> The final spec and man page for the pam_krb5 pkinit project
> have been put into the case directory.  If there are no
> further objections, this case should get approved at the meeting
> this week.

        From message 60 of 17 Nov and not yet answered:

Gary..
======
>From pkinit-final:

    "The pam_krb5 password module will change in that if PKINIT
    authentication was done it will return PAM_IGNORE in the following
    cases:
    
    - the new passwd is NULL
    - the old passwd is NULL
    - verification of the old passwd fails.
    
    If none of the above is true then pam_krb tries to change the password
    and will return an error if that fails.  The rational behind this is if
    some PAM module causes pam_acct_mgmt() to return PAM_NEW_AUTHTOK_REQD
    and/or the app subsequently calls pam_chauthtok(), pam_krb5 will change
    a user's password.  But this may well fail: the KDC may not want to
    allow a PKINIT user to change/set a password since the user may be
    expected to use PKINIT."

This information does not seem to be in the man page.  How does the
administrator know it?  Not being a pkinit expert, I'd like to understand
how the password stack will know if the user was authenticated by pkinit?
I feel TCR strong that the man page needs to be complete relative to this
part of the spec.  I'm also concerned that pam_krb5 in the password stack
won't likely be called without PAM_AUTHTOK or PAM_OLDAUTHTOK set.
Which call to pam_sm_chauthtok() PAM_PRELIM_CHECK and/or PAM_UPDATE_AUTHTOK
will be making these checks?

Reply via email to