On Freitag 23 Januar 2009, Norberto Bensa wrote:
> On Fri, Jan 23, 2009 at 1:03 AM, Volker Armin Hemmann
>
> <volkerar...@googlemail.com> wrote:
> > in the past pam breakage caused login trouble,
>
> In the past... Like when there's were not enough documentation or it
> was too cryptic?
>
> > so, could you please answer mine now:
> > why should pam be used in the first place on a usual server/desktop which
> > has restricted access anyway?
>
> That was not your question. You redefined it, but I'll answer anyway:
>
> PAM helps you to have a stackable authentication system like:
>
> Kerberos
> LDAP
> Files
>
> If kerberos is available use it. If not, try ldap, and if that fails
> too, use files (passwd/shadow) Or you could combine the three
> methods!! (but you'll have to type up to three passwords) Or maybe you
> have a pendrive with a digital certificate you want to use to
> authenticate privileged users. What about biometrics (fingerprints,
> etc) combined with passwords and/or digital certificates?

so nothing 90% of all users ever use or need.

>
> About security. I fail to see how removing PAM will magically make
> your system more secure.

if you don't use any of that 'stackable' stuff or other features and you 
remove pam, you don't have to worry about pam securtiy problems.


Reply via email to