> > One question; should pam_krb5 doing PKINIT ever try using the password > > acquired via pam_authtok_get as the PIN if pam_krb5 is stacked below > > pam_authtok_get like so: > > > > login auth required pam_unix_cred.so.1 > > login auth sufficient pam_krb5.so.1 pkinit > > login auth requisite pam_authtok_get.so.1 > > login auth required pam_dhkeys.so.1 > > login auth required pam_unix_auth.so.1 > > ? > > > > I was thinking that pam_krb5 could try doing PKINIT preauth with the > > user's password and if that failed would try PKINIT preauth again, this > > time prompting for the user's PIN. If that is a bad idea then pam_krb5 > > doing PKINIT would ignore the user's password and always prompt for the > > PIN regardless of where it was in the auth stack.
IMO, it is a site configuration error to put pkinit below authtok_get. That said, it is possible for applications to set PAM_AUTHTOK before calling pam_authenticate. IMO, you either have an administrative error, or an application error. I'd say, if PAM_AUTHTOK is set to use it rather than prompt. If it locks out the card, the admin/application will be noted as buggy. Gary..