You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Would it be possible to expose the pubkey the user was authenticated with?
I am considering writing a setgid program that authenticates the user (using PAM) before atomically modifying an authorized_keys file (in a location the user cannot otherwise write to) and it would be quite nice to check they aren't removing the key they used to authenticate (and potentially locking themselves out)
The most straightforward way to communicate that information would be through the PAM environment but pam-bindings does not seem to (currently) provide a binding for pam_setenv (and pam_getenv)
The text was updated successfully, but these errors were encountered:
I guess the alternative would be to implement the agent-auth logic within that program, either in an ad-hoc way, or exposing the necessary functionality from pam_rssh and using it as a normal Rust lib.
Would it be possible to expose the pubkey the user was authenticated with?
I am considering writing a
setgid
program that authenticates the user (using PAM) before atomically modifying anauthorized_keys
file (in a location the user cannot otherwise write to) and it would be quite nice to check they aren't removing the key they used to authenticate (and potentially locking themselves out)The most straightforward way to communicate that information would be through the PAM environment but
pam-bindings
does not seem to (currently) provide a binding forpam_setenv
(andpam_getenv
)The text was updated successfully, but these errors were encountered: