4 -----------------------------
8 - sanitize use of md5 throughout distribution.. Make a static
9 library for helping to develop modules that contains it and other
10 stuff. Also add sha-1 and ripemd-160 digest algorithms.
11 - once above is done. remove hacks from the secret@here module etc..
12 - remove prototype for gethostname in pam_access.c (Derrick)
13 - document PAM_INCOMPLETE changes
14 - verify that the PAM_INCOMPLETE interface is sensible. Can we
15 catch errors? should we permit item changing etc., between
16 pam_authenticate re-invocations?
17 - verify that the PAM_INCOMPLETE interface works (auth seems ok..)
18 - add PAM_INCOMPLETE support to modules (partially added to pam_pwdb)
20 - do we still need to remove openlog/closelog from modules..?
21 - auth and acct support in pam_cracklib, "yes, I know the password
22 you just typed was valid, I just don't think it was very strong..."
23 - add in the pam_cap and pam_netid modules
25 ====================================================================
26 Note, as of release 0.73, all checkins should be accompanied with a
27 Bug ID. The bug IDs relate to sourceforge IDs.. (Of course, nothing is
28 ever that simple. It turns out that at some point in Sourceforge's
29 history all of the bug ids got bumped by 100000, so pretty much if you
30 see a bug ID below that begins with a '1' and your attempted query
31 fails, try adding 100000 to the number and trying again. I believe
32 this only affects bugs before release 0.76.)
34 You can query the related bug description with the following URL:
36 http://sourceforge.net/tracker/index.php?func=detail&aid=XXXXXX&group_id=6663&atid=106663
38 Where you should replace XXXXXX with a bug-id.
40 If you have found a bug in Linux-PAM, please consider filing such a
41 bug report - outstanding bugs are listed here:
43 http://sourceforge.net/tracker/?atid=106663&group_id=6663&func=browse
45 (to file another bug see the 'submit bug' button on this page).
47 ====================================================================
49 0.76: please submit patches for this section with actual code/doc
52 * pam_rhosts: Nalin adds support for '+hostname', and zdd fix
53 compilation warning. (Bug 476986 - agmorgan)
54 * pam_motd: Nalin fixed compiler warning. (Bug 476938 - agmorgan)
55 * pam_pwdb: Solar Designer pointed out that there was a problem with
56 the compatibility support for md5 password hashing. (Bug 460717,
58 * pam_issue: Nalin found segfaulting problems if the PAM_USER_PROMPT
59 is unset, found some similar problems with assumptions about
60 realloc. (Bug 476983 - agmorgan)
61 * pam_env: 'weichangyang of hotmail' pointed out a wild string with no
62 valid '\0' was leading to problems with sshd and suggested fix (Bug
64 * MANDIR cleanup. It defaults to /usr/share/man, but can be overridden
65 using the --enable-mandir ./configure option, similarly for DOCDIR
66 from Nalin (Bug 476940 - agmorgan)
67 * pam_filter cleanup (including moving the filter directory) Nalin
68 and Harald Welte (Bugs 436057, 476970 - agmorgan)
69 * pam_limits can handle negative priority limits now (which can apply
70 to the superuser too) - based on patch from Nalin. Also cleanup the
71 error handling that was very sloppy before (Bug 476990, 476987 -
73 * db3 is now recognized as a libdb candidate (Bug 435764 - agmorgan)
74 * more changes (extracted from redhat version) courtesy of
75 Harald Welte (Bugs pam_limits=436061, pam_lastlog=436060,
76 pam_mkhomedir/pam_env=435991 - agmorgan)
77 * fix for legacy behavior of pam_setcred and pam_close_session in
78 the case that pam_authenticate and pam_open_session hadn't been
79 called - bug report from Seongwan Park. (Bug 468724 - agmorgan)
80 * some BSD updates and fixes from Mark Murray - including a slightly
81 more robust conversation function and some minimization of gcc
82 warnings. (Bugs 449203,463984 - agmorgan)
83 * verified that the setcred stack didn't suffer from the bug I was
84 nervous about, add a new module pam_debug to help me test this.
85 fixed a libpam/pam_dispatch.c instrumentation line that I tripped
86 over when testing. (Bug 424315 - agmorgan)
87 * pam_unix/support.c: sample use of reentrant NSS function. Not yet active,
88 because modules do not include _pam_aconf_h! (Bug 440107 - vorlon)
89 * doc/Makefile changes - use $(mandir) [courtesy Harald Welte] (Bug
90 435760) and add some rules to make/delete the draft rfc I've been
91 working on (Task 17426 - agmorgan)
92 * pam_modules.sgml: sourceforge has changed its CVS viewing software
93 (Bug 460491 - agmorgan)
94 * pam_unix_passwd: got rid of an annoying warning (Bug 461089 - agmorgan)
95 * configure.in, _pam_aconf.h.in: set the stage for fully reentrant PAM
96 modules, with some infrastructure to detect getxxbyxx_r() functions
98 * pam_unix: removed superfluous use of static variables in md5 and bigcrypt
99 routines, bringing us a step closer to thread-safeness. Eliminated
100 some variable indirection along the way. (Bug 440107 - vorlon)
101 * pam_tally: remove #include of stdlib.h, which isn't needed by anything
102 found in this module. Can be readded if we find a real need for it at
103 a later date. (Bug 436432 - vorlon)
104 * pam_tally: added an #include (was it really needed?) and made the
105 pam_tally app install (with more pretty printing and a corrected
106 Makefile dependency) motivated by a (red hat diff) courtesy of Harald
107 Welte (Bug 436432 - agmorgan)
108 * configure.in changes to help support non-Linux environments courtesy
109 of Scott T. Emery (Bug 422563 - agmorgan)
110 * made a pam_cracklib enhancement to interpret -ve limits in a
111 sensible fashion contributed by Werner Puschitz (Bug 413162 -
113 * another fix for the latest number of rlimits available to pam_limits
114 (Bug 424060 - agmorgan)
115 * removed stale link from pam_pwdb documentation (Bug 433460 - agmorgan)
116 * pam_appl.sgml change - more discussion of choosing a service name
117 (Bug 417512 - agmorgan)
118 * more specific linking requirements for -lndbm for pam_userdb - from
119 David Lee (Bug 417339 - agmorgan)
120 * a large number of small changes to make AIX support better (Bug
122 * $(MAKE) instead of 'make' - from Scott T. Emery (Bug 422144 -
124 * c++ header fixes for pam_misc.h and pam_client.h - from Alexandre
125 Sagala (Bug 420270 - agmorgan)
126 * pam_access fixes - looks out for trailing '.' - from Carlo Marcelo
127 Arenas Belon (Bug 419631 - agmorgan)
128 * don't zero out password strings during pam_unix's password changing
129 function (Bug 419803 - vorlon)
130 * propagate some definitions to the _pam_aconf.h file - from David Lee
131 (Bug 415419 - agmorgan)
132 * solaris GCC OS_CFLAGS change from David Lee (Bug 415412 - agmorgan)
133 * added a comment to this CHANGELOG to explain why most of the bugids
134 used below appear not to be known to sourceforge [try adding 100000
135 to the bugid number.] (Bug 414943 - agmorgan)
136 * bumped version numbers and also added support for SONAME defines
137 that appear not to have survived the great autoconf experiment (Bug
140 0.75: Sat Apr 7 23:10:50 PDT 2001
144 This release contains backwardly incompatible changes to
145 libpam. Prior versions were buggy - see bugfix for Bug 129775.
149 * made 0.75 release (Bug 414665 - agmorgan)
150 * pam_pwdb has been removed from the suggested pam.conf template. I've
151 replaced it with pam_unix. (Bug 227565 - agmorgan)
152 * pam_limits - Richard M. Yumul reported that "<domain> -" didn't
153 work, first fix suggested by Werner Puschitz (Bug 404953 - agmorgan)
154 * Nicolay Pelov suggested a simple fix for freebsd support (Bug 407282
156 * Michel D'HOOGE submitted documentation fixes (Bug 408961 - agmorgan)
157 * fix for module linking directions (Bug 133545 - agmorgan)
158 * fix for glibc-2.2.2 compilation of pam_issue (Bug 133542 - agmorgan)
159 * fix pam_userdb to make and link both .o files it needs - converse()
160 wasn't being linked! (Bug 132880 - agmorgan)
161 * added some sys-admin documentation for the pam_tally module (Bug
163 * added a link to module examples from the module writers doc (Bug
165 * fixed a small security hole (more of a user confusion issue) with
166 the unix and pwdb password helper binaries. The beef is described in
167 the bug report, but no uid change was possible so no-one should
168 think they need to issue a security bulletin over this one! (Bug
170 * pam_lastlog needs to be linked with -lutil, also removed ambiguity
171 from sysadmin guide regarding this module being a 'session' module
172 (Bug 131549 - agmorgan).
