[Next] [Previous] [Up] [Top] [Contents]
CHAPTER 29 Secure Shell, SSH
29.5 Login Process
Sshd controls the login process through the following steps:
- 1. Print the last login time (if the login is via tty and a command was not specified) and /etc/motd (if not prevented by the configuration file or by ~/.hushlogin).
- Record the login time (if the login is via tty).
- If /etc/nologin exists, print the file and quit (except for root login).
- Convert to run with privileges of the user.
- Configure the environment.
- If /etc/environment exists, read it and add it to the environment.
- If ~/.ssh/environment exists, read it and add it to the environment.
- Change directory to the user's $HOME.
- If ~/.ssh/rc exists, run it with the user's shell; if not, if /etc/sshrc exists, run it; otherwise run xauth. When X11 spoofing is enabled the rc files are fed an X11 authentication protocol ($proto), cookie ($cookie) and $DISPLAY and the script is expected to call xauth to store the cookie.
- Run the user's shell or command.
Unix System Administration - 8 AUG 1996
[Next] [Previous] [Up] [Top] [Contents]