summaryrefslogtreecommitdiff
path: root/templates/system/login
AgeCommit message (Collapse)Author
2020-02-10banner: T2024: migrate "system login banner" to XML/Python representationChristian Poessinger
2020-02-05login: T1990: Migrate "system login" to XML/Python representationChristian Poessinger
2019-04-20T1344: commit fix for new RADIUS 'key' attributeChristian Poessinger
Commit 0a19e53f868 ("T1344: rename RADIUS 'secret' attribute to 'key'") missed a consistency check in the node.def file
2019-04-19T1345: specify RADIUS source IP for system login commandChristian Poessinger
2019-04-19T1344: rename RADIUS 'secret' attribute to 'key'Christian Poessinger
'key' is also used for L2TP and PPTP RADIUS configurations.
2019-04-18T1344: rename RADIUS 'system login' nodesChristian Poessinger
In order to prepare for adding a RADIUS source IP address and synchronize the syntax with L2TP/PPTP the nodes have been renamed from: set system login radius-server x.x.x.x to set system login radius server x.x.x.x
2019-04-04T1323 - remove the option to setup an operator accounthagbard
2018-11-25banner/post-login: replace Vyatta with VyOSChristian Poessinger
2018-10-29T720: allow dots in user names as per POSIX 2008 portable character set.Daniil Baturin
2018-10-28T720: restrict usernames to the format useradd will accept.Daniil Baturin
This reintroduces hagbard's change that has somehow gone missing.
2018-08-24T441: adjust user groups to work with FRR instead of quagga.Daniil Baturin
2017-10-18Add ecc support to opensshMarcel Gisselmann
2015-06-22Revert "vyatta-cfg-system: prevent deletion of all user authentication"Alex Harpin
This reverts commit 593899accdff03af23e6bb6c7189ad4ed05a4d8e. This commit reintroduced the inability to delete a user configured on the system, which was resolved in bug #557. Reverting this for the time being until a better fix can be implemented.
2015-06-13vyatta-cfg-system: prevent deletion of all authentication for userAlex Harpin
Prevent the deletion of both the encrypted-password and public-keys nodes for a user, ensuring that at least one of the methods is available. Also prevent the deletion of the public keys for a user if the encrypted password is set to "!". Bug #574 http://bugzilla.vyos.net/show_bug.cgi?id=574
2015-06-13vyatta-cfg-system: missing encrypted-password breaks user config nodeAlex Harpin
The fix for bug #557 now allows the encrypted-password Authentication node to be deleted again, but this causes the config to fail on reboot, leaving the user login node empty. This fix checks for an empty / missing encrypted-password node on reboot / config reload, either creating a new node or replacing the existing one and assigning it the value of "!". This has the same effect as the fix for bug #336, allowing the user to be set as only using RSA based logins. Bug #573 http://bugzilla.vyos.net/show_bug.cgi?id=573
2015-06-13vyatta-cfg-system: 'delete system login user' doesn't remove the userAlex Harpin
Following the fix for bug #336 that prevents the deletion of the encrypted password, which resulted in a broken config node on reboot, it was no longer possible to delete users. This reverts the fix for that bug. Bug #557 http://bugzilla.vyos.net/show_bug.cgi?id=557
2014-10-18vyatta-cfg-system: comment change in the plaintext-password nodeAlex Harpin
Remove the comment from the plaintext-password node regarding empty encrypted password values as you can't set them as empty.
2014-10-18vyatta-cfg-system: fix for deleting encrypted password breaks configAlex Harpin
You can't create a user without a password, but once this user is created, you can then delete the encrypted password. However, deleting the encrypted password from the config doesn't actually remove the password on the system and in addition breaks the config on reboot, resulting in the system login node being entirely absent. This fix ensures that the encrypted password is set to "!" when the config node is deleted, removing the password login capability for this account but still allowing SSH RSA key login. Bug #336 http://bugzilla.vyos.net/show_bug.cgi?id=336
2013-12-17Fix bug 318 - Use SHA-512 hashing for user passwords instead of MD5Stig Thormodsrud
Signed-off-by: Daniil Baturin <daniil@baturin.org>
2012-12-12revert 918bd40d3e3f238a800b1486f70e2d5ee1d71a72John Southworth
2012-09-05Bugfix 8326John Southworth
Fix password change script save function to work as it does in vyattacfg. Fix empty substitution on 'plaintext-password ""' causing script error.
