On Tue, Oct 07, 2008 at 11:29:53PM +0200, Bart Blanquart wrote:
> On 07 Oct 2008, at 23:03, Nicolas Williams wrote:
> > Scriptable interfaces will be.  We could make it so that just
> > dropping in a PAM config file just NOT in /etc/pam.conf AND dropping
> > in /etc/security.conf suffice.
> >
> > [But none of that removes risk from changes like the pam_unix.so.1
> > split up that was done for Solaris 10.  So we might want to develop
> > a more stable PAM customization interface.  This is probably a
> > subject for a separate thread.]
> 
> The risk doesn't seem to be that big: as long as the old module is  
> still shipped nothing changes for an admin: they have dropped in their  
> own PAM configuration file and we're not touching it. If that  
> references modules we're no longer using then that's OK, really.
> 
> If we remove modules the story changes, but then that's the stability  
> level we'd be at: we can't change the behaviour of any of the policy  
> files we ship in /usr/lib/security and we can't drop any modules (even  
> if we stop using them in our configs), but that doesn't seem to be too  
> much of a burden.

That's what happened when pam_unix.so.1 was split: the old one was
removed.

I agree that the PAM config snippets we deliver in /usr/lib/security
have Committed semantics.  That's clearly a good thing.

The problem is that anyone writing their own such snippets won't be able
to expect them to be stable, at least across minor releases of
[Open]Solaris.  The same applies to /etc/pam.conf itself today.
ALTERNATIVELY we must do heroic PAM config upgrade scripting.

Nico
-- 

Reply via email to