173 * pam_cracklib needs to be linked with -lcrypt (old password checking)
174 (Bug 131601 - agmorgan).
175 * fixes for static library builds and also the examples when linked
176 with the debugging build of the libraries. (Bug 131783 - agmorgan)
177 * fixed URL for original RFC to a cached kernel.org file. (Bug 131503
179 * quoted the $CRACKLIB_DICTPATH test in configure.in (Bug 130130 -
181 * improved handling of the setcred/close_session and update chauthtok
182 stack. *Warning* This is a backwardly incompatable change, but 'more
183 sane' than before. (Bug 129775 - agmorgan)
184 * bumped the version number, and added some code to assist in making
185 documentation releases (Bug 129644 - agmorgan).
187 0.74: Sun Jan 21 22:36:08 PST 2001
189 * made 0.74 release (Bug 129642 - agmorgan)
190 * libpam - cleaned up a few non-static functions to be static and added
191 support for libpam to enforce things like pam_[gs]et_data() and
192 AUTHTOK rules for using the API. Also documented pam_[gs]et_item()
193 a little better including return codes (Bugs 129027, 128576 -
195 * pam_access - fixed the non-default config file option (Bug 127561 -
197 * pam.8 manual page clarified with respect to the default location for
198 finding modules, also added some text describing the [...] control
199 syntax. (Bug 127625 - agmorgan)
200 * md5.h ia64 fixes for pam_unix and pam_pwdb (Bug 127700 - agmorgan)
201 * removed requirement for c++ from the configure{.in,} files (Bug
203 * removed subdirectories from man page redirections (124396 - baggins)
204 * per David Lee, fixed non-POSIX shell command in modules/pam_filter/Makefile
205 (Bug 126440 - vorlon)
206 * modify format of pam_unix log messages to include service name
207 (Bug 126423 - vorlon)
208 * prevent pam_unix from logging unknown usernames (Bug 126431 - vorlon)
209 * changed format of pam_unix 'authentication failure' log messages to make
210 them clearer and more consistent (Bug 126036 - vorlon)
211 * improved portability of pam_unix by eliminating Linux-specific utmp
212 defines in PAM_getlogin() (Bug 125704 - vorlon)
213 * removed static variables from pam_tally (Bug 117434 - agmorgan)
214 * added copyright message to pam_access module from original logdaemon
215 sources (Bug 125022 - agmorgan)
216 * configure.in - removed the GCC -Wtraditional flag (Bug 124923 - agmorgan)
217 * pam_mail - use PAM_PATH_MAILDIR as the location of mail spool
218 (Bug 124397 - baggins)
219 * _pam_aconf.h.in, configure.in - added PAM_PATH_MAILDIR set via
220 --with-mailspool=dir option (default is _PAM_MAILDIR if defined
221 in paths.h otherwise /var/spool/mail (Bug 124397 - baggins)
222 * removed unnecessary CVS Log tags from all over the source
223 (Bug 124391 - baggins)
224 * pam_tally - check for PAM_TTY if PAM_RHOST is not set when writing
225 to faillog (Bug 124394 - baggins)
226 * use O_NOFOLLOW if available when opening debug log (Bug 124385 - baggins)
227 * pam_cracklib - removed comments about pam_unix not working with
228 pam_cracklib, added information about use_authtok parameter
229 (Bug 124388 - baggins)
230 * pam_userdb - fixed wrong definition of struct pam_module (was pam_wheel)
231 (Bug 124386 - baggins)
232 * fixed example/Makefile include path (Bug 124187, 127563(?) - agmorgan)
233 * pam_userdb compiles on RH5x. Also removed circular dependency on
234 configure.in. Also bumped revision number to 0.74. (Bug 124136 -
237 0.73: Sat Dec 2 00:04:04 PST 2000
239 * updated documentaion revisions and added 'make release' support
240 to the top level Makefile (Bug 124132 - agmorgan).
241 * documented Qmail support in pam_mail (Bug 109219 - baggins)
242 * add change_uid option to pam_limits, and set real uid only if
243 this option is present (Bug 124062 - baggins)
244 * pam_limits - set real uid to the user for who we set limits.
245 (Bug 123972 - baggins)
246 * removed static variables from pam_limits (thread safe now). (Bug
248 * removed static variable from pam_wheel (module should be thread safe
249 now). (Bug 112906 - agmorgan)
250 * added support for '/' symbols in pam_time and pam_group config files
251 (support for modern terminal devices). Fixed infinite loop problem
252 with '\\[^\n]' in these files. (Bug 116076 - agmorgan)
253 * avoid potential SIGPIPE when writing to helper binaries with (Bug
255 * replaced bogus logic in the pam_cracklib module for determining if
256 the replacement is too similar to the old password (Bug 115055 -
258 * added accessconf=<filename> feature to pam_access - request from
259 Aldrin Martoq and Meelis Roos (Bugs 111927,117240 - agmorgan)
260 * fix for pam_limit module not dealing with all limits Adam J. Richter
261 (Bug 119554 - agmorgan)
262 * comment fix describing fail_delay callback in _pam_types.h (Bug
264 * "likeauth" fix for pam_unix and pam_pwdb which (Bug 113596 - agmorgan)
265 * fix for pam_unix (support.c) to avoid segfault with NULL password
266 (Bug 113238 - vorlon)
267 * fix to pam_unix_passwd: try repeatedly to get a lock on the password
268 file, instead of failing immediately (Bug 108845 - fix vorlon)
269 * fix to pam_shells: logged information was not formatted correctly
270 (extra comma) (Bug 111491 - fix vorlon)
271 * fix for C++ application support (Bug 111645 - fix agmorgan)
272 * fix for typo in pam_client.h (Bug 111648 - fix agmorgan)
273 * removal of -lpam from pam_mkhomedir Makefile (Bug 116380 - fix agmorgan)
274 * autoconf support [Task ID 15788, Bug ID 108297 - agmorgan with help!]
275 - bugfix for libpamc.h include file [Bug ID 117476 - agmorgan]
276 - bugfix for pam_filter.h inclusion [Bug ID 117474 - agmorgan]
278 0.72: Mon Dec 13 22:41:11 PST 1999
280 * patches from Debian (Ben Collins): pam_ftp supports event driven
281 conversations now; pwdb_chkpwd cleanup; pam_warn static compile fix;
282 user_db compiler warnings removed; debian defs file; pam_mail can
283 now be used as a session module
284 * ndbm compilation option for user_db module (fix explained by Richard Khoo)
285 * pam_cracklib bug fix
286 * packaging fixes & build from scratch stuff (Konst Bulatnikov & Frodo
288 * -ldl appended to the libpam.so compilation make rule. (Charles Seeger)
289 * Red Hat security patch for pam_pwdb forwarded by Debian! (Ben
290 Collins. Fix provided by Andrey as it caught the problem earlier in the
292 * heuristic to prevent leaking filedescriptors to an agent. [This needs
293 to be better supported perhaps by an additional libpamc API function?]
294 * pam_userdb segfault fix from (Ben Collins)
295 * PAM draft spec extras added at request of 'sen_ml'
297 0.71: Sun Nov 7 20:21:19 PST 1999
299 * added -lc to linker pass for pam_nologin module (glibc is weird).
300 * various header changes to lower the number of warnings on glibc
301 systems (Dan Yefimov)
302 * merged a bunch of Debian fixes/patches/documentation (Ben Collins)
303 things touched: libpam (minor); doc/modules/pam_unix.sgml; pam_env
304 (plus docs); pam_mkhomedir (new module for new home directories on
305 the fly...); pam_motd (new module); pam_limits (adjust to match
306 docs); pam_issue (new module + doc) [Some of these were also
307 submitted by Thorsten Kukuk]
308 * small hack to lower the number of warnings that pam_client.h was
310 * debian and SuSE apparently can use the pam_ftp module, so
311 removed the obsolete comment about this from the docs. (Thorsten
314 0.70: Fri Oct 8 22:05:30 PDT 1999
316 * bug fix for parsing of value=action tokens in libpam/pam_misc.c was
317 segfaulting (Jan Rekorajski and independently Matthew Melvin)
318 * numerous fixes from Thorsten Kukuk (icluding much needed fixes for
319 bitrot in modules and some documentation) that got included in SuSE 6.2.
