Timeline for PAM: Authentication failure, with valid password
Current License: CC BY-SA 4.0
7 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Jul 3 at 19:41 | review | Low quality posts | |||
| Jul 3 at 23:48 | |||||
| Jul 10, 2020 at 20:05 | comment | added | Kong Chun Ho | This maybe the right solution, but definitely not a safe solution in security standpoint. | |
| Jul 10, 2020 at 17:56 | comment | added | Daniel Sokolowski | So really this is the right solution. | |
| Jul 9, 2020 at 22:10 | comment | added | Kong Chun Ho |
Adding a service user Debian-exim to shadow group allows an attacker read /etc/shadow which contains (hashed) password of the machine when the service is compromised. I do not have an alternative solution, but I just want to point out the security implications.
|
|
| Jul 9, 2020 at 17:05 | comment | added | Daniel Sokolowski | Please elaborate, and provide an alternative @KongChunHo | |
| Jul 6, 2020 at 5:06 | comment | added | Kong Chun Ho | This would create a huge security concern. | |
| Jan 7, 2019 at 2:17 | history | answered | Daniel Sokolowski | CC BY-SA 4.0 |