'\" t .\" Title: pam_keyinit .\" Author: [see the "AUTHOR" section] .\" Generator: DocBook XSL Stylesheets v1.78.1 .\" Date: 09/19/2013 .\" Manual: Linux-PAM Manual .\" Source: Linux-PAM Manual .\" Language: English .\" .TH "PAM_KEYINIT" "8" "09/19/2013" "Linux-PAM Manual" "Linux\-PAM Manual" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ .\" http://bugs.debian.org/507673 .\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ .ie \n(.g .ds Aq \(aq .el .ds Aq ' .\" ----------------------------------------------------------------- .\" * set default formatting .\" ----------------------------------------------------------------- .\" disable hyphenation .nh .\" disable justification (adjust text to left margin only) .ad l .\" ----------------------------------------------------------------- .\" * MAIN CONTENT STARTS HERE * .\" ----------------------------------------------------------------- .SH "NAME" pam_keyinit \- Kernel session keyring initialiser module .SH "SYNOPSIS" .HP \w'\fBpam_keyinit\&.so\fR\ 'u \fBpam_keyinit\&.so\fR [debug] [force] [revoke] .SH "DESCRIPTION" .PP The pam_keyinit PAM module ensures that the invoking process has a session keyring other than the user default session keyring\&. .PP The session component of the module checks to see if the process\*(Aqs session keyring is the user default, and, if it is, creates a new anonymous session keyring with which to replace it\&. .PP If a new session keyring is created, it will install a link to the user common keyring in the session keyring so that keys common to the user will be automatically accessible through it\&. .PP The session keyring of the invoking process will thenceforth be inherited by all its children unless they override it\&. .PP This module is intended primarily for use by login processes\&. Be aware that after the session keyring has been replaced, the old session keyring and the keys it contains will no longer be accessible\&. .PP This module should not, generally, be invoked by programs like \fBsu\fR, since it is usually desirable for the key set to percolate through to the alternate context\&. The keys have their own permissions system to manage this\&. .PP This module should be included as early as possible in a PAM configuration, so that other PAM modules can attach tokens to the keyring\&. .PP The keyutils package is used to manipulate keys more directly\&. This can be obtained from: .PP \m[blue]\fBKeyutils\fR\m[]\&\s-2\u[1]\d\s+2 .SH "OPTIONS" .PP \fBdebug\fR .RS 4 Log debug information with \fBsyslog\fR(3)\&. .RE .PP \fBforce\fR .RS 4 Causes the session keyring of the invoking process to be replaced unconditionally\&. .RE .PP \fBrevoke\fR .RS 4 Causes the session keyring of the invoking process to be revoked when the invoking process exits if the session keyring was created for this process in the first place\&. .RE .SH "MODULE TYPES PROVIDED" .PP Only the \fBsession\fR module type is provided\&. .SH "RETURN VALUES" .PP PAM_SUCCESS .RS 4 This module will usually return this value .RE .PP PAM_AUTH_ERR .RS 4 Authentication failure\&. .RE .PP PAM_BUF_ERR .RS 4 Memory buffer error\&. .RE .PP PAM_IGNORE .RS 4 The return value should be ignored by PAM dispatch\&. .RE .PP PAM_SERVICE_ERR .RS 4 Cannot determine the user name\&. .RE .PP PAM_SESSION_ERR .RS 4 This module will return this value if its arguments are invalid or if a system error such as ENOMEM occurs\&. .RE .PP PAM_USER_UNKNOWN .RS 4 User not known\&. .RE .SH "EXAMPLES" .PP Add this line to your login entries to start each login session with its own session keyring: .sp .if n \{\ .RS 4 .\} .nf session required pam_keyinit\&.so .fi .if n \{\ .RE .\} .PP This will prevent keys from one session leaking into another session for the same user\&. .SH "SEE ALSO" .PP \fBpam.conf\fR(5), \fBpam.d\fR(5), \fBpam\fR(8)\fBkeyctl\fR(1) .SH "AUTHOR" .PP pam_keyinit was written by David Howells, \&. .SH "NOTES" .IP " 1." 4 Keyutils .RS 4 \%http://people.redhat.com/~dhowells/keyutils/ .RE