On Mon, Nov 09, 2009 at 04:29:06PM -0600, Nicolas Williams wrote:
> On Mon, Nov 09, 2009 at 02:20:45PM -0800, Gary Winiger wrote:
> > > > >  I want to see an updated pam_krb5(5) man page explaining how to use 
> > > > > PKINIT 
> > > > >  and including the example PAM stacks for use of PKINIT.
> > 
> > If I understand the project correctly:
> 
> I don't think that's quite correct.
> 
> >     * The project wants to do different prompting than pam_authtok_get(5).
> > 
> >     * The project proposes to keying off of the contents of PAM_AUTHTOK
> 
> Yes.
> 
> >     * The project proposes adding new configuration options.
> 
> Not really.  Maybe.  But only in response to requests from others.

I'm proposing adding a passwd_fallback option to pam_krb5 to properly
handle a auth stack where the admin wants to try PKINIT and if that
fails, have it return pam_ignore and have the second instance of
pam_krb5 following pam_authtok_get try password preauth but only if
PKINIT failed.  If passwd_fallback is not set on the first instance then
pam_krb5 would return failure if PKINIT failed.

> >     * The project proposes to bypass account management and password
> >       change.
> 
> No.  Only the auth stack is affected.  Nothing about account management
> nore password changing changes.

Correct.

> (If the top instance of pam_krb5 returns PAM_SUCCESS and it was binding
> or sufficient then password-based authentication will be skipped.  This
> does not mean that password expiration will not be handled.)

If pam_krb5 is only doing PKINIT the KDC should not be indicating
password expired thus that part of pam_krb5 should not come into play
for PKINIT.  For password based preauth nothing has changed here.

> >     * The project proposes changes the the PAM stack.
> 
> Yes.
> 
> > Why should it be that account management and password change are
> > disallowed?
> 
> Will and I have talked plenty about this, and though I'll admit to not
> having read the case materials closely (probably because I felt I was
> familiar enough with it given our conversations), I don't recall ever,
> ever talking about changes to the account management nor password change
> side of PAM or even just pam_krb5.

> For auth and setcred, the second instance of the module will return
> PAM_IGNORE if the first instance returned PAM_SUCCESS (at least as of
> Friday, right Will?).

That is correct.

-- 
Will Fiveash
Sun Microsystems Inc.
http://opensolaris.org/os/project/kerberos/
Sent from mutt, a sweet ASCII MUA

Reply via email to