On 02/25/2011 10:14 AM, DRC wrote:
> On 2/25/11 2:13 AM, Martin Koegler wrote:
>> The problem is, that some pam modules react differently, if they are
>> invoked by root or a normal user.
>>
>> The debian pam_unix eg. let normal users only verify their own
>> password and fails on any other user name. Other modules like pam_krb5,
>> (also pam_ldap?) allow a normal user to verify the password of any user.
> I've observed this in some versions of Linux as well, but it can be
> worked around by making Xvnc setuid root.
>
Thanks for the tip, authentication is working great now!


Sincerely,
Sebastiaan


------------------------------------------------------------------------------
Free Software Download: Index, Search & Analyze Logs and other IT data in 
Real-Time with Splunk. Collect, index and harness all the fast moving IT data 
generated by your applications, servers and devices whether physical, virtual
or in the cloud. Deliver compliance at lower cost and gain new business 
insights. http://p.sf.net/sfu/splunk-dev2dev 
_______________________________________________
Tigervnc-devel mailing list
Tigervnc-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/tigervnc-devel

Reply via email to