Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Insecure PAM configuration for u2f devices #278

Open
koskev opened this issue Aug 17, 2024 · 0 comments
Open

Insecure PAM configuration for u2f devices #278

koskev opened this issue Aug 17, 2024 · 0 comments

Comments

@koskev
Copy link

koskev commented Aug 17, 2024

File: [u2f/linux/desktop-login.rst] https://docs.nitrokey.com/u2f/linux/desktop-login.html

The nitrokey documentation states that nouserok ensures that one can still use a password to login. However, the documentation for nouserok states:

Set to enable authentication attempts to succeed even if the user trying to authenticate is not found inside authfile or if authfile is missing/malformed.

Therefore by using nouserok in combination with sufficient one can login without any authentication for users that are not in the authfile. Including root. In this case just having sufficient is enough to still be able to authenticate with a password only.

To test his just switch to a different tty with CTRL + ALT + F2, type "root" as the user and you'll have a root shell without providing any authentication.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant