1 .\" Copyright (c) 2001 Mark R V Murray
2 .\" All rights reserved.
3 .\" Copyright (c) 2002 Networks Associates Technology, Inc.
4 .\" All rights reserved.
6 .\" Portions of this software were developed for the FreeBSD Project by
7 .\" ThinkSec AS and NAI Labs, the Security Research Division of Network
8 .\" Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035
9 .\" ("CBOSS"), as part of the DARPA CHATS research program.
11 .\" Redistribution and use in source and binary forms, with or without
12 .\" modification, are permitted provided that the following conditions
14 .\" 1. Redistributions of source code must retain the above copyright
15 .\" notice, this list of conditions and the following disclaimer.
16 .\" 2. Redistributions in binary form must reproduce the above copyright
17 .\" notice, this list of conditions and the following disclaimer in the
18 .\" documentation and/or other materials provided with the distribution.
19 .\" 3. The name of the author may not be used to endorse or promote
20 .\" products derived from this software without specific prior written
23 .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
24 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
27 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
50 The OPIE authentication service module for PAM,
52 provides functionality for only one PAM category:
53 that of authentication.
56 parameter, this is the
59 It also provides a null function for session management.
61 Note that this module does not enforce
64 There is a separate module,
65 .Xr pam_opieaccess 8 ,
67 .Ss OPIE Authentication Module
68 The OPIE authentication component
69 provides functions to verify the identity of a user
70 .Pq Fn pam_sm_authenticate ,
71 which obtains the relevant
74 It provides the user with an OPIE challenge,
75 and verifies that this is correct with
78 The following options may be passed to the authentication module:
79 .Bl -tag -width ".Cm auth_as_self"
82 debugging information at
86 This option will require the user
87 to authenticate himself as the user
90 not as the account they are attempting to access.
91 This is primarily for services like
93 where the user's ability to retype
95 might be deemed sufficient.
96 .It Cm no_fake_prompts
97 Do not generate fake challenges for users who do not have an OPIE key.
98 Note that this can leak information to a hypothetical attacker about
99 who uses OPIE and who does not, but it can be useful on systems where
100 some users want to use OPIE but most do not.
105 ignores the standard options
109 since a challenge must be generated before the user can submit a valid
112 .Bl -tag -width ".Pa /etc/opiekeys" -compact
114 default OPIE password database.
119 .Xr opiechallenge 3 ,