locked account accessable via pubkey auth

Nicolas Williams Nicolas.Williams at ubsw.com
Fri Feb 1 01:05:37 EST 2002


On Wed, Jan 30, 2002 at 05:42:18PM -0800, Frank Cusack wrote:
> On Wed, Jan 30, 2002 at 05:02:37PM -0800, Darren Moffat wrote:
> > New in Solaris 9 is pam_unix_account(5) which says:
> > 
> >      pam_unix_account provides functionality to the  PAM  account
> >      management  stack. The function pam(3PAM) function retrieves
> >      password aging information from the  repositories  specified
> >      in  nsswitch.conf(4),  and  verifies that the user's account
> >      and password have not expired.
> 
> hmm... This seems broken.  If I want a certain service to check pam_unix,
> I list it in pam.conf.  Instead, I'm now supposed to call pam_unix_account()
> specifically?  Is pam_unix_account() somehow different than the normal
> pam account mgmt w/ pam_unix in pam.conf?  The intent of this (AFAICT) is
> so that an app can always check against pam_unix, regardless of what's in
> pam.conf -- broken.  Sorry, this is getting OT.

Hmmmm, I haven't played with Solaris 9 yet, but that sounds like a
special PAM stack configured only with pam_unix that can be used to
check a Unix account's status independently of what PAM stack the app
used for authentication in the first place.

> /fc


Cheers,

Nico
--
-DISCLAIMER: an automatically appended disclaimer may follow. By posting-
-to a public e-mail mailing list I hereby grant permission to distribute-
-and copy this message.-

Visit our website at http://www.ubswarburg.com

This message contains confidential information and is intended only 
for the individual named.  If you are not the named addressee you 
should not disseminate, distribute or copy this e-mail.  Please 
notify the sender immediately by e-mail if you have received this 
e-mail by mistake and delete this e-mail from your system.

E-mail transmission cannot be guaranteed to be secure or error-free 
as information could be intercepted, corrupted, lost, destroyed, 
arrive late or incomplete, or contain viruses.  The sender therefore 
does not accept liability for any errors or omissions in the contents 
of this message which arise as a result of e-mail transmission.  If 
verification is required please request a hard-copy version.  This 
message is provided for informational purposes and should not be 
construed as a solicitation or offer to buy or sell any securities or 
related financial instruments.




More information about the openssh-unix-dev mailing list