Bug 667758
| Summary: | pam_ldap, running as root, does not authenticate a user on password expiration | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 5 | Reporter: | ross tyler <retyler> | ||||
| Component: | nss_ldap | Assignee: | Nalin Dahyabhai <nalin> | ||||
| Status: | CLOSED ERRATA | QA Contact: | Ondrej Moriš <omoris> | ||||
| Severity: | medium | Docs Contact: | |||||
| Priority: | medium | ||||||
| Version: | 5.5 | CC: | dpal, jplans, mpoole, nc, omoris | ||||
| Target Milestone: | rc | ||||||
| Target Release: | --- | ||||||
| Hardware: | x86_64 | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | nss_ldap-253-42.el5 | Doc Type: | Bug Fix | ||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | |||||||
| : | 688747 (view as bug list) | Environment: | |||||
| Last Closed: | 2011-07-21 08:08:24 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Bug Depends On: | |||||||
| Bug Blocks: | 688747 | ||||||
| Attachments: |
|
||||||
|
Description
ross tyler
2011-01-06 17:31:05 UTC
Created attachment 472101 [details]
authenticate user during PAM_CHANGE_EXPIRED_AUTHTOK operation
Replacing "LDAP" with "UNIX" in the "Expected results:" (above) yields the "Actual results:" when a UNIX account expires and you try to enter a password that is the same as the old password. It's worth noting that depending on the passwd command on a client to enforce password quality or policy via pam_ldap isn't dependable -- a client user can almost as easily invoke ldappasswd or ldapmodify to bypass any quality checks that are wired into the client's PAM configuration. This sort of requirement really calls for server-side password policy enforcement. An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2011-1030.html |