For reasons unknown to me, Network manager stores your wireless passwords in an encrypted keyring. Your password is the decrypt token. I assume you've enabled pam_keyring in common_auth, which recieves the password you type at GDM and starts the keyring manager with enough timeout to let nm-applet retrieve passwords from your keyring.
I'm marking this confirmed, to keep it a visible and known bug. The fixes I can imagine are to either: * place NM wireless keys out of the keyring by default (weak wireless security) * store the keyring token within the fingerprint reader itself (good luck) * store the keyring token on disk (bad security!) Given the nature of the request and the very weak security of fingerprints, I think something closer to the first option is the desired solution here. I understand that Network Manager in Intrepid (http://www.ubuntu.com/testing/intrepid/alpha5#Network%20Manager%200.7) allows system wide settings. Does this sound like an acceptable fix? ** Changed in: thinkfinger (Ubuntu) Status: New => Confirmed -- Thingfinger dosen't unlock keyring https://bugs.launchpad.net/bugs/276384 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs