On 02/25/2011 10:14 AM, DRC wrote: > On 2/25/11 2:13 AM, Martin Koegler wrote: >> The problem is, that some pam modules react differently, if they are >> invoked by root or a normal user. >> >> The debian pam_unix eg. let normal users only verify their own >> password and fails on any other user name. Other modules like pam_krb5, >> (also pam_ldap?) allow a normal user to verify the password of any user. > I've observed this in some versions of Linux as well, but it can be > worked around by making Xvnc setuid root. > Thanks for the tip, authentication is working great now!
Sincerely, Sebastiaan ------------------------------------------------------------------------------ Free Software Download: Index, Search & Analyze Logs and other IT data in Real-Time with Splunk. Collect, index and harness all the fast moving IT data generated by your applications, servers and devices whether physical, virtual or in the cloud. Deliver compliance at lower cost and gain new business insights. http://p.sf.net/sfu/splunk-dev2dev _______________________________________________ Tigervnc-devel mailing list Tigervnc-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tigervnc-devel