-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Module to Require Password as Well as Touch ID for Sudo #7
Comments
🙂 Sounds like a cool idea. I suspect the best course of action here would be to add more options to the I actually don't know very much about how PAM works though, so that's the biggest blocker to me spending time working on this. If you can tell me what changes need to be made to |
This is what
The important snippet:
The way I understand it is that PAM goes through each line making sure each module that is set to BIG DRAWBACK:One huge drawback I just now discovered while writing this up is that it seems that This isn't an issue in your original configuration because you set To address this drawback, a solution I have found is installing a third party PAM module: https://github.com/biscuitehh/pam-watchid And then configuring
This would require a password and then if This drawback and workaround make things a bit more complicated than I initially realized so I completely understand if this is something you'd rather not implement altogether. At this point, I may just write this all myself because I doubt many users will care to have something like this. Hopefully I conveyed all of this in a way that makes sense. :) |
Thanks for the details. Given the complexities here