Update PAM and PAM modules

Bug #1916509 reported by Ryan Chase
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
pam (Ubuntu)
Fix Released
Undecided
Simon Chopin

Bug Description

I want to implement pam_faillock which replaces pam_tally2 but requires pam version >= 1.4.0
The ability to 'reliably' lock accounts after a certain number of failed attempts is a requirement of the NIST 800-171 controls implemented by many U.S. government agencies and contractors.

Related branches

Revision history for this message
Simon Chopin (schopin) wrote (last edit ):

I worked on the merge from the current Debian version. Attached is the debdiff from the current Debian version, I'll post the debdiff from the current Ubuntu version shortly.

I've uploaded the package to my PPA, see https://launchpad.net/~schopin/+archive/ubuntu/test-ppa/+sourcepub/12642827/+listing-archive-extra

Changed in pam (Ubuntu):
assignee: nobody → Simon Chopin (schopin)
status: New → In Progress
Revision history for this message
Simon Chopin (schopin) wrote :

Here's the diff from the Ubuntu branch, much more massive as it includes the upstream diff...

tags: added: fr-1604
Revision history for this message
Simon Chopin (schopin) wrote :

Deleting attachments as they're superseded by these new versions. First the diff against Ubuntu, followed by the one against Debian for reference.

Revision history for this message
Simon Chopin (schopin) wrote :
Revision history for this message
Simon Chopin (schopin) wrote :

Removed request for sponsors, submitting MP against the packaging Git repo instead.

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package pam - 1.4.0-10ubuntu1

---------------
pam (1.4.0-10ubuntu1) jammy; urgency=medium

  * Merge from Debian unstable (LP: #1916509). Remaining changes:
    - debian/control: have libpam-modules recommend update-motd package
    - debian/libpam-modules.postinst: Add PATH to /etc/environment if it's
      not present there or in /etc/security/pam_env.conf. (should send to
      Debian).
    - debian/libpam0g.postinst: only ask questions during update-manager when
      there are non-default services running.
    - debian/libpam0g.postinst: check if gdm is actually running before
      trying to reload it.
    - debian/patches-applied/ubuntu-rlimit_nice_correction: Explicitly
      initialise RLIMIT_NICE rather than relying on the kernel limits.
    - debian/patches-applied/pam_umask_usergroups_from_login.defs.patch:
      Deprecate pam_unix's explicit "usergroups" option and instead read it
      from /etc/login.def's "USERGROUP_ENAB" option if umask is only defined
      there. This restores compatibility with the pre-PAM behaviour of login.
    - debian/patches-applied/pam_motd-legal-notice: display the contents of
      /etc/legal once, then set a flag in the user's homedir to prevent
      showing it again.
    - debian/update-motd.5, debian/libpam-modules.manpages: add a manpage
      for update-motd, with some best practices and notes of explanation.
    - debian/patches/update-motd-manpage-ref: add a reference in pam_motd(8)
      to update-motd(5)
    - debian/local/common-session{,-noninteractive}: Enable pam_umask by
      default, now that the umask setting is gone from /etc/profile.
    - debian/local/pam-auth-update: Add the new md5sums for pam_umask addition.
    - debian/patches-applied/extrausers.patch: Add a pam_extrausers module
      that is basically just a copy of pam_unix but looks at
      /var/lib/extrausers/{group,passwd,shadow} instead of /etc/
    - debian/libpam-modules-bin.install: install the helper binaries for
      pam_extrausers to /sbin
    - debian/rules: Make pam_extrausers_chkpwd sguid shadow
    - Add lintian override for pam_extrausers_chkpwd
    - Disable custom daemon restart detection code if needrestart is available
    - d/libpam-modules.postinst: Add /snap/bin to $PATH in /etc/environment
  * Dropped changes, obsoleted:
    - pam_motd: Export MOTD_SHOWN=pam after showing MOTD
    - Return only PAM_IGNORE or error from pam_motd
    - Fix patches to fix FTBFS
    - Backport pam_faillock module from pam 1.4.0
    - debian/patches-applied/nullok_secure-compat.patch: Support
      nullok_secure as a deprecated alias for nullok.
    - debian/pam-configs/unix: use nullok, not nullok_secure.
  * Patches:
    - d/p/pam_motd-legal-notice: refreshed
    - Refreshed d/p/pam_umask_usergroups_from_login.defs.patch to use
      pam_modutil_search_key instead of our own hand-rolled version
    - d/p/extrausers.patch: Refreshed the patch and fixed the
      HAVE_LIBSELINUX conditional removed upstream.
  * d/local/pam-auth-update: refreshed the md5sum for debian/local/common-session

 -- Simon Chopin <email address hidden> Tue, 26 Oct 2021 10:49:14 +0200

Changed in pam (Ubuntu):
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.