320 * reentrancy issues in pam_unix and pam_cracklib resolved (Jan Rekorajski)
321 * added hosts_equiv_rootok module option to pam_rhosts module (Tim Berger)
322 * added comment about 'expose_account' module argument to admin and
323 module writers' docs (request from Michael K Johnson).
324 * myriad of bug fixes for libpamc - library now built by default and
325 works with the biomouse fingerprint scanner agent/module
326 (distributed separately).
328 0.69: Sun Aug 1 20:25:37 PDT 1999
330 * c++ header #ifdef'ing for pam_appl.h (Tuomo Pyhala)
331 * added pam_userdb module (Cristian Gafton)
332 * minor documentation changes
333 * added in revised pam_client library (libpamc). Not installed by
334 default yet, since the example agent/module combo is not very secure.
335 * glibc fixes (Thorsten Kukuk, Adam J. Richter)
337 0.68: Sun Jul 4 23:04:13 PDT 1999
339 * completely new pam_unix module from Jan Rekorajski and Stephen Langasek
340 * Jan Rekorajski pam_mail - support for Maildir format mailboxes
341 * Jan Rekorajski pam_cracklib - support for old password comparison
342 * Jan Rekorajski bug fix for pam_pwdb setcred reusing auth retval
343 * Andrey's pam_tally patch (lstat -> fstat)
344 * Robert Milkowski's additional pam_tally patches to **change format of
345 /var/log/faillog** to one from shadow-utils, add new option "per_user"
346 for pam_tally module, failure time logging, support for fail_line
347 field, and support for fail_locktime field with new option
349 * pam_tally: clean up the tally application too.
350 * Marcin Korzonek added process priority settings to pam_limits (bonus
351 points for adding to documentation!)
352 * Andrey's pam_pwdb patch (cleanup + md5 endian fubar fix)
353 * more binary prompt preparations (make misc conv more compatible with spec)
354 * modified callback hook for fail delay to be more useful with event
355 driven applications (changed function prototype - suspect no one
356 will notice). Documented this in app developer guide.
357 * documentation for pam_access from Tim Berger
358 * syntax fixes for the documentation - a long time since I've built it :*(
359 added some more names to the CREDITS file.
361 0.67: Sat Jun 19 14:01:24 PDT 1999
363 * [dropped libpam_client - libpamc will be in the next release and
364 conforms to the developing spec in doc/specs/draft-morgan-pam.raw.
365 Sorry if you are keeping a PAM tree in CVS. CVS is a pain for
366 directories, but this directory was actually not referenced by
367 anything so the disruption should be light.]
368 * updates to pam_tally from Tim
369 * multiple updates from Stephen Langasek to pam_unix
370 * pam_filter had some trouble compiling (bug report from Sridhar)
371 * pam_wheel now attempts to identify the wheel group for the local
372 system instead of blindly assuming it is gid=0. In the case that
373 there is no "wheel" group, we default to assuming gid=0 is what was
374 meant - former behavior. (courtesy of Sridhar)
375 * NIS+ changes to pam_unix module from Dmitry O Panov
376 * hopefully, a fix for redefinition of LOG_AUTHPRIV (bug report Luke
377 Kenneth Casson Leighton)
378 * fix for minor typo in pam_wheel documentation (Jacek Kopecky)
379 * slightly more explanation of the [x=y] pam.conf syntax in the sys
382 0.66: Mon Dec 28 20:22:23 PST 1998 <morgan@linux.kernel.org>
384 * Started using cvs to keep track of changes to Linux-PAM. This will
385 likely break some of the automated building stuff (RPMs etc..).
386 * security bug fix to pam_unix and pam_tally from Andrey.
387 * modules make file is now more automatic. It should be possible to
388 unpack an external module in the modules directory and have it automatically
389 added to the build process. Also added a modules/download-all script
390 that will make such downloading easier. I'm happy to receive patches to
391 this file, informing the distribution of places from which to enrich itself.
392 * removed pam_system_log stuff. Thought about it long and hard: a
393 bad idea. If libc cannot guarantee a thread safe syslog, it needs
394 to be fixed and compatibility with other PAM libraries was
395 unnecessarily strained.
396 * SAG documentation changes: Seth Chaiklin
397 * rhosts: problems with NIS lookup failures with the root-uid check.
398 As a work-around, I've partially eliminated the need for the lookup
399 by supplying two new arguments: no_uid_check, superuser=<username>.
400 As a general rule this is more pluggable, since this module might be
401 used as an authentication scheme for a network service that does not
402 need root privilege...
403 * authenticate retval -> setcred for pam_pwdb (likeauth arg).
404 * pam_pwdb event driven support
405 * non openlog pam_listfile logging
406 * BUGFIX: close filedescriptor in pam_group and pam_time (Emmanuel Galanos)
407 * Chris Adams' mailhash change for pam_mail module
408 * fixed malloc failure check in pam_handlers.c (follow up to comment
410 * update to _pam_compat.h (Brad M. Garcia)
411 * support static modules in libpam again (Brad M. Garcia)
412 * libpam/pam_misc.c for egcs to grok the code (Brad M. Garcia)
413 * added a solaris-2.5.1 defs file (revived by Derrick J Brashear)
414 * pam_listfile logs failed attempts
415 * added a comment (Michael K Johnson pointed it out) about sgml2latex
416 having a new syntax. I'll make it the change real when I upgrade...
417 * a little more text to the RFC, spelling fix from William J Buffam.
418 * minor changes to pam_securetty to accommodate event driven support.
420 0.65: Sun Apr 5 22:29:09 PDT 1998 <morgan@linux.kernel.org>
422 * added event driven programming extensions to libpam
423 - added PAM_INCOMPLETE handling to libpam/pam_dispatch.c
424 - added PAM_CONV_AGAIN which is a new conversation response that
425 should be mapped to PAM_INCOMPLETE by the module.
426 - ensured that the pam_get_user() function can resume
427 - changes to pam_strerror to accommodate above return codes
428 - clean up _pam_former_state at pam_end()
429 - ensured that former state is correctly initialized
430 - added resumption tests to pam_authenticate(), pam_chauthtok()
431 - added PAM_FAIL_DELAY item for pausing on failure
433 * improved _pam_macros.h so that macros can be used as single commands
436 * reimplemented logging to avoid bad interactions with libc. Added
437 new functions, pam_[,v]system_log() to libpam's API. A programmer
438 can check for this function's availablility by checking if
439 HAVE_PAM_SYSTEM_LOG is #defined.
441 * removed the reduce conflict from pam_conv1 creation -- I can sleep
444 * made building of static and dynamic libpam separate. This is
445 towards making it possible to build both under Solaris (for Derrick)
447 * made USE_CRACKLIB a condition in unix module (Luke Kenneth Casson Leighton)
449 * automated (quiet) config installation (Andrey)
451 0.64: Thu Feb 19 23:30:24 PST 1998 Andrew Morgan <morgan@linux.kernel.org>
453 * miscellaneous patches for building under Solaris (Derrick J Brashear)
455 * removed STATIC support from a number of module Makefiles. Notably,
456 these modules are those that use libpwdb and caused difficulties
457 satisfying the build process. (Please submit patches to fix this...;)
459 * reomved the union for binary packet conversations from
460 (_pam_types.h). This is now completely implemented in libpam_client.
462 * Andrey's patch for working environment variable handling in
465 * made the libpam_misc conversation function a bit more flexible with
466 respect to binary conversations.
468 * added top level define (DEBUG_REL) for compiling in the form of
469 a debugging release. I use this on a Red Hat 4.2 system with little
470 chance of crashing the system as a whole. (Andrey has another
471 implementation of this -- with a spec file to match..)
473 0.63: Wed Jan 28 22:55:30 PST 1998 Andrew Morgan <morgan@linux.kernel.org>
475 * added libpam_client "convention" library. This makes explicit the
476 use of PAM_BINARY_PROMPT. It is a first cut, so don't take it too
477 seriously yet. Comments/suggestions for improvements are very
478 welcome. Note, this library does not compile by default. It will
479 be enabled when it is judged stable. The library comes with two
480 module/agent pairs and can be used with ssh using a patch available
481 from my pre-release directory [where you got this file.]
483 * backward compatibility patch for libpam/pam_handlers.c (PAM_IGNORE
484 was working with neither "requistie" nor "required") and a DEBUG'ing
485 compile time bug with pam_dispatch.c (Savochkin Andrey Vladimirovich)
487 * minor Makefile change from (Savochkin Andrey Vladimirovich)
489 * added pam_afsauth, pam_afspass, pam_restrict, and pam_syslog hooks
492 * pam_access use of uname(2) problematic (security problem
493 highlighted by Olaf Kirch).
495 * pam_listfile went a bit crazy reading group membersips (problem
496 highlighted by Olaf Kirch and patched independently by Cristian
497 Gafton and Savochkin Andrey Vladimirovich)
499 * compatibility hooks for solaris and hpux (Derrick J Brashear)
501 * 64 bit Linux/alpha bug fixed in pam_rhosts (Andrew D. Isaacson)
503 0.62: Wed Jan 14 14:10:55 PST 1998 Andrew Morgan <morgan@linux.kernel.org>
505 * Derrick J Brashear's patches: adds the HP stuff missed in the first
506 patch; adds SunOS support; adds support for the Solaris native ld
507 instead of requiring gnu ld.
509 * last line of .rhosts file need not contain a newline. (Bug reported by
512 0.61: Thu Jan 8 22:57:44 PST 1998 Andrew Morgan <morgan@linux.kernel.org>
514 * complete rewrite of the "control flag" logic. Formerly, we were
515 limited to four flags: requisite, required, sufficient, optional.
516 We can now use these keywords _and_ a great deal more besides.
517 The extra logic was inspired by Vipin Samar, a preliminary patch was
518 written by Andy Berkheimer, but I "had some ideas of my own" and
519 that's what I've actually included. The basic idea is to allow the
520 admin to custom build a control flag with a series of token=value
521 pairs inside square brackets. Eg., '[default=die success=ok]' which
522 is pretty close to a synonym for 'requisite'. I'll try to document it
523 better in the sys-admin guide but I'm pretty sure it is a change for
524 the better.... If what is in the sys-admin guide is not good enough
525 for you, just take a look at the source for libpam ;^)
527 0.59: Thu Jan 8 22:27:22 PST 1998 Andrew Morgan <morgan@linux.kernel.org>
529 * better handling of empty lines in .rhosts file. (Formerly, we asked
530 the nameserver about them!) Fix from Hugh Daschbach.
532 * _broke_some_binary_compatibility_ with previous versions to become
533 compliant with X/Open's XSSO spec. Specifically, this has been
534 by changing the prototype for pam_strerror().
536 * altered the convention for the conversation mechanism to agree
537 with that of Sun. (number of responses 'now=' number of messages
538 with help from Cristian for finding a bug.. Cristian also found a
539 nasty speradic segfault bug -- Thanks!)
541 * added NIS+ support to pam_unix_*
543 * fixed a "regular file checking" problem with the ~/.rhosts sanity
544 check. Added "privategroup" option to permit group write permission
545 on the ~/.rhosts file in the case that the group owner has the same
546 name as the authenticating user. :*) "promiscuous" and "suppress"
549 * added glibc compatibility to pam_rhosts_auth (protected __USE_MISC
550 with #ifndef since my libc already defines it!).
552 * Security fix from Savochkin Andrey Vladimirovich with suggested
553 modification from Olaf Seibert.
555 * preC contains mostly code clean-ups and a number of changes to
560 * pam_getenvlist() has a more robust definition (XSSO) than was previously
561 thought. It would seem that we no longer need pam_misc_copy_env()
562 which was there to provide the robustness that pam_getenvlist()
565 Accordingly, I have REMOVED the prototype from libpam_misc. (The
566 function, however, will remain in the library as a wrapper for
567 legacy apps, but will likely be removed from libpam_misc-1.0.) PLEASE
568 FIX YOUR APPS *BEFORE* WE GET THERE!
570 * Alexy Nogin reported garbage output from pam_env in the case of
571 a non-existent environment variable.
573 * 'fixed' pwdb compilation for pam_wheel. Not very cleanly
574 done.. Mmmm. Should really clean up the entire source tree...
576 * added prototypes for mapping functions
580 various constants have had there names changed. Numerical values have
581 been retained but be aware some source old modules/applications will
582 need to be fixed before recompilation.
586 * appended documentation to README for pam_rhosts module (Nicolai
589 * verified X/Open compatibility of header files - note, where we differ
590 it is at the level of compilation warnings and the use of 'const char *'
591 instead of 'char *'. Previously, Sun(X/open) have revised their spec
592 to be more 'const'-ervative in the light of comments from Linux-PAM
595 * Ooops! PAM_AUTHTOKEN_REQD should have been PAM_NEW_AUTHTOK_REQD.
597 changed: pam_pwdb(pam_unix_acct) (also bug fix for
598 _shadow_acct_mgmt_exp() return value), pam_stress,
599 libpam/pam_dispatch, blank, xsh.
601 * New: PAM_AUTHTOK_EXPIRED - password has expired.
603 * Ooops! PAM_CRED_ESTABLISH (etc.) should have been PAM_ESTABLISH_CRED
604 etc... (changed - this may break some people's modules - PLEASE TAKE
606 changed: pam_group, pam_mail, blank, xsh; module and appl
607 docs, pam_setcred manual page.
609 * renamed internal _pam_handle structure to be pam_handle as per XSSO.
611 * added PAM_RADIO_TYPE (for multiple choice input method). Also
612 added PAM_BINARY_{MSG,PROMPT} (for interaction out of sight of user
613 - this could be used for RSA type authentication but is currently
614 just there for experimental purposes). The _BINARY_ types are now
615 usable with hooks in the libpam_misc conversation function. Still
616 have to add PAM_RADIO_TYPE.
618 * added pam_access module (Alexei Nogin)
620 * added documentation for pam_lastlog. Also modified the module to
621 not (by default) print "welcome to your new account" when it cannot
622 find a utmp entry for the user (you can turn this on with the
625 * small correction to the pam_fail_delay manual page. Either the appl or
626 the modules header file will prototype this function.
628 * added "bigcrypt" (DEC's C2) algorithm(0) to pam_pwdb. (Andy Phillips)
630 * *BSD tweaking for various #include's etc. (pam_lastlog, pam_rhosts,
631 pam_wheel, libpam/pam_handlers). (Michael Smith)
633 * added configuration directory $SCONFIGED for module specific
636 * added two new "linked" man pages (pam.conf(8) and pam.d(8))
638 * included a reasonable default for /etc/pam.conf (which can be
639 translated to /etc/pam.d/* files with the pam_conv1 binary)
641 * fixed the names of the new configuration files in
642 conf/pam_conv1/pam_conv.y
646 * pam_lastlog fixed to handle UID in virgin part of /var/log/lastlog
647 (bug report from Ronald Wahl).
649 * grammar fix in pam_cracklib
651 * segfault avoided in pam_pwdb (getting user). Updating of passwords
652 that are directed to a "new" database are more robust now (bug noted
653 by Michael K. Johnson). Added "unix" module argument for migrating
654 passwords from another database to /etc/passwd. (documentation
655 updated). Removed "bad username []" warning for empty passwords -
656 on again if you supply the 'debug' module argument.
658 * ctrl-D respected in conversation function (libpam_misc)
660 * Removed -DPAM_FAIL_DELAY_ON from top-level Makefile. Nothing in
661 the distribution uses it. I guess this change happened a while
662 back, basically I'm trying to make the module parts of the
663 distribution "source compatible" with the RFC definition of PAM.
664 This implementation of PAM is a superset of that definition. I have
665 added the following symbols to the Linux-PAM header files:
667 PAM_DATA_SILENT (see _pam_types.h)
668 HAVE_PAM_FAIL_DELAY (see _pam_types.h)
669 PAM_DATA_REPLACE (see _pam_modules.h)
671 Any module (or application) that wants to utilize these features,
672 should check (#ifdef) for these tokens before using the associated
673 functionality. (Credit to Michael K. Johnson for pointing out my
674 earlier omission: not documenting this change :*)
676 * first stab at making modules more independent of full library
677 source. Modules converted:
683 * pam_env.c: #include <errno.h> added to ease GNU libc use. (Michael
686 * pam_unix_passwd fixes to shadow aging code (Eliot Frank)
688 * added README for pam_tally
690 0.57: Fri Apr 4 23:00:45 PST 1997 Andrew Morgan <morgan@parc.power.net>
692 * added "nodelay" argument to pam_pwdb. This can be used to turn off
693 the call to pam_fail_delay that takes effect when the user fails to
694 authenticate themself.
