Subject: Re: pam, ssh, and pam_ssh
To: Christos Zoulas <christos@tac.gw.com>
From: Roland Dowdeswell <elric@imrryr.org>
List: current-users
Date: 03/16/2005 15:04:25
On 1110832581 seconds since the Beginning of the UNIX epoch
Christos Zoulas wrote:
>
>Weak == "empty passphrase". Isn't that right? The issue here is with
>the pam module, loading the weak key and trying to authenticate with
>an empty passphrase. Or am I understanding this incorrectly?
The main problem with pam_ssh.so is that the system administrator
and/or associated programs have no facility for controlling the
strength of the passwords used. I think that the question to ask
oneself is ``why are ordinary passwords not stored in the user's
home directory owned by them?'' The answer to this question explains
why pam_ssh.so is a bad idea.
You lose:
1. administrative control over password changes,
2. the ability to require that a user at a terminal
enter the old password to change the password, and
3. password quality checking.
Using pam_ssh.so is quite specialised and so should be disabled by
default. I would even go so far as to delete the line rather than
comment it out since we should not encourage people to use it at
all.
--
Roland Dowdeswell http://www.Imrryr.ORG/~elric/