Control: clone -1 -2 -3 -4 -5
Control: reassign -1 login
Control: reassign -2 openssh-server
Control: reassign -3 lightdm
Control: reassign -4 gdm3
Control: reassign -5 kdm

Hi Russ,

On Wed, Jan 08, 2014 at 07:00:54PM -0800, Russ Allbery wrote:
> It would be better for any application that uses the kernel keyring
> if pam_keyinit were run by default in the PAM session stack.  Without
> this module, users are placed in a default UID-based user session,
> which doesn't isolate each session's keys.

> Worse, currently (although this is a separate bug that's been
> separately reported and may be fixed in the future), the kernel uses
> the UID session for reading, but when writing creates a new session
> keyring that's limited to children of the writing process.  This
> basically makes use of keyring Kerberos caches impossible unless one
> does the equivalent of what pam_keyinit does first.  It's rather
> inobvious that this is necessary.

> The problem with this, which will make it more complex, is that one
> generally does not want to create a new session keyring when running
> commands like su or sudo, just for login sessions, since you normally
> want to preserve the user's existing credentials.  I'm not sure what
> this means for how to achieve this configuration.

Unfortunately, there's no central way to configure PAM modules only for use
in login sessions.  As with pam_selinux and pam_loginuid, the only way to do
this is for each service to include the module directly in their own PAM
config.

Cloning this bug and reassigning it to the usual suspects.

-- 
Steve Langasek                   Give me a lever long enough and a Free OS
Debian Developer                   to set it on, and I can move the world.
Ubuntu Developer                                    http://www.debian.org/
slanga...@ubuntu.com                                     vor...@debian.org

Attachment: signature.asc
Description: Digital signature

Reply via email to