[Next] [Previous] [Up] [Top] [Contents]

CHAPTER 29 Secure Shell, SSH

29.5 Login Process


Sshd controls the login process through the following steps:

1. Print the last login time (if the login is via tty and a command was not specified) and /etc/motd (if not prevented by the configuration file or by ~/.hushlogin).

Record the login time (if the login is via tty).

If /etc/nologin exists, print the file and quit (except for root login).

Convert to run with privileges of the user.

Configure the environment.

If /etc/environment exists, read it and add it to the environment.

If ~/.ssh/environment exists, read it and add it to the environment.

Change directory to the user's $HOME.

If ~/.ssh/rc exists, run it with the user's shell; if not, if /etc/sshrc exists, run it; otherwise run xauth. When X11 spoofing is enabled the rc files are fed an X11 authentication protocol ($proto), cookie ($cookie) and $DISPLAY and the script is expected to call xauth to store the cookie.

Run the user's shell or command.


Unix System Administration - 8 AUG 1996
[Next] [Previous] [Up] [Top] [Contents]