[33157] in Kerberos

home help back first fref pref prev next nref lref last post

Re: pam-krb5.so

daemon@ATHENA.MIT.EDU (Russ Allbery)
Thu Jan 27 15:06:55 2011

From: Russ Allbery <rra@stanford.edu>
To: "kerberos\@mit.edu" <kerberos@mit.edu>
In-Reply-To: <20110127074523.GA7431@talktalkplc.com> (Brian Candler's message
	of "Thu, 27 Jan 2011 07:45:23 +0000")
Date: Thu, 27 Jan 2011 12:06:51 -0800
Message-ID: <87bp32kt5w.fsf@windlord.stanford.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

Brian Candler <B.Candler@pobox.com> writes:

> As I understand it, pam_krb5 is basically a password checker; it uses
> the password you supply to acquire a Kerberos ticket, and as a
> side-effect lets you login if it was able to acquire one.  That's the
> "auth" functionality anyway.  The "account" functionality is a bit more
> subtle.  According to the manpage: http://linux.die.net/man/8/pam_krb5

> "If the module did participate in authenticating the user, it will check
> for an expired user password and verify the user's authorization using
> the .k5login file of the user being authenticated, which is expected to
> be accessible to the module."

It had better be doing this in the auth action as well, since otherwise
there are going to be vulnerabilities in practice.  The account group
isn't as consistently and properly used as it should be.

-- 
Russ Allbery (rra@stanford.edu)             <http://www.eyrie.org/~eagle/>
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post