Heya folks, I've recently become aware of the niftiness of pam_timestamp. Its a pam module that can be used to give a user a timestamp (that lasts, say, five minutes) when entering some credentials (say, a password) to prove that you recently entered those credentials sucessfully.
It apparently came about from the sudo program. Red Hat use it in all their redhat-config-whatever programs to stop hassling users each time they want to run some tool that requires root privileges. Run the tool, enter the password once, get a set of keys representing your credentials in the gnome taskbar, and, if you run another tool requiring the root password, pam_timestamp is sufficient to run the tool. Its really nifty. So I'd like to use for su to save me some time. According to the doco (and my own experience of pam), all that should be needed to get su to check for the timestamp and allow me to switch user if its there is: auth sufficent pam_timestamp.so at the top of /etc/pam.d/sudo (beneath the #%PAM-1.0 line) Which I've done. But it doesn't seem to work. Any ideas folks? Thanks muchly. This will save me stacks of time if I can get it to work. Mike -- __________________________________________________________________________ Mike MacCana Consultant RHCX, MCSE, MCP+I Cybersource: Providing Quality IT Professional Services for 11 Years Specialists in Unix/Linux, TCP/IP and Web Application Development Level 4, 10 Queen St, Melbourne. Ph : 03 9621 2377 Fax: 03 9621 2477 -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