696 * added "suppress" argument to pam_rhosts_auth module. This will stop
697 printing the "rlogin failure message" when the user does not have a
700 * Extra fixes for FAKEROOT in Makefiles (Savochkin Andrey
703 * pam_tally added to tree courtesy of Tim Baverstock
705 * pam_rhosts_auth was failing to read NFS mounted .rhosts
706 files. (Fixed by Peter Allgeyer). Refixed and further enhanced
707 (netgroups) by Nicolai Langfeldt. [Credit also to G.Wilford for some
708 changes that were not actually included..]
710 * optional (#ifdef PAM_READ_BOTH_CONFS) support for parsing of pam.d/
711 AND pam.conf files (Elliot Lee).
713 * Added (and signed) Cristian's PGP key. (I've never met him, but I am
714 convinced the key belongs to the guy that is making the PAM rpms and
715 also producing libpwdb. Please note, I will not be signing anyone
716 else's key without a personal introduction..)
718 * fixed erroneous syslog warning in pam_listfile (Savochkin Andrey
719 Vladimirovich, whole file reformatted by Cristian)
721 * modified pam_securetty to return PAM_IGNORE in the case that the user's
722 name is not known to the system (was previously, PAM_USER_UNKNOWN). The
723 Rationale is that pam_securetty's sole purpose is to prevent superuser
724 login anywhere other than at the console. It is not its concern that the
725 user is unknown - only that they are _not_ root. Returning
726 PAM_IGNORE, however, insures that the pam_securetty can never be used to
727 "authenticate" a non-existent user. (Cristian Gafton with bug report from
730 * Modified pam_nologin to display the no-login message when the user
731 is not known. The return value in this case is still PAM_USER_UNKNOWN.
732 (Bug report from Cristian Gafton)
734 * Added NEED_LCKPWD for pam_unix/ This is used to define the locking
735 functions and should only be turned on if you don't have them in
738 * tidied up pam_lastlog and pam_pwdb: removed function that was never used.
740 * Note for package maintainers: I have added $(FAKEROOT) to the list of
741 environment variables. This should help greatly when you build PAM
742 in a subdirectory. I've gone through the tree and tried to make
743 everything compatible with it.
745 * added pam_env (courtesy of Dave Kinchlea)
747 * removed pam_passwd+ from the tree. It has not been maintained in a
748 long time and running a shell script was basically insecure. I've
749 indicated where you can pick up the source if you want it.
751 * #define HAVE_PAM_FAIL_DELAY . Applications can conditionally compile
752 with this if they want to see if the facility is available. It is
753 now always available. (corresponding compilation cleanups..)
755 * _pam_sanitize() added to pam_misc. It purges the PAM_AUTHTOK and
756 PAM_OLDAUTHTOK items. (calls replaced in pam_auth and pam_password)
758 * pam_rhosts now knows about the '+' entry. Since I think this is a
759 dangerous thing, I have required that the sysadmin supply the
760 "promiscuous" flag for it in the corresponding configuration file
763 * FULL_LINUX_PAM_SOURCE_TREE exported from the top level make file.
764 If you want to build a module, you can test for this to determine if
765 it should take its directions from above or supply default locations
766 for installation. Etc.
768 0.56: Sat Feb 15 12:21:01 PST 1997 <morgan@parc.power.net>
770 * pam_handlers.c can now interpret the pam.d/ service config tree:
771 - if /etc/pam.d/ exists /etc/pam.conf is IGNORED
772 (otherwise /etc/pam.conf is treated as before)
774 . config files are named (in lower case) by service-name
775 . config files have same syntax as /etc/pam.conf except
776 that the "service-name" field is not present. (there
777 are thus three manditory fields (and arguments are
780 module-type control-flag module-path optional-args...
784 * included conf/pam_conv1 for converting pam.conf to a pam.d/ version
785 1.0 directory tree. This program reads a pam.conf file on the
786 standard input stream and creates ./pam.d/ (in the local directory)
787 and fills it with ./pam.d/"service-name" files.
789 *> Note: It will fail if ./pam.d/ already exists.
791 PLEASE REPORT ANY BUGS WITH THIS CONVERSION PROGRAM... It currently
792 cannot retain comments from the old conf file, so take care to do this
793 by hand. Also, please email me with the fix that makes the
794 shift/reduce conflict go away...
796 * Added default module path to libpam for modules (see pam_handlers.c)
797 it makes use of Makfile defined symbol: DEFAULT_MODULE_PATH which is
798 inhereted from the defs/* variable $(SECUREDIR). Removed module
799 paths from the sample pam.conf file as they are no longer needed.
801 * pam_pwdb can now verify read protected passwords when it is not run
802 by root. This is via a helper binary that is setuid root.
804 * pam_permit now prompts for a username if it is not already determined
806 * pam_rhosts now honors "debug" and no longer hardwire's "root" as the
809 * pam_securetty now honors the "debug" flag
811 * trouble parsing extra spaces fixed in pam_time and pam_group
813 * added Michael K. Johnson's PGP key to the pgp.keys.asc list
815 * pam_end->env not being free()'d: fixed
817 * manuals relocated to section 3
819 * fixed bug in pam_mail.c, and enhanced to recognize '~' as a prefix
820 to indicate the $HOME of the user (courtesy David
821 Kinchlea). *Changed* from a "session" module to an "auth"
822 module. It cannot be used to authenticate a user, but it can be used
823 in setting credentials.
825 * fixed a stupid bug in pam_warn.. Only PAM_SERVICE was being read :*(
827 * pam_radius rewritten to exclusively make use of libpwdb. (minor fix
828 to Makefile for cleaning up - AGM)
830 * pam_limits extended to limit the total number of logins on a system
833 * libpam and libpam_misc use $(MAJOR_REL) and $(MINOR_REL) to set their
834 version numbers [defined in top level makefile]
836 * bugfix in sed command in defs/redhat.defs (AGM's fault)
838 * The following was related to a possibility of buffer overruns in
839 the syslogging code: removed fixed length array from syslogging
840 function in the following modules [capitalized the log identifier
841 so the sysadmin can "know" these are fixed on the local system],
843 pam_ftp, pam_stress, pam_rootok, pam_securetty,
844 pam_listfile, pam_shells, pam_warn, pam_lastlog
846 pam_unix_passwd (where it was definitely _not_ exploitable)
848 0.55: Sat Jan 4 14:43:02 PST 1997, Andrew Morgan <morgan@parc.power.net>
850 * added "requisite" control_flag to /etc/pam.conf syntax. [See
851 Sys. Admin. Guide for explanation] changes to pam_handlers.c
853 * completely new handling of garbled pam.conf lines. The modus
854 operandi now is to assume that any errors in the line are minor.
855 Errors of this sort should *most definitely* lead to the module
856 failing, however, just ignoring the line (as was the case
857 previously) can lead to gaping security holes(! Not foreseen by the
858 RFC). The "motivation" for the RFC's comments about ignoring garbled
859 lines is present in spirit in the new code: basically a garbled line
860 is treated like an instance of the pam_deny.so module.
861 changes to pam_handlers.c and pam_dispatch.c .
863 * patched libpam, to (a) call _pam_init_handlers from pam_start() and
864 (b) to log a text error if there are no modules defined for a given
865 service when a call to a module is requested. [pam_start() and
866 pam_dispatch() were changed].
868 * patched pam_securetty to deal with "/dev/" prefix on PAM_TTY item.
870 * reorganized the modules/Makefile to include *ALL* modules. It is now
871 the responsibility of the modules themselves to test whether they can
872 be compiled locally or not.
874 * modified pam_group to add to the getgroups() list rather than overwrite
875 it. [In the case of "HAVE_LIBPWDB" we use the pwdb_..() calls to
876 translate the group names.]. Module now pays attention to
879 * identified and removed bugs in field reading code of pam_time and
882 * Cristian's patches to pam_listfile module, corresponding change to
885 * I've discovered &ero; for sgml!
886 Added pam_time documentation to the admin guide.
888 * added manual pages: pam.8, pam_start.2(=pam_end.2),
889 pam_authenticate.2, pam_setcred.2, pam_strerror.2,
890 pam_open_session.2(=pam_close_session.2) and pam_chauthtok.2 .
