Subject: Re: PAM
To: None <tech-kern@netbsd.org>
From: Ken Hornstein <kenh@cmf.nrl.navy.mil>
List: tech-kern
Date: 09/25/2002 10:41:15
>(1) This is not a question of how to authenticate; it's a question of
> what to do once authenticated. (This is admittedly a relatively
> minor point.)
Uh, yeah ... this was in response to the "Why do you need dynamic objects
in PAM?" comment. This was an example of a reason why you need them.
>(2) It's also fairly easy to fix; the simplest change that comes to
> mind is to have the magic syscalls affect the parent of the calling
> process rather than the calling process itself. An arguably better
> way would be to have the calls affect "the process on the other end
> of this pipe".
See the "But I live in the real world" comment previously.
>(3) By imposing sufficiently restrictive "but I insist on doing it this
> way"s, you can find similar problems with any scheme.
It's not like the problem is hypothetical; it's something that people
have been doing for over a decade. If it was some wacky hypothetical
problem, yes, you would have a point here ... but this is real problem,
that people face in the real world.
>(4) At worst, you will just have to use older methods, less convenient
> and/or less secure, when using AFS.
Methods that don't work, you mean.
--Ken