On Mon, Nov 09, 2009 at 02:20:45PM -0800, Gary Winiger wrote:
> > > >  I want to see an updated pam_krb5(5) man page explaining how to use 
> > > > PKINIT 
> > > >  and including the example PAM stacks for use of PKINIT.
> 
> If I understand the project correctly:

I don't think that's quite correct.

>       * The project wants to do different prompting than pam_authtok_get(5).
> 
>       * The project proposes to keying off of the contents of PAM_AUTHTOK

Yes.

>       * The project proposes adding new configuration options.

Not really.  Maybe.  But only in response to requests from others.

>       * The project proposes to bypass account management and password
>         change.

No.  Only the auth stack is affected.  Nothing about account management
nore password changing changes.

(If the top instance of pam_krb5 returns PAM_SUCCESS and it was binding
or sufficient then password-based authentication will be skipped.  This
does not mean that password expiration will not be handled.)

>       * The project proposes changes the the PAM stack.

Yes.

> Why should it be that account management and password change are
> disallowed?

Will and I have talked plenty about this, and though I'll admit to not
having read the case materials closely (probably because I felt I was
familiar enough with it given our conversations), I don't recall ever,
ever talking about changes to the account management nor password change
side of PAM or even just pam_krb5.

For auth and setcred, the second instance of the module will return
PAM_IGNORE if the first instance returned PAM_SUCCESS (at least as of
Friday, right Will?).

Nico
-- 

Reply via email to