894 - pam_mail (tells the user if they have any new mail
895 and sets their MAIL env variable)
896 - pam_lastlog (reports on the last time this user called
899 * new module hooks provided.
901 * added a timeout feature to the conversation function in
902 libpam_misc. Documented it in the application developers' guide.
904 * fixed bug in pam_misc_paste_env() function..
906 * slight modifications to wheel and rhosts writeup.
908 * more security issues added to module and application guides.
911 Things present but not mentioned in previous release (sorry)
913 * pam_pwdb module now resets the "last_change" entry before updating a
917 Sat Nov 30 19:30:20 PST 1996, Andrew Morgan <morgan@parc.power.net>
919 * added environment handling to libpam. involved change to _pam_types.h
920 also added supplementary functions to libpam_misc
922 * added pam_radius - Cristian
924 * slight speed up for pam_rhosts
926 * significantly enhanced sys-admin documentation (8 p -> 41 p in
927 PostScript). Added to other documentation too. Mostly the changes
928 in the other docs concern the new PAM-environment support, there is
929 also some coverage of libpam_misc in the App. Developers' guide.
931 * Cristian's patches to pam_limits and pam_pwdb. Fixing bugs. (MORE added)
933 * adopted Cristian's _pam_macros.h file to help with common macros and
934 debugging stuff, gone through tree tidying up debugging lines to use
937 - for consistency replaced DROP() with _pam_drop()
939 * commented memory debugging in top level makefile
941 * added the following modules
943 - pam_warn log information to syslog(3) about service application
944 - pam_ftp if user is 'ftp' then set PAM_RUSER/PAM_RHOST with password
945 (comment about nologin added to last release's notes)
947 * modified the pam_listfile module. It now declares a meaningful static
950 Sun Nov 10 13:26:39 PST 1996, Andrew Morgan <morgan@parc.power.net>
952 **PLEASE *RE*AMEND YOUR PERSONAL LINKS**
954 -------> http://parc.power.net/morgan/Linux-PAM/index.html <-------
956 **PLEASE *RE*AMEND YOUR PERSONAL LINKS**
958 A brief summary of what has changed:
960 * many modules have been modified to accomodate fixing the pam_get_user()
961 change. Please take note if you have a module in this distribution.
963 * pam_unix is now the pam_unix that Red Hat has been using and which
964 should be fairly well debugged.
966 - I've added some #ifdef's to make it compile for me, and also
967 updated it with respect to the libpam-0.53, so have a look at the
968 .../modules/pam_unix/Makefile to enable cracklib and shadow features
970 ** BECAUSE OF THIS, I cannot guarantee this code works as it **
971 ** did for Red Hat. Please test and report any problems. **
973 * the pam_unix of .52 (renamed to pam_pwdb) has been enhanced and made
974 more flexible with by implementing it with respect to the new
975 "Password Database Library" see
977 http://parc.power.net/morgan/libpwdb/index.html
979 modules included in this release that require this library to
980 function are the following:
982 - pam_pwdb (ne pam_unix-0.52 + some enhancements)
987 * Added some optional code for memory debugging. In order to support
988 this you have to enable MEMORY_DEBUG in the top level makefile and
989 also #define MEMORY_DEBUG in your applications when they are compiled.
990 The extra code resides in libpam (compiled if MEMORY_DEBUG is defined)
991 and the macros for malloc etc. are to be found at the end of
994 * used above code to locate two memory leaks in pam_unix module and two
995 in libpam (pam_handlers.h)
997 * pam_get_user() now sets the PAM_USER item. After reading the Sun
998 manual page again, it was clear that it should do this. Various
999 modules have been assuming this and now I have modified most of them
1000 to account for this change. Additionally, pam_get_user() is now
1001 located in the module include file; modules are supposed to be the
1002 ones that use it(!) [Note, this is explicitly contrary to the Sun
1003 manual page, but in the spirit of the Linux distribution to date.]
1005 * replaced -D"LINUX" with -D"LINUX_PAM" as this is more explicit and less
1006 likely to be confused with -D"linux".
1007 Also, modified the libpam #include files to behave more like the Sun
1008 ones #ifndef LINUX_PAM.
1010 * removed <bf/ .. / from documentation titles. This was not giving
1011 politically correct html..
1013 ----- My vvvvvvvvvvvvvvvvvvv was a long time ago ;*] -----
1015 Wed Sep 4 23:57:19 PDT 1996 (Andrew Morgan <morgan@physics.ucla.edu>
1017 0. Before I begin, Linux-PAM has a new primary distribution site (kindly
1018 donated by Power Net Inc., Los Angeles)
1020 **PLEASE AMMEND YOUR PERSONAL LINKS**
1022 -------> http://www.power.net/morgan/Linux-PAM <-------
1024 **PLEASE AMMEND YOUR PERSONAL LINKS**
1026 1. I'm hoping to make the next release a bug-fix release... So please find
1029 2. here are the changes for .52:
1031 * minor changes to module documentation [Incidently, it is now
1032 available on-line from the WWW page above]. More changes to follow in
1033 the next two releases. PLEASE EMAIL me or the list if there is
1034 anything that isn't clear!
1036 * completely changed the unix module. Now a single module for all four
1037 management groups (this meant that I could define all functions as
1038 static that were not part of the pam_sm_... scheme. AGM)
1040 - Shadow support added
1041 PASSWD - Elliot's account management included, and enhanced by Cristian Gafton.
1042 - MD5 password support added by Cristian Gafton.
1043 - maxtries for authentication now enforced.
1044 - Password changing function in pam_unix now works!
1045 Although obviously, I'm not going to *guarantee* it ;^) .
1046 - stole Marek's locking code from the Red Hat unix module.
1047 [ If you like you can #ifdef it in or out ... ]
1049 You can configure the module more from its Makefile in
1050 0.52/modules/pam_unix/
1052 If you are nervous that it will destroy your /etc/passwd or shadow
1053 files then EDIT the 0.52/modules/pam_unix/pam_unix_pass.-c file.
1054 Here is the warning comment from this file...
1056 -------------8<-----------------
1059 * Uncomment the following #define if you are paranoid, and do not
1060 * want to risk losing your /etc/passwd or shadow files.
1061 * It works for me (AGM) but there are no guarantees.
1065 /* #define TMP__FILE */
1066 ------------->8-----------------
1068 *** If anyone has any trouble, please *say*. Your problem will be
1069 fixed in the next release. Also please feel free to scour the
1070 code for race conditions etc...
1072 [* The above change requires that you purge your /usr/lib/security
1073 directory of the old pam_unix_XXX.so modules: they will NOT be deleted
1074 with a 'make remove'.]
1076 * the prototype for the cleanup function supplied to pam_set_data used
1077 to return "int". According to Sun it should be "void". CHANGED.
1079 * added some definitions for the 'error_status' mask values that are
1080 passed to the cleanup function associated with each
1081 module-data-item. These numbers were needed to keep up with changing
1082 a data item (see for example the code in pam_unix/support.-c that
1083 manages the maximum number of retries so far). Will see what Sun says
1084 (current indications are positive); this may be undone before 1.0 is
1085 released. Here are the definitions (from pam_modules.h).
1087 #define PAM_DATA_SILENT 0x40000000 /* used to suppress messages... */
1088 #define PAM_DATA_REPLACE 0x20000000 /* used when replacing a data item */
1090 * Changed the .../conf/pam.conf file. It now points to the new
1091 pam_unix module for 'su' and 'passwd' [can get these as SimpleApps --
1092 I use them for testing. A more extensive selection of applications is
1093 available from Red Hat...]
1095 * corrected a bug in pam_dispatch. Basically, the problem was that if
1096 all the modules were "sufficient" then the return value for this
1097 function was never set. The net effect was that _pam_dispatch_aux
1098 returned success when all the sufficient modules failed. :^( I think
1099 this is the correct fix to a problem that the Red Hat folks had
1102 sopwith* Removed advisory locking from libpam (thanks for the POSIX patch
1103 goes to Josh Wilmes's, my apologies for not using it in the
1104 end.). Advisory locking did not seem sufficiently secure for libpam.
