Avamar: The OS user "sshd" has no password assigned
Summary: The Avamar OS user "sshd" has no password assigned.
Symptoms
A security scanning tool reports that an Avamar Operating System (OS) user has no password.
On Avamar or VDP grid, the following command retrieves a list of users from the shadow password file where the user has no password configured:
(In this example, the sshd user is returned):
getent shadow | cut -d: -f1-2 | grep ':$' | cut -d: -f1
sshd
In Linux, the /etc/passwd file shows that the ssh daemon user shell is set to "/bin/false":
less /etc/passwd
...
sshd:x:71:65:SSH daemon:/var/lib/sshd:/bin/false
...Cause
This is the default configuration for the SSH daemon which allows tunneling and other non-shell activity like port forwarding.
Resolution
No actions are required as the sshd user is not vulnerable to unauthenticated access:
-
/bin/falseis a binary that immediately exits returning false when it is called -
When a user with this setting logs in, they are immediately logged out when "false" exits
-
An example below when attempting to log in as the
sshd userby switching from root: It was immediately redirected to root again:
su - sshd ; whoami
root