Chapter 43. Securing Your Network
648
pam_timestamp.so
is in effect leaves the machine open to manipulation by anyone with physical
access to the console.
In the PAM timestamp scheme, the graphical administrative application prompts the user for the root
password when it is launched. When the user has been authenticated, the
pam_timestamp.so
module creates a timestamp file. By default, this is created in the
/var/run/sudo/
directory. If
the timestamp file already exists, graphical administrative programs do not prompt for a password.
Instead, the
pam_timestamp.so
module freshens the timestamp file, reserving an extra five minutes
of unchallenged administrative access for the user.
You can verify the actual state of the timestamp file by inspecting the
/var/run/sudo/<user>
file.
For the desktop, the relevant file is
unknown:root
. If it is present and its timestamp is less than five
minutes old, the credentials are valid.
The existence of the timestamp file is indicated by an authentication icon, which appears in the
notification area of the panel.
Figure 43.7. The Authentication Icon
43.4.6.1. Removing the Timestamp File
Before abandoning a console where a PAM timestamp is active, it is recommended that the timestamp
file be destroyed. To do this from a graphical environment, click the authentication icon on the panel.
This causes a dialog box to appear. Click the
Forget Authorization
button to destroy the active
timestamp file.
Figure 43.8. Dismiss Authentication Dialog
You should be aware of the following with respect to the PAM timestamp file:
• If logged in to the system remotely using
ssh
, use the
/sbin/pam_timestamp_check -k root
command to destroy the timestamp file.
• You need to run the
/sbin/pam_timestamp_check -k root
command from the same terminal
window from which you launched the privileged application.
• You must be logged in as the user who originally invoked the
pam_timestamp.so
module in
order to use the
/sbin/pam_timestamp_check -k
command. Do not log in as root to use this
command.
• If you want to kill the credentials on the desktop (without using the
Forget Authorization
action on
the icon), use the following command:
Содержание ENTERPRISE LINUX 5 - VIRTUAL SERVER ADMINISTRATION
Страница 22: ...xxii ...
Страница 28: ......
Страница 36: ...10 ...
Страница 40: ...14 ...
Страница 96: ...70 ...
Страница 116: ...90 ...
Страница 144: ...118 ...
Страница 146: ......
Страница 158: ...132 ...
Страница 165: ...Installing and Removing Packages 139 Figure 11 7 Installing and removing packages simultaneously ...
Страница 166: ...140 ...
Страница 172: ...146 ...
Страница 178: ......
Страница 228: ...202 ...
Страница 264: ...238 ...
Страница 318: ...292 ...
Страница 330: ...304 ...
Страница 388: ...362 ...
Страница 428: ...402 ...
Страница 452: ......
Страница 458: ...432 ...
Страница 476: ...450 ...
Страница 478: ...452 ...
Страница 494: ...468 ...
Страница 498: ...472 ...
Страница 530: ...504 ...
Страница 536: ...510 ...
Страница 544: ...Chapter 36 Log Files 518 Figure 36 7 Log file contents after five seconds ...
Страница 546: ......
Страница 550: ...524 ...
Страница 576: ......
Страница 584: ...558 ...
Страница 608: ......
Страница 776: ...750 ...
Страница 796: ...770 ...
Страница 800: ...774 ...
Страница 804: ......
Страница 806: ...780 ...
Страница 808: ...782 ...
Страница 816: ...790 ...
Страница 820: ...794 ...
Страница 822: ...796 ...
Страница 830: ...804 ...
Страница 836: ...810 ...
Страница 844: ...818 ...
Страница 848: ...822 ...