-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
trouble authenticating other user than <me> #5
Comments
Here is some additional info:
I experience this problem simply running a ruby script with the library. The issue is not restricted to the domain of Apache/Rails. Any help is appreciated! |
Can you post the contents of /etc/pam.d/login (or your copied service)? Also, are you passing hte name of the service to Rpam? The default is to use the /etc/pam.d/rpam service, an alternate service needs to be passed in to Rpam.auth(). My first guess would be it has something to do with the service definition. I'm running rpam in production on Debian 6.06 and locally on OS X 10.8, the latter required some monkeying with the PAM definitions, but on Debian it always Just Works®, not sure why Ubuntu would be that different... |
I'm pretty dumbfounded myself. I even looked into SELinux but it doesn't appear to be installed. I am not specifying a service name. I tried this, but it didn't seem to make a difference. I do not have an rpam service defined in my I did find that setting Here is the vanilla contents of
|
Huh... your I'm kind of at a loss, at this point, though... might be worth asking on ServerFault or SO, maybe someone else will see something we're missing? |
Good thoughts. Glad to know that I'm not the only one that this is stumping. I'll take those routes and repost if I come to any conclusions. Thanks again! On Dec 21, 2012, at 6:41 AM, Jason Lewis notifications@github.com wrote:
|
I ran into this problem as well. I tried all of the aforementioned as well as randomly monkeying with the /etc/pam.d/rpam to read: @include common-auth, to no avail. Whatever the latest Ubuntu is doing with PAM, it doesn't seem to work with something like rpam. |
I've got the latest Ubuntu installed on my home workstation, I'll try playing with it on there this weekend. Thanks for the feedback 😄 |
Hello, I'm trying to configure Rpam and.. the same issue. Even with a simple script I can't authenticate any user but me. Just to give some add information, here is my auth.log log out when the login fails: unix_chkpwd[17744]: check pass; user unknown Please let me know if have any further information. Thanks, |
Was finally able to reproduce on an Ubuntu system... now that I've reproduced it I should be able to look into it more. I'll keep you posted with what I find. |
Hey, any news about it? Thanks. |
I think I've found the issue... I'm not sure why I'm not seeing this issue on some fo by Debian systems, unless there was a change between libpam0g 1.1.1 and 1.1.3, but apparently the issue encountered on Ubuntu 12.10 is the correct behavior for PAM (specifically, for I found this forum thread which explains the issue in detail, possible workarounds, and hte security issues posed by those workarounds. Specifically:
The best solution is to use a PAM auth strategy that doesn't hit /etc/shadow; I use rpam-ruby19 with PowerBroker Open for ActiveDirectory bridging, so the pam_auth call never invokes unix_chkpwd to read /etc/shadow. The fact that rpam works at all on Unixes other than the latest Ubuntu is probably a security flaw... not sure if it's worthy of a CVE, but I'll investigate... FWIW, there's a relevant thread on the pam mailing list addressing this issue as well: https://www.redhat.com/archives/pam-list/2012-August/msg00001.html Sorry I don't have better news for those who wanted to authenticate local users, but at least we know what's going on better now. I think the 'resolution' for this will probably be to update the README... leaving open until I have a chance to do that, but will probably close after I document the limitation. |
hummm... this is bad! I agree with all your point of view and understand the problem. But it is still disappointing. Linux is so flexible in some points to allow users do everything they want, but some times, I think the caprices from the community overrides the Linux way to think! Lets hope to find a solution! I really would enjoy to have this kind of authentication. |
Note that currenlty ruby19-pam + pam_unix can't authenticate users if not executed as root. So currently pam can be used with other kind of pam modules (ldap, sssd, krb, ...). Check out canweriotnow/rpam-ruby19#5 for more information.
I'm experiencing the same issue as #2 , even after using suid. This is happening on an Ubuntu server running a Rails app with Passenger. I am using a custom PAM service which is a copy of /etc/pam.d/login. Authentication works for the user running the Rails app, but no others.
Could this be a problem brought about by Rails/Passenger?
The text was updated successfully, but these errors were encountered: