File: AUTOLOGIN

package info (click to toggle)
fireflier 1.1.6-3etch1
  • links: PTS
  • area: main
  • in suites: etch
  • size: 3,348 kB
  • ctags: 1,167
  • sloc: sh: 9,023; cpp: 8,370; makefile: 437; ansic: 300
file content (43 lines) | stat: -rw-r--r-- 1,843 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
enabling autologin:

first of all - you should know, that a feature like autologin can
be a security risk. As long as the client is running on a fully 
trusted machine you shouldn't have problem though.

autologin can be done by supplying a file to the clients (only qt, kde, gtk),
where you put the username and password on differnt lines:
example: /home/username/secrect/mypass.pwd
----------------------------
username
password
----------------------------
(dont include the ---)
then call fireflier-client-xxx -a /home/username/secret/mypass.pwd
ensure that mypass.pwd is only readable by you:
chown username /home/username/secret/mypass.pwd
chmod 600 /home/username/secret/mypass.pwd

AS PUTTING YOUR SYSTEM ACCOUNT PASSWORD INTO A FILE IS
DISCOURAGED, I URGE YOU TO USE A SYSTEM LIKE libpam-pwdfile.

libpam-pwdfile enables you to use a different passsword for
fireflier access than for your system login
setting it up:
example /etc/pam.d/fireflier:
----------------------------------
auth            required        pam_listfile.so file=/etc/fireflier/fireflier.users onerr=fail sense=allow item=user
auth            sufficient      /lib/security/pam_pwdfile.so pwdfile /etc/fireflier/fireflier.passwords
auth            required        pam_unix.so nullok
account         required        pam_unix.so
session         required        pam_unix.so
password        required        pam_unix.so
----------------------------------

/etc/fireflier/fireflier.passwords should contain the new username/password
entries in the same format as /etc/passwd (or /etc/shadow).
The system passwords will still work with the example pam configuration.

you can generate encrypted passwords by using the script at:
http://eclipse.che.uct.ac.za/chpwdfile (see libpam-pwdfile documentation)

if you have any problem setting this up, feel free to contact us.