Package: pam-p11
Severity: wishlist
Version: 0.1.3-2

Currently, pam_p11_openssh.so and pam_p11_opensc.so use hardcoded file
paths to determine where to look for matching keys.

pam_p11_openssh examines ~/.ssh/authorized_keys and pam_p11_opensc reads
~/.eid/authorized_certificates.

It would be good if these paths were configurable by the system
administrator via options in the system pam config.  One common case is
that, system administrators might not want to allow the end users to be
able to modify their own login permission files.  Unless the user is
denied ownership of her home directory, either of these paths could be
completely changed (or accidentally destroyed, or maliciously targeted
by an exploited application) by the user, resulting in either a denial
of service (new logins fail) or in exposing the user account to other
access.

If such configuration is already possible, i wasn't able to figure out
how to do it, either by reading the documentation or by skimming the source.

        --dkg

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to