A variety of graphical administrative tools under Red Hat Enterprise Linux give users
elevated privileges for up to five minutes via the
pam_timestamp.so module. It is important to
understand how this mechanism works because a user who walks away from a
terminal while pam_timestamp.so is in effect leaves
the machine open to manipulation by anyone with physical access to the
console.
Under the PAM timestamp scheme, the graphical administrative application
prompts the user for the root password when it is launched. Once
authenticated, the pam_timestamp.so module creates
a timestamp file within the /var/run/sudo/
directory by default. If the timestamp file already exists, other
graphical administrative programs do not prompt for a
password. Instead, the pam_timestamp.so module
freshens the timestamp file — reserving an extra five minutes of
unchallenged administrative access for the user.
The existence of the timestamp file is denoted by an authentication icon
in the notification area of the panel. Below is an illustration of the
authentication icon:
It is recommended that before walking away from a console where a PAM
timestamp is active, the timestamp file be destroyed. To do this from
within a graphical environment, click on the authentication icon on
the panel. When a dialog box appears, click on the Forget
Authorization button.
If logged into a system remotely using ssh, use the
/sbin/pam_timestamp_check -k root command to destroy the
timestamp file.
| Note |
---|
| You must be logged in as the user who originally invoked the
pam_timestamp.so module in order to use the
/sbin/pam_timestamp_check command. Do not log in
as root to issue this command.
|
For information about destroying the timestamp file using
pam_timestamp_check, refer to the
pam_timestamp_check man page.
The pam_timestamp.so module accepts several
directives. Below are the two most commonly used options:
timestamp_timeout — Specifies the number of seconds the
during which the timestamp file is valid (in seconds). The default
value is 300 seconds (five minutes).
timestampdir — Specifies the directory
in which the timestamp file is stored. The default value is
/var/run/sudo/.
For more information about controlling the
pam_timestamp.so module, refer to Section 16.8.1 Installed Documentation.