delorie.com/archives/browse.cgi | search |
X-Recipient: | archive-cygwin AT delorie DOT com |
X-SWARE-Spam-Status: | No, hits=3.4 required=5.0 tests=AWL,BAYES_00,BOTNET,RCVD_IN_DNSWL_NONE |
X-Spam-Check-By: | sourceware.org |
Message-id: | <4C06DC4D.7040005@cygwin.com> |
Date: | Wed, 02 Jun 2010 18:33:49 -0400 |
From: | "Larry Hall (Cygwin)" <reply-to-list-only-lh AT cygwin DOT com> |
Reply-to: | cygwin AT cygwin DOT com |
User-Agent: | Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.21) Gecko/20090320 Remi/2.0.0.21-1.fc8.remi Lightning/0.9 Thunderbird/2.0.0.21 Mnenhy/0.7.5.0 |
MIME-version: | 1.0 |
To: | cygwin AT cygwin DOT com |
Subject: | Re: Different user environment for key vs password authentication |
References: | <COL112-W26010F7BDD060C68A6687EDCD00 AT phx DOT gbl> |
In-reply-to: | <COL112-W26010F7BDD060C68A6687EDCD00@phx.gbl> |
Mailing-List: | contact cygwin-help AT cygwin DOT com; run by ezmlm |
List-Id: | <cygwin.cygwin.com> |
List-Subscribe: | <mailto:cygwin-subscribe AT cygwin DOT com> |
List-Archive: | <http://sourceware.org/ml/cygwin/> |
List-Post: | <mailto:cygwin AT cygwin DOT com> |
List-Help: | <mailto:cygwin-help AT cygwin DOT com>, <http://sourceware.org/ml/#faqs> |
Sender: | cygwin-owner AT cygwin DOT com |
Mail-Followup-To: | cygwin AT cygwin DOT com |
Delivered-To: | mailing list cygwin AT cygwin DOT com |
On 6/2/2010 6:13 PM, Jaynna Sims wrote: > > Hi, > We are having problems doing registry updates and installing software via ssh > using key authentication but it works using password authentication. We > noticed that some of the environment variables have different values > depending on the authentication type, for example TMP, TEMP, USERNAME. With > key authentication, these values are for the user that the sshd service is > running as. With password authentication, these values are for the user that > is connecting as. Can someone explain in a bit of detail what happens at > login for key and password authentication? It seems we need to get the same > environment loaded for password authentication to load for key authentication > so we are trying to figure out how to make this happen by understanding what > is actually happening. Turning on debug for our ssh server did not yield any > useful information. And sorry but right now I don't have access to the > server so I'm hoping that someone can give insight into how the different > authentication load their respective environments without needing more > detail. I can say that the privilege separation is turned on. <http://cygwin.com/cygwin-ug-net/ntsec.html#ntsec-setuid-overview> -- Larry Hall http://www.rfk.com RFK Partners, Inc. (508) 893-9779 - RFK Office 216 Dalton Rd. (508) 893-9889 - FAX Holliston, MA 01746 _____________________________________________________________________ A: Yes. > Q: Are you sure? >> A: Because it reverses the logical flow of conversation. >>> Q: Why is top posting annoying in email? -- Problem reports: http://cygwin.com/problems.html FAQ: http://cygwin.com/faq/ Documentation: http://cygwin.com/docs.html Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple
webmaster | delorie software privacy |
Copyright © 2019 by DJ Delorie | Updated Jul 2019 |