On Fri, May 23, Frankie Boy wrote: > Hello! > > Me and my friend started to develop a PAM-module which moves the > configuration-process responsibility from system administrator to system > users. > Every system user is able to configure his own pam-modules stack for > authentication. Hm, isn't that a big security risk? This would allow an user to configure a very weak authentication schema, which allows hacker to crack this account very fast ... Thorsten -- Thorsten Kukuk, Project Manager/Release Manager SLES SUSE LINUX Products GmbH, Maxfeldstr. 5, D-90409 Nuernberg GF: Markus Rex, HRB 16746 (AG Nuernberg) _______________________________________________ Pam-list mailing list Pam-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/pam-list