Hi Petter,
On Mon, May 03, 2010 at 06:45:44PM +0200, Petter Reinholdtsen wrote:
> Indenpendent of how the pam setup should be, I believe it would be
> useful to be able to restrict the range of uids handled by ccreds. :)
> 
> [Guido Günther]
> > That's a matter of your pam configuration. libpam-ccreds shouldn't
> > act on pam_unix at all but only on pam_ldap/Kerberos. If your
> > configuration does this differently it's broken.
> 
> This is the configuration at the moment, generated by pam-auth-update:
> 
> r...@pxe-test2-pre:~# grep -v '#' /etc/pam.d/common-auth
> auth    [success=4 default=ignore]      pam_unix.so nullok_secure
> auth    [success=3 default=ignore]      pam_ldap.so use_first_pass
> auth    [success=2 default=ignore]      pam_ccreds.so action=validate 
> use_first_pass
> auth    [default=ignore]                pam_ccreds.so action=update
> auth    requisite                       pam_deny.so
> auth    required                        pam_permit.so
> auth    optional                        pam_ccreds.so action=store
> r...@pxe-test2-pre:~# 
> 
> What do you mean is wrong with this configuration?  What would the
> correct configuraiton look like?
You're falling through to pam_ldap if auth fails. See the pam.conf
example in the libpam-ccreds package on howto prevent this. You only
proceed for unknown_user not for other auth failures.
Cheers,
 -- Guido



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to