You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Sep 23, 2021. It is now read-only.
I'm using pam_securetty.so to restrict the TTYs that root is able to authenticate on, and this breaks physlock to where I'm forced to reboot to be able to access my machine if physlock gets started by root.
Here's the relevant contents of /var/log/auth.log:
Feb 26 22:54:49 dj3ntoo physlock: pam_securetty(physlock:auth): cannot determine user's tty
Feb 26 22:54:49 dj3ntoo unix_chkpwd[29530]: password check failed for user (root)
Feb 26 22:54:49 dj3ntoo physlock: pam_unix(physlock:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=root
I believe I know what's causing this though, and will post an update once I've investigated it further.
In the meantime, I'm using pam_succeed_if.so to temporarily work around this issue. /etc/pam.d/system-auth:
The issue was that physlock didn't set the PAM_TTY item. Without this, pam_securetty.so cannot determine if the authenticating TTY is "secure" and returns a failure. Setting the item to the VT that physlock is running on fixes that and makes the pam_succeed_if.so workaround no longer necessary.
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
I'm using
pam_securetty.so
to restrict the TTYs that root is able to authenticate on, and this breaksphyslock
to where I'm forced to reboot to be able to access my machine ifphyslock
gets started by root.Here's the relevant contents of
/var/log/auth.log
:I believe I know what's causing this though, and will post an update once I've investigated it further.
In the meantime, I'm using
pam_succeed_if.so
to temporarily work around this issue./etc/pam.d/system-auth
:The text was updated successfully, but these errors were encountered: