Book Image

Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers

By : Kenneth Geisshirt
Book Image

Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers

By: Kenneth Geisshirt

Overview of this book

<p>PAM-aware applications reduce the complexity of authentication. With PAM you can use the same user database for every login process. PAM also supports different authentication processes as required. Moreover, PAM is a well-defined API, and PAM-aware applications will not break if you change the underlying authentication configuration.<br /><br />The PAM framework is widely used by most Linux distributions for authentication purposes. Originating from Solaris 2.6 ten years ago, PAM is used today by most proprietary and free UNIX operating systems including GNU/Linux, FreeBSD, and Solaris, following both the design concept and the practical details. PAM is thus a unifying technology for authentication mechanisms in UNIX. <br /><br />PAM is a modular and flexible authentication management layer that sits between Linux applications and the native underlying authentication system. PAM can be implemented with various applications without having to recompile the applications to specifically support PAM.</p>
Table of Contents (13 chapters)

Securing Your Environment


PAM is a powerful framework, and it can be difficult to foresee everything that can go wrong. If PAM is wrongly configured, your environment can easily be compromised by crackers and even script kiddies.

The pam_deny module must be regarded as an essential component in modern PAM configuration. The module can be included as the last module in any stack for every service as a failsafe solution. If no other module has either denied or granted access to the service, it might be nice to know that access is always blocked at the last stage.

Moreover, it is important to keep an eye on the OTHER service. The reason is that if a service is not configured explicitly then PAM falls back to the OTHER service. In other words, the OTHER service can easily become your weakest link—in particular when you do not think about it. A simple version of the OTHER service could involve the pam_deny module, which will stop unauthorized access:

auth required pam_deny.so

The system administrator...