Date: Thu, 26 Apr 2007 12:46:38 +0100 From: Ceri Davies <ceri@submonkey.net> To: Alexandr Kovalenko <never@nevermind.kiev.ua> Cc: cvs-src@freebsd.org, Yar Tikhiy <yar@freebsd.org>, src-committers@freebsd.org, cvs-all@freebsd.org Subject: Re: cvs commit: src/lib/libpam/modules/pam_unix pam_unix.8 pam_unix.c Message-ID: <20070426114638.GC77408@submonkey.net> In-Reply-To: <20070426105458.GA98415@nevermind.kiev.ua> References: <200704260639.l3Q6d1SH027885@repoman.freebsd.org> <20070426105458.GA98415@nevermind.kiev.ua>
next in thread | previous in thread | raw e-mail | index | archive | help
--PZYVFYZbFYjzBslI
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Thu, Apr 26, 2007 at 01:54:59PM +0300, Alexandr Kovalenko wrote:
> Hello, Yar Tikhiy!
>=20
> On Thu, Apr 26, 2007 at 06:39:01AM +0000, you wrote:
>=20
> > yar 2007-04-26 06:39:01 UTC
> >=20
> > FreeBSD src repository
> >=20
> > Modified files: (Branch: RELENG_6)
> > lib/libpam/modules/pam_unix pam_unix.8 pam_unix.c=20
> > Log:
> > MFC:
> > pam_unix.c 1.52
> > pam_unix.8 1.13
> > =20
> > In account management, verify whether the account has been locked
> > with `pw lock', so that it's impossible to log into a locked account
> > using an alternative authentication mechanism, such as an ssh key.
> > This change affects only accounts locked with pw(8), i.e., having a
> > `*LOCKED*' prefix in their password hash field, so people still can
> > use a different pattern to disable password authentication only.
>=20
> Using the very same logic you should also add checking for '*', and for
> any other string, which cannot be in password hash of different
> algorithms. By the way, what if some crypto algorithm, which will be
> used for password hashing can produce hash, which contains substring
> '*LOCKED*' ?
We really need to grow the same mechanism for this as Solaris has.
The way that this works is:
o If the password hash begins *NP* then the user has no password
and password authentication will always fail.
o If the password hash begins *LK* then the account is considered
locked and all authentication fails. Also, cron and at will
not run jobs for that user.
o Anything else, the account is considered enabled (although of
course, password checking can still fail if the hash is not
valid).
I couldn't care less what the strings actually are, but we should
probably use *LOCKED* for the locked case, although I can see that we
may wish to use something else to provide a somewhat backward compatible
route - those who have been using the string *LOCKED* as stated in the
pw manual would get the same behaviour that they do now.
I am willing to work on this, but not without general agreement on the
above.
Ceri
--=20
That must be wonderful! I don't understand it at all.
-- Moliere
--PZYVFYZbFYjzBslI
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (FreeBSD)
iD8DBQFGMJEeocfcwTS3JF8RAknjAKCRfcSvn/grYaZ6Qk+Sgi5hDXes3QCgnZj9
Fs8O0FK18ojGwyUaVo9g8f4=
=8mOw
-----END PGP SIGNATURE-----
--PZYVFYZbFYjzBslI--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20070426114638.GC77408>
