd: PTS=$(readlink /proc/$$/fd/0) pgrep -f "^sshd.+${PTS#/dev/}$" >/dev/null I'll put this suggestion by Craig Small and Don Armstrong into the next version. Otherwise, if molly-guard does not suit your purpose, then I suggest you purge it. -- .''`. martin f. krafft <[EMAIL PROTECTED]> : :' : proud Debian developer, author, administrator, and user `. `'` http://people.debian.org/~madduck - http://debiansystem.info `- Debian - when you have better things to do than fixing systems
signature.asc
Description: Digital signature (GPG/PGP)