GNU bug report logs - #37405
[PATCH] Services: Check and modify gdm-password in pam-limits

Previous Next

Package: guix-patches;

Reported by: Jesse Gibbons <jgibbons2357 <at> gmail.com>

Date: Sat, 14 Sep 2019 23:11:02 UTC

Severity: normal

Tags: patch

To reply to this bug, email your comments to 37405 AT debbugs.gnu.org.

Toggle the display of automated, internal messages from the tracker.

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to guix-patches <at> gnu.org:
bug#37405; Package guix-patches. (Sat, 14 Sep 2019 23:11:02 GMT) Full text and rfc822 format available.

Acknowledgement sent to Jesse Gibbons <jgibbons2357 <at> gmail.com>:
New bug report received and forwarded. Copy sent to guix-patches <at> gnu.org. (Sat, 14 Sep 2019 23:11:02 GMT) Full text and rfc822 format available.

Message #5 received at submit <at> debbugs.gnu.org (full text, mbox):

From: Jesse Gibbons <jgibbons2357 <at> gmail.com>
To: guix-patches mailing list <guix-patches <at> gnu.org>
Subject: [PATCH] Services: Check and modify gdm-password in pam-limits
Date: Sat, 14 Sep 2019 17:10:14 -0600
[Message part 1 (text/plain, inline)]
Fixes bug #37380
[0001-Services-Check-and-modify-gdm-password-in-pam-limits.patch (text/x-patch, attachment)]

Information forwarded to guix-patches <at> gnu.org:
bug#37405; Package guix-patches. (Thu, 19 Sep 2019 02:47:02 GMT) Full text and rfc822 format available.

Message #8 received at 37405 <at> debbugs.gnu.org (full text, mbox):

From: Jesse Gibbons <jgibbons2357 <at> gmail.com>
Cc: 37405 <at> debbugs.gnu.org
Subject: [bug#37405] [PATCH] Services: Check and modify gdm-password in
 pam-limits
Date: Wed, 18 Sep 2019 20:46:17 -0600
ping
https://lists.gnu.org/archive/html/guix-patches/2019-09/msg00357.html




Information forwarded to guix-patches <at> gnu.org:
bug#37405; Package guix-patches. (Wed, 25 Sep 2019 15:49:02 GMT) Full text and rfc822 format available.

Message #11 received at 37405 <at> debbugs.gnu.org (full text, mbox):

From: Jesse Gibbons <jgibbons2357 <at> gmail.com>
To: 37405 <at> debbugs.gnu.org
Subject: Re: [bug#37405] [PATCH] Services: Check and modify gdm-password in
 pam-limits
Date: Wed, 25 Sep 2019 09:47:53 -0600
On Wed, 2019-09-18 at 20:46 -0600, Jesse Gibbons wrote:
> ping
> https://lists.gnu.org/archive/html/guix-patches/2019-09/msg00357.html
ping




Information forwarded to guix-patches <at> gnu.org:
bug#37405; Package guix-patches. (Tue, 01 Oct 2019 23:01:02 GMT) Full text and rfc822 format available.

Message #14 received at 37405 <at> debbugs.gnu.org (full text, mbox):

From: Danny Milosavljevic <dannym <at> scratchpost.org>
To: Jesse Gibbons <jgibbons2357 <at> gmail.com>
Cc: 37405 <at> debbugs.gnu.org
Subject: Re: [bug#37405] [PATCH] Services: Check and modify gdm-password in
 pam-limits
Date: Wed, 2 Oct 2019 01:00:32 +0200
[Message part 1 (text/plain, inline)]
Hi,

thanks for the patch.

I'm not thrilled about that approach (arguably Guix already does it wrong
anyway).

But since the manual of pam_limits does describe that one should use it
like that, I have applied it as a stop-gap fix to guix master as
commit 0bf7d34d77ffca40be9e04586195054e9f2c7a13.

Long term, we should really make pam entries first class and show up in the
operating-system record--that's what they are FOR: to let the administrator
(and thus the organization) choose how they want to do user
authorization/session handling etc.  Why do we decide for them?

Bug report kept open for obvious reasons.
[Message part 2 (application/pgp-signature, inline)]

Information forwarded to guix-patches <at> gnu.org:
bug#37405; Package guix-patches. (Wed, 02 Oct 2019 14:54:01 GMT) Full text and rfc822 format available.

Message #17 received at 37405 <at> debbugs.gnu.org (full text, mbox):

From: Jesse Gibbons <jgibbons2357 <at> gmail.com>
To: Danny Milosavljevic <dannym <at> scratchpost.org>
Cc: 37405 <at> debbugs.gnu.org
Subject: Re: [bug#37405] [PATCH] Services: Check and modify gdm-password in
 pam-limits
Date: Wed, 02 Oct 2019 08:53:24 -0600
On Wed, 2019-10-02 at 01:00 +0200, Danny Milosavljevic wrote:
> Hi,
> 
> thanks for the patch.
> 
> I'm not thrilled about that approach (arguably Guix already does it wrong
> anyway).
I think you should start a thread on the guix-devel list expressing your
concerns, and we can discuss how to improve guix from there.
> 
> But since the manual of pam_limits does describe that one should use it
> like that, I have applied it as a stop-gap fix to guix master as
> commit 0bf7d34d77ffca40be9e04586195054e9f2c7a13.
Thanks!
> 
> Long term, we should really make pam entries first class and show up in
> the
> operating-system record--that's what they are FOR: to let the
> administrator
> (and thus the organization) choose how they want to do user
> authorization/session handling etc.
If PAM configurations should be up to the administrator, there should be
documentation to teach the administrator how to use them. The manual doesn't
say anything about how to use pam-services in operating-system, so I
submitted a bug report (bug #37583) requesting documentation.

> Why do we decide for them?
I think I agree with your point that if a non-default configuration is
desired, administrators should be able to  modify it, just like any other
part of the configuration. Ideally they can always opt-out of details they
don't want.

I do not agree that we are deciding for the admins. This is just like the
discussion about whether GuixSD should include the /usr/bin/env and /bin/sh
special files by default, except there isn't any documentation on how to
opt out of or extend the default PAM services.

There must be a default for every detail. If a detail is found practical
most of the time, I think it is good to either have it as a default (like
/usr/bin/sh) or have a ready example of how to implement it viewable from
the install environment (like what we do with desktop environments) so most
users don't have to look up how to add it. That does not negate the ability
of power users and administrators to opt out in the operating-system
configuration.

In the context of this patch, pam-limits is still opt-in. Perhaps a more
flexible fix would be to make the pam-limits-service-type accept an optional
list of strings identifying the configurations to create or modify to use
pam-limits, with the default being  %default-pam-limits-service-names
defined as '("login" "su") which could then be appended to %slim-pam-
service-names '("slim") or %gdm-pam-service-names '("gdm-password" ...). If
you or anyone else wants to implement that proposal and update the
documentation so admins will know how to configure it, feel free.

I hope I did not misunderstand your comments. We can discuss this and your
other concerns in a guix-devel thread.
-- 
-Jesse




This bug report was last modified 5 years and 255 days ago.

Previous Next


GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.