Package:  libpam-krb5
Version:  4.2-2
Severity: normal
Tags:     patch

Please add forwardable as a argument to the pam module in the default
pam-auth-config setup.  It is useful when using libpam-krb5 with
Active Directory and want to have single sign-on for other services on
the local net.

I have not verified that this is needed in the latest version of
libpam-krb5, but we did need to use it when using libpam-krb5 with AD
in Etch.  Reporting it here to increase the chance of having the
configuration we need out of the box with Squeeze. :)

-- System Information:
Debian Release: 5.0.4
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-2-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
diff -ur libpam-krb5-4.2/debian/pam-auth-update libpam-krb5-4.2-pere/debian/pam-auth-update
--- libpam-krb5-4.2/debian/pam-auth-update	2010-03-06 22:07:32.000000000 +0100
+++ libpam-krb5-4.2-pere/debian/pam-auth-update	2010-03-06 22:06:05.000000000 +0100
@@ -4,12 +4,12 @@
 Conflicts: krb5-openafs
 Auth-Type: Primary
 Auth:
-	[success=end default=ignore]	pam_krb5.so minimum_uid=1000 try_first_pass
+	[success=end default=ignore]	pam_krb5.so minimum_uid=1000 forwardable try_first_pass
 Auth-Initial:
-	[success=end default=ignore]	pam_krb5.so minimum_uid=1000
+	[success=end default=ignore]	pam_krb5.so minimum_uid=1000 forwardable
 Account-Type: Additional
 Account:
-	required			pam_krb5.so minimum_uid=1000
+	required			pam_krb5.so minimum_uid=1000 forwardable
 Password-Type: Primary
 Password:
 	requisite			pam_krb5.so minimum_uid=1000 try_first_pass use_authtok
@@ -17,4 +17,4 @@
 	requisite			pam_krb5.so minimum_uid=1000
 Session-Type: Additional
 Session:
-	optional			pam_krb5.so minimum_uid=1000
+	optional			pam_krb5.so minimum_uid=1000 forwardable

Reply via email to