1105 Thanks to Werner Almesberger for identifying the corresponding "denial
1106 of service attack". :*(
1108 * related to fix, have introduced a lock file /var/lock/subsys/PAM
1109 that can be used to indicate the system should pay attention to
1110 advisory locking on /etc/pam.conf file. To implement this you need to
1111 define PAM_LOCKING though. (see .52/libpam)
1113 * modified pam_fail_delay() function. Couldn't find the "not working"
1114 problem indicated by Michael, but modified it to do pseudo-random
1115 delays based on the values indicated by pam_fail_delay() -- the
1116 function "that may eventually go away"... Although Sun is warming to
1119 * new modules include:
1121 pam_shells - authentication for users with a shell listed in
1122 /etc/shells. Erik Troan <ewt@redhat.com>
1124 pam_listfile - authentication based on the contents of files.
1125 Set to be more general than the above in the
1126 future. UNTESTED. Elliot Lee <@redhat.com>
1127 [Note, this module compiles with a non-trivial
1130 Thu Aug 8 22:32:15 PDT 1996 (Andrew Morgan <morgan@physics.ucla.edu>)
1132 * modified makefiles to take more of their installation instructions
1133 from the top level makefile. Desired for integration into the Debian
1134 distribution, and generally a good idea.
1136 * fixed memory arithmetic in pam_handlers
1137 -- still need to track down why failure to load modules can lead to
1138 authentication succeding..
1140 * added tags for new modules (smartcards from Alex -- just a promise
1141 at this stage) and a new module from Elliot Lee; pam_securetty
1143 * I have not had time to smooth out the wrinkles with it, but Alex's
1144 pam_unix modifications are provided in pam_unix-alex (in the modules
1145 directory) they will not be compiled by 'make all' and I can't even
1146 say if they do compile... I will try to look at them for .52 but, in
1147 the mean time please feel free to study/fix/discuss what is there.
1149 * pam_rhosts module. Removed code for manually setting the ruser
1150 etc. This was not very secure.
1152 * [remade .ps docs to be in letter format -- my printer complains
1155 Sunday July, 7 12:45:00 PST 1996 (Andrew Morgan <morgan@physics.ucla.edu>)
1157 * No longer accompanying the Linux-PAM release with apps installed.
1158 [Will provide what was here in a separate package.. (soon)
1159 lib Also see http://www.redhat.com/pam for some more (in .rpm form...)]
1161 * renamed libmisc to libpam_misc. It is currently configured to only compile
1162 the static library. For some strange reason (perhaps someone can
1163 investigate) my Linux 2.0.0 kernel with RedHat 3.0.3 system
1164 segfaults when I compile it to be a dynamic library. The segfault
1165 seems to be inside the call to the ** dl_XXX ** function...!?
1167 There is a simple flag in the libpam_misc/Makefile to turn on dynamic
1170 * Added a little unofficial code for delay support in libpam (will probably
1171 disappear later..) There is some documentation for it in the pam_modules
1172 doc now. That will obviously go too.
1174 * rewritten pam_time to use *logic* to specify the stringing together of
1175 users/times/terminals etc.. (what was there before was superficially
1176 logical but basically un-predictable!)
1178 * added pam_group. Its syntax is almost identical to pam_time but it
1179 has another field added; a list of groups to make the user a member
1180 of if they pass the previous tests. It seems to not co-exist too well
1181 with the groups in the /etc/group but I hope to have that fixed by
1184 * minor re-formatting of pam_modules documentation
1186 * removed ...// since it wasn't being used and didn't look like it
1189 GCCSunday 23 22:35:00 PST 1996 (Andrew Morgan <morgan@physics.ucla.edu>)
1191 * The major change is the addition of a new module: pam_time for
1192 restricting access on terminals at given times for indicated users
1193 it comes with its own configuration file /etc/security/time.conf
1194 and the sample file simply restricts 'you' from satisfying the blank
1195 application if they try to use blank from any tty*
1197 * Small changes include
1198 - altered pam.conf to demonstrate above new module (try typing username: you)
1199 - very minor changes to the docs (pam_appl and pam_modules)
1201 Saturday June 2 01:40:00 PST 1996 (Andrew Morgan <morgan@physics.ucla.edu>)
1203 *** PLEASE READ THE README, it has changed ***
1205 * NOTE, 'su' exhibits a "system error", when static linking is
1206 used. This is because the pam_unix_... module currently only has
1207 partial static linking support. This is likely to change on Monday
1208 June 3, when Alex makes his latest version availible. I will include
1209 the updated module in next release.
1213 * modified the way in which libpam/pam_modules.h defines prototypes for
1214 the pam_sm_ functions. Now the module must declare which functions it
1215 is to provide *before* the #include <security/pam_modules.h> line.
1216 (for contrasting examples, see the pam_deny and pam_rootok modules)
1217 This removed the ugly hack of defining functions that are never called
1218 to overcome warnings... This seems much tidier.
1219 insterted* updated the TODO list. (changed mailing list address)
1220 * updated README in .../modules to reflect modifications to static
1221 compliation protocol
1222 * modified the pam_modules documentation to describe this.
1223 * corrected last argument of pam_get_item( ... ) in
1224 pam_appl/modules.sgml, to "const void **".
1225 * altered GNU GPL's in the documentation, and various other parts of
1226 the distribution. *Please check* that any code you are responsible for
1228 * Added ./Copyright (please check that it is acceptable)
1229 * updated ./README to make current and indicate the new mailing list
1231 * have completely rewritten pam_filter. It now runs modular filter
1232 executables (stored in /usr/sbin/pam_filter/) This should make it
1233 trivial for others to write their own filters.. If you want yours
1234 included in the distribution please email the list/me.
1235 * changes to libpam; there was a silly bug with multiple arguments on a
1236 pam.conf line that was broken with a '\<LF>'.
1237 * 'su' rearranged code (to make better use of PAM)
1238 *Also* now uses POSIX signals--this should help the Alpha port.
1239 * 'passwd' now uses getlogin() to determine who's passwords to change.
1241 Sunday May 26 9:00:00 PST 1996 (Andrew Morgan <morgan@physics.ucla.edu>)
1243 * fixed module makefiles to create needed dynamic/static subdirectories
1245 Saturday May 25 20:30:27.8 PST 1996 (Andrew Morgan <morgan@physics.ucla.edu>)
1247 * LOTS has changed regarding how the modules/libpam are built.
1248 * Michael's mostly complete changes for static support--see below
1249 (Andrew got a little carried away and automated the static linking
1250 of modules---bugs are likely mine ;( )
1251 * Thanks mostly to Michael, libpam now compiles without a single warning :^]
1252 * made static modules/library optional.
1253 CFLAGS* added 'make sterile' to top level makefile. This does extraclean and remove
1254 * added Michael and Joseph to documentation credits (and a subsection for
1255 future documentation of static module support in pam_modules.sgml)
1256 * libpam; many changes to makefiles and also automated the inclusion of
1257 static module objects in pam_static.c
1258 * modified modules for automated static/dynamic support. Added static &
1259 dynamic subdirectories, as instructed by Michael
1260 * removed an annoying syslog message from pam_filter: "parent exited.."
1261 * updated todo list (anyone know anything about svgalib/X? we probably should
1262 have some support for these...)
1264 Friday May 24 16:30:15 EDT 1996 (Michael K. Johnson <johnsonm@redhat.com>)
1266 * Added first (incomplete) cut at static support.
1268 . changes in libpam, including a new file, pam_static.c
1269 . changes to modules including exporting struct of function pointers
1270 . static and dynamic linking can be combined
1271 . right now, the only working combinations are just dynamic
1272 linking and dynamic libpam.so with static modules linked
1273 into libpam.so. That's on the list of things to fix...
1274 . modules are built differently depending on whether they
1275 are static or dynamic. Therefore, there are two directories
1276 under each module directory, one for static, and one for
1278 * Fixed random brokenness in the Makefiles. [ foo -nt bar ] is
1279 rather redundant in a makefile, for instance. Also, passing
1280 on the command line is broken because it cannot be
1281 overridden in any way (even adding important parts) in lower-level
1283 * Unfortunately, fixing some of the brokenness meant that I used
1284 GNU-specific stuff. However, I *think* that there was GNU-specific
1285 stuff already. And I think that we should just use the GNU
1286 extensions, because any platform that GNU make doesn't port to
1287 easily will be hard to port to anyway. It also won't be likely
1288 passwd to handle autoconf, which was Ted's suggestion for getting
1289 around limitations in standard make...
