For reasons unknown to me, Network manager stores your wireless
passwords in an encrypted keyring.  Your password is the decrypt token.
I assume you've enabled pam_keyring in common_auth, which recieves the
password you type at GDM and starts the keyring manager with enough
timeout to let nm-applet retrieve passwords from your keyring.

I'm marking this confirmed, to keep it a visible and known bug.

The fixes I can imagine are to either:
* place NM wireless keys out of the keyring by default (weak wireless security)
* store the keyring token within the fingerprint reader itself (good luck)
* store the keyring token on disk (bad security!)

Given the nature of the request and the very weak security of
fingerprints, I think something closer to the first option is the
desired solution here.  I understand that Network Manager in Intrepid
(http://www.ubuntu.com/testing/intrepid/alpha5#Network%20Manager%200.7)
allows system wide settings.

Does this sound like an acceptable fix?

** Changed in: thinkfinger (Ubuntu)
       Status: New => Confirmed

-- 
Thingfinger dosen't unlock keyring
https://bugs.launchpad.net/bugs/276384
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to