Book Image

Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers

By : Kenneth Geisshirt
Book Image

Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers

By: Kenneth Geisshirt

Overview of this book

<p>PAM-aware applications reduce the complexity of authentication. With PAM you can use the same user database for every login process. PAM also supports different authentication processes as required. Moreover, PAM is a well-defined API, and PAM-aware applications will not break if you change the underlying authentication configuration.<br /><br />The PAM framework is widely used by most Linux distributions for authentication purposes. Originating from Solaris 2.6 ten years ago, PAM is used today by most proprietary and free UNIX operating systems including GNU/Linux, FreeBSD, and Solaris, following both the design concept and the practical details. PAM is thus a unifying technology for authentication mechanisms in UNIX. <br /><br />PAM is a modular and flexible authentication management layer that sits between Linux applications and the native underlying authentication system. PAM can be implemented with various applications without having to recompile the applications to specifically support PAM.</p>
Table of Contents (13 chapters)

Leaving a Back Door Open


It's not general advice but during the test phase of a new PAM configuration you should be able to correct mistakes using an open back door.

In the case of PAM, a back door can be left open in two ways. The first way is to work only on one service (for example, ssh) but enable another log in protocol (for example, telnet). When the first service is working, you can either switch service or disable the backdoor service. The disadvantage of using a backdoor service is that you open a door for unauthorized usage of the computer. In particular, if you use telnet or rsh as backdoor service, you lower the security strength of your computer. During the test phase, an unauthorized user might log in.

Another way to let a door be open is to log in and never log out before you have finished configuring. Once logged in, changes in PAM configuration will not force you out and you will be able to correct mistakes. So you should be careful not to accidentally type Ctrl-D.

Which of...