2012-09-04Bugfix 8290John Southworth
Don't allow default password to persist after first boot. Due to the numerous ways a user can get a vyatta system this required a lot of changes. 1. Don't allow a user to set a password to 'vyatta' after first login, but allow it on the initial boot otherwise the system will have no user. 2. Don't allow the password to be set to vyatta in installer. 3. Force password change on first login. under the following conditions: 3.a. User is an admin level user. Operators do not have the abillity to change the config so they can't change passwords. Allow 'vyatta' to be the password until an admin logs in. 3.b. This is not the livecd, its silly to force a password change before install.
2010-08-20Add checking of port rangeStephen Hemminger
Bug 6058 Put consitent checking port range on snmp, ssh, and telnet
2010-08-17update help text to use val_helpAn-Cheng Huang
2010-07-21Add completion for text fields with limited valuesStephen Hemminger
For all nodes that do 'syntax:expression: $VAR(@) in' add allowed tag to show possible values
2010-07-19fix typo, val_help, etc.An-Cheng Huang
2010-07-19Use val_help: features to format betterStephen Hemminger
Previous change did not format val-help tag correctly
2010-07-19Convert public-keys help to new formatStephen Hemminger
2010-07-19Fix language in help text for loadkeyStephen Hemminger
2010-07-16Remove verbs from all help messagesStephen Hemminger
Per current policy remove verb from all help messages in th is package
2010-07-06Allow incorrect user to be deletedStephen Hemminger
Avoid password checks on delete. Bug 5418
2010-07-06Change user name validationStephen Hemminger
Do username validation in perl script. This allows for checking for what is allowed, versus what is recommended. For compatiablity we allow things like upper case user names which but this is not recommended so these names produce a warning.
2010-02-17Add support for options in keyfileStephen Hemminger
The sshd file format has optional options; copy them to a placeholder node and generate to authorized_keys Better error message when wrong number of arguments.
2010-02-17Handle DSA keysStephen Hemminger
Bug 5350 Need some changes to support DSA keys (Protocol V2). Also add support for options in key file.
2010-02-02Run login update as rootStephen Hemminger
Need ability to open file of new user (to load authorized key). So move sudo to template.
2010-01-26Add additional check that new user doesn't exist in NSSStephen Hemminger
If user exists in NSS (LDAP, TACACS+) but not on local machine, then it can not be changed with CLI. useradd will fail (user exists), and usermod will fail (can't find user in passwd file). Bug 5249
2010-01-26Don't allow vyatta configured accounts to overlap internal accountsStephen Hemminger
Bug 5269 This prevents user from doing something harmful like making a user named quagga or cron and putting vbash on that account.
2010-01-19Restrict radius-server timeout valueStephen Hemminger
Values > 30 are likely to cause login timeout, so don't allow them.
2009-12-04Add back public-key templatesStephen Hemminger
Move them under user/node.tag/authorization
2009-12-04Rearrange the public-key configuration schemaStephen Hemminger
New syntax: system login user vyatta authentication public-key user@remote type ssh-rsa
2009-12-03Require key-type to be set.Stephen Hemminger
2009-12-03SSH enhancementsStephen Hemminger
Add public key support Convert allow-root and password-authentication from boolean nodes to regular nodes.
2009-11-30added required keyword to help text.Michael Larson
2009-10-15partial fix for bug 4903.slioch
2009-09-11User group fixesStephen Hemminger
Some changes to group interface: * don't allow vyattaop the new group used for operators * check for allowed syntax * add missing continuation on syntax check
2009-09-04Enforce syntax checking on passwordStephen Hemminger
Enforce syntax checks on encrypted password field to prevent user errors. But can't check salt field because it is optional and default config.boot doesn't use one! Bug: 4077
2009-09-04Revert "Validate encrypted password field"Stephen Hemminger
This reverts commit a0fe319ce069e15646077a635bc970b961124540.
2009-09-03Validate encrypted password fieldStephen Hemminger
Enforce syntax checks on encrypted password field to prevent user errors. Bug: 4077
2009-06-01Change how system login update worksStephen Hemminger
Use a wrapper script in vyatta_update_login.pl and per login method objects for the update.
2009-05-05Split up system login scriptsStephen Hemminger
1. User and Radius separate scripts 2. Tacacs (incomplete) moved to separate package