On Wed, May 07, 2014 at 10:13:02AM +0200, Laurent Bigonville wrote:
> Le Tue, 6 May 2014 09:36:59 -0700,
> Steve Langasek <[email protected]> a écrit :

> > On Tue, May 06, 2014 at 09:12:59AM -0700, Russ Allbery wrote:
> > > Laurent Bigonville <[email protected]> writes:

> > > > On Fedora they are using:

> > > >   session optional pam_keyinit force revoke

> > > force revoke looks good to me.  I'm not sure that force is
> > > necessary, but it's probably a good idea in general.

> > > > As it's only available on linux architectures, I was thinking of
> > > > adding a '-' at the beginning of the call. Do you think this is
> > > > OK for Debian?

> > > Yes, although this is where it would be nice if this could somehow
> > > be handled by pam-auth-update so that the PAM module wouldn't be
> > > configured at all on systems that don't have it.

> > As discussed on IRC, we don't want this to silently fail on Linux
> > systems because of some unrelated bug; that will just cause
> > difficult-to-diagnose problems.  Since the module will be present on
> > all Linux systems, it's better to ship a different pam config on
> > Linux vs. non-Linux architectures, which can be done fairly easily
> > without duplication using dh-exec.

> And couldn't we use the (dirty) trick we are using for pam_selinux?

Which trick are you talking about?

-- 
Steve Langasek                   Give me a lever long enough and a Free OS
Debian Developer                   to set it on, and I can move the world.
Ubuntu Developer                                    http://www.debian.org/
[email protected]                                     [email protected]

Attachment: signature.asc
Description: Digital signature

Reply via email to