Re: trouble configuring pam using pam_ldap and pam_mount

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Wilhelm Meier wrote:
Am Samstag, 28. Juli 2007 21:30 schrieb Heiko Harders:
<snip>
What about uid's. Normally the local user uid's occupy a different range, say e.g. 0 - 1000 and the ldap uid's are above that range. I don't no if pam_mount can distinguish this, but pam_cifs can do that.
I tried working with uid's and gid's (but did it a little different then what you told), this is the configuration I used, my local users have id's below 2000 and my ldap users have id's above 2000:

session    optional    pam_foreground.so
session    [default=2 success=ignore]    pam_succeed_if.so quiet uid > 2000
session    required    pam_mount.so
session    sufficient    pam_ldap.so
session    required    pam_unix.so

But this also doens't work... I got this example literally from the online documentation (example on the bottom of this page: http://www.kernel.org/pub/linux/libs/pam/Linux-PAM-html/sag-pam_succeed_if.html). But with whatever uid I logon (tried su and tried gdm) it always does the default thing, so it skips lines 3 and 4. I checked the user id's of the users after logging on (with command 'id'). For my ldap user it was 2002, for my local user it was 1000. So that couldn't be the problem.

Dan Yefimov wrote:
On Sun, 29 Jul 2007, Heiko Harders wrote:
<snip>
The matter is that pam_localuser.so operates only in account stack (check
README file in the pam_localuser source directory).
I checked this out online to make sure this wasn't the problem. In the online documentation (http://www.kernel.org/pub/linux/libs/pam/Linux-PAM-html/sag-pam_localuser.html) I found: "All services (account, auth, password and session) are supported." So I ruled this out and was convinced this wasn't a problem. But perhaps that online documentation isn't correct.
That means mounting should
be performed in account stack too. If pam_mount.so cannot operate in account stack (consult with pam_mount documentation), pam_localuser.so cannot help you.
I think (but am not sure) pam_mount can not operate in account stack. The documentation is very limited and doesn't say anything about that.
You could however patch pam_localuser source so that it can operate also in session stack in order to be helpful for you.
That's something I will consider after I've made sure the online documentation I found is indeed incorrect (and you are right about pam_localuser isn't able to operate in session stack).

I thought it might help if I used this module:
http://www.kernel.org/pub/linux/libs/pam/Linux-PAM-html/sag-pam_loginuid.html
However I'm not sure what exactly it is for, I thought it might be necessary for correctly identifying the uid of the user which logs on? Anyway, this module isn't installed on my system, a quick search on the internet provided that 'Linux SE' (security enhanced linux) is needed for this. But there is not much I can find about this issue.

Another problem that occured is that my 'gksu' is broken by 'auth required pam_mount.so' (that seems to be a common problem and I didn't find a solution for it yet, any comments on that are also welcome). So after three days of trial and nothing but error ;-) and considering the problem with gksu I'm thinking about dropping pam_mount and try some other approach. But I don't want to give up to soon, so any thoughts on these problems are still very welcome.

Greetings,
Heiko

_______________________________________________
Pam-list mailing list
Pam-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/pam-list

[Index of Archives]     [Fedora Users]     [Kernel]     [Red Hat Install]     [Linux for the blind]     [Gimp]

  Powered by Linux