File: README.pam

package info (click to toggle)
diald 0.99.4-9
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 1,148 kB
  • ctags: 935
  • sloc: ansic: 7,109; tcl: 977; sh: 880; perl: 306; makefile: 109
file content (18 lines) | stat: -rw-r--r-- 921 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
      Pluggable Authentication Modules (PAM)
      ======================================
      
Full authentication based on UNIX user names and user groups and login 
passwords is now supported on monitor links. This is of most importance
to TCP monitor links which were previously very weakly protected.

To use PAM authentication, you need to inform diald of the location of the 
group security permissions file with the "authpam" configuration option. An
example security file is provided in "config/auth.pam".


*NOTE* In common with many other network password authentication systems,
the password is transmitted over the network in unencrypted plain text
format. The implications are that if your physical network is not secure, it
is possible for intruders to intercept your passwords. The risk can be
minimised by using the tcp_wrappers capability to restrict access to
machines on the local area network only.