[Pkg-shadow-devel] Bug#443322: login: immediate 'Login incorrect' after unknown user name
Steve Langasek
vorlon at debian.org
Mon Aug 25 06:25:20 UTC 2008
On Sun, Aug 24, 2008 at 03:01:41PM +0200, Nicolas François wrote:
> On Sat, Aug 23, 2008 at 10:30:59PM -0700, vorlon at debian.org wrote:
> > I just upgraded one of my sid machines that had a modified /etc/pam.d/login,
> > and was quite surprised to see the conffile prompt from this change,
> > specifically because of the use of pam_faildelay.
> > Did you consider doing this instead for pam_securetty?:
> > auth [success=ok user_unknown=ignore default=die] pam_securetty.so
> I did not added this because in case of an insecure TTY, if root enters
> his name with a typo, she will be prompted for a password.
> (That was my true in my last try: the user is checked before the TTY)
True, but I'm not convinced this is actually a problem; in order for the
user to shoot themselves in the foot, they must:
- be running login on an insecure tty (...seriously? who still runs telnet
anymore, unless it's kerberized telnet?)
- mistype the name "root"
- fail to *notice* they've mistyped the name "root", and then proceed to
type the root password.
Is that really a case that's worth protecting against? Isn't it just as
likely that a user will type in a *correct* username, and then make the
mistake of typing the root password instead of the user password?
> There are in fact two contradicting requests on insecure TTYs
> * if the user is unknown, the password prompt should not be displayed (it
> might be a typo for root)
> * the password prompt should always be displayed to avoid giving
> an indication that the user does not exist.
> I'm not sure which one is the most critical.
I don't know either, but the previous behavior was consistent for the better
part of a decade, so I think it would be preferable to have such a change
discussed more widely (= debian-devel) before committing to it in a release.
(I'm not happy with the new behavior of pam_securetty, myself, but I'm not
going to diverge from the upstream change when we can work around it in the
config as described above.)
> > Not sure if that should be considered any better, but it avoids needing to
> > add another module to the stack. (One which isn't very well documented, if
> > I do say so myself!)
> The additional pam_faildelay module replaces a call to pam_fail_delay()
> which was removed from login (this was done to avoid hardcoding a delay in
> login (it was in fact in login.defs), which was disturbing for user
> willing to reduce the delay in login.defs, or to remove the delay by
> adding nodelay to pam_unix).
> Would it be better to call pam_faildelay only in case of a pam_securetty
> failure, and otherwise let pam_unix set the delay?
All in all, I think that calling pam_faildelay is appropriate because there
are authentication modules one might use in place of pam_unix which do *not*
call pam_fail_delay at all (e.g., pam_krb5 and pam_ldap). I'm just not sure
that /etc/pam.d/login is the right place for it, or if it actually belongs
in /etc/pam.d/common-auth.
Cheers,
--
Steve Langasek Give me a lever long enough and a Free OS
Debian Developer to set it on, and I can move the world.
Ubuntu Developer http://www.debian.org/
slangasek at ubuntu.com vorlon at debian.org
More information about the Pkg-shadow-devel
mailing list