1290 For now, I suggest that we just use some simple GNU-specific
1293 Monday May 20 22:00:00 PST 1996 (Andrew Morgan <morgan@physics.ucla.edu>)
1295 * added some text to pam_modules.sgml
1296 * corrected Marek's name in all documentation
1297 * made pam_stress conform to chauthtok conventions -- ie can now request
1298 old password before proceeding.
1299 * included Alex's latest unix module
1300 * included Al's + password strength checking module
1301 * included pam_rootok module
1302 * fixed too many bugs in libpam.. all subtly related to the argument lists
1303 or use of syslog. Added more debugging lines here too.
1304 * fixed the pam.conf file
1305 * deleted pam_test module. It is pretty old and basically superceeded
1308 Friday May 9 1:00:00 PST 1996 (Andrew Morgan <morgan@physics.ucla.edu>)
1310 * updated documentaion, added Al Longyear to credits and corrected the
1311 spelling of Jeff's name(!). Most changes to pam.sgml (even added a figure!)
1312 * new module pam_rhosts_auth (from Al Longyear)
1313 * new apps rlogind and ftpd (a patch) from Al.
1314 * modified 'passwd' to not call pam_authenticate (note, none of the
1315 modules respect this convention yet!)
1316 * fixed bug in libpam that caused trouble if the last line of a
1317 pam.conf file ends with a module name and no newline character
1318 * also made more compatable with documentation, in that bad lines in
1319 pam.conf are now ignored rather than causing libpam to return an
1321 * libpam now overwrites the AUTHTOKs when returning from
1322 pam_authenticate and pam_chauthtok calls (as per Sun/RFC too)
1323 * libpam is now installed as libpam.so.XXX in a way that ldconfig can
1327 Wednesday May 1 22:00:00 PST 1996 (Andrew Morgan <morgan@physics.ucla.edu>)
1329 * removed .../test directory, use .../examples from now on.
1330 * added .../apps directory for fully functional applications
1331 - the apps directory contains directories that actually contain the apps.
1332 the idea is to make application compilation conditional on the presence
1333 of the directory. Note, there are entries in the Makefile for
1334 'login' and 'ftpd' that are ready for installation... Email me if
1335 you want to reserve a directory name for an application you are
1337 * similar changes to .../modules makefile [entries for pam_skey and
1338 pam_kerberos created---awaiting the directories.] Email me if you
1339 want to register another module...
1340 * minor changes to docs.. Not really worth reprinting them quite yet!
1342 * added misc_conv to libmisc. it is a generic conversation function
1343 for text based applications. [would be nice to see someone create
1344 an Xlib and/or svgalib version]
1345 * fixed ctrl-z/c bug with pam_filter module [try xsh with the default
1347 * added 'required' argument to 'pam_stress' module.
1348 * added a TODO list... other suggestions to the list please.
1350 Saturday April 7 00:00:00 PST 1996 ( Andrew Morgan <morgan@physics.ucla.edu> )
1352 * Alex and Marek please note I have altered _pam_auth_unix a little, to
1353 make it get the passwords with the "proper method" (and also fixed it
1354 to not have as many compiler warnings)
1355 * updated the conf/pam.conf file
1356 * added new example application examples/xsh.c (like blank but invokes
1358 * Marc's patches for examples/blank.c (and AGM's too)
1359 * fixed stacking of modules in libpam/pam_handlers.c
1360 * fixed RESETing in libpam/pam_item.c
1361 * added new module modules/pam_filter/ to demonstrate the possibility
1362 of inserting an arbitrary filter between the terminal and the
1363 application that could do customized logging etc... (see use of
1364 bin/xsh as defined in conf/pam.conf)
1367 Saturday March 16 19:00:00 PST 1996 ( Andrew Morgan <morgan@physics.ucla.edu> )
1369 These notes are for 0.3 I don't think I've left anything important
1370 out, but I will use emacs 'C-x v a' next time! (Thanks Jeff)
1372 * not much has changed with the functionality of the Linux-PAM lib
1374 - pam_password calls module twice with different arguments
1375 - added const to some of the function arguments
1376 - added PAM_MAX_MES_ to <security/_pam_types.h>
1377 - was a lot over zealous about purging old passwords...
1378 I have removed much of this from source to make it
1379 more compatible with SUN.
1380 - moved some PAM_... tokens to pam_modules.h from _pam_types.h
1381 (no-one should notice)
1383 * added three modules: pam_permit pam_deny pam_stress
1384 no prizes for guessing what the first two do. The third is
1385 a reasonably complete (functional) module. Is intended for testing
1388 * fixed a few pieces of examples/blank.c so that it works (with
1391 * ammended the documentation. Looking better, but suggestions/comments
1394 Sunday March 10 10:50:00 PST 1996 ( Andrew Morgan <morgan@physics.ucla.edu> )
1396 These notes are for Linux-PAM release 0.21. They cover what's changed
1397 since I relased 0.2.
1400 * substantially changed ./README
1401 * fixed bug reading \\\n in pam.conf file
1402 * small changes to documentation
1403 * added `blank' application to ./examples (could be viewed as
1404 a `Linux-PAM aware' application template.)
1405 * oops. now including pam_passwd.o and pam_session.o in pamlib.so
1406 * compute md5 checksums for all the source when making a release
1407 - added `make check' and `make RCScheck' to compute md5 checksums
1408 * create a second tar file with all the RCS files in.
1409 * removed the .html and .txt docs, supplying sgml sources instead.
1410 - see README for info on where to get .ps files
1412 Thursday March 6 0:44:?? PST 1996 ( Andrew Morgan <morgan@physics.ucla.edu> )
1414 These notes are for Linux-PAM release 0.2. They cover what's changed
1415 since Marc Ewing relased 0.1.
1417 **** Please note. All of the directories in this release have been modified
1418 **** slightly to conform to the new pamlib. A couple of new directories have
1419 **** been added. As well as some documentation. If some of your code
1420 **** was in the previous release. Feel free to update it, but please
1421 **** try to conform to the new headers and Makefiles.
1423 * Andrew Morgan (morgan@physics.ucla.edu) is making this release
1424 availible, Marc has been busy...!
1426 * Marc's pam-0.1/lib has been (quietly) enhanced and integrated into
1427 Alex Yurie's collected tree of library and module code
1428 (linux-pam.prop.1.tar.gz). Most of the changes are to do with error
1429 checking. Some more robustness in the reading of the pam.conf file
1430 and the addition of the pam_get_user() function.
1432 * The pam_*.h files have been reorganized to logically enforce the
1433 separation of modules from applications. [Don't panic! Apart from
1434 changing references of the form
1436 #include "pam_appl.h"
1440 #include <security/pam_appl.h>
1442 The reorganization should be backwardly compatable (ie. a module
1443 written for SUN will be as compatable as it was before with the
1444 previous version ;)~ ]
1446 (All of the source in this tree now conforms to this scheme...)
1448 The new reorganization means that modules can be compiled with a
1449 single header, <security/pam_modules.h>, and applications with
1450 <security/pam_appl.h>.
1452 * I have tried to remove all the compiler warnings from the updated
1453 "pamlib/*.c" files. On my system, (with a slightly modified <dlfcn.h>
1454 email me if it interests you..) there are only two warnings that
1455 remain: they are that ansi does not permit void --> fn ptr
1456 assignment. K&Rv2 doesn't mention this....? As a matter of principle,
1457 if anyone knows how to get rid of that warning... please
1458 tell. Thanks! "-pedantic"
1460 * you can "make all" as a plain user, but
1462 * to "make install" you must be root. The include files are placed in
1463 /usr/include/security. The libpam.so library is installed in /usr/lib
1464 and the modules in /usr/lib/security. The two test binaries
1465 are installed in the Linux-PAM-0.2/bin directory and a chance is given to
1466 replace your /etc/pam.conf file with the one in Linux-PAM-0.2/conf.
1468 * I have included some documentation (pretty preliminary at the
1469 moment) which I have been working on in .../doc .
1471 I have had a little trouble with the modules, but atleast there are no
1472 segfaults! Please try it out and discuss your results... I actually
1473 hope it all works for you. But, Email any bugs/suggestions to the
1474 Linux-PAM list: linux-pam@mit.edu .....
1479 (morgan@physics.ucla.edu)
1482 Sat Feb 17 17:30:24 EST 1996 (Alexander O. Yuriev alex@bach.cis.temple.edu)
1484 * conf directory created with example of pam_conf
1485 * stable code from pam_unix is added to modules/pam_unix
1486 * test/test.c now requests username and password and attempts
1487 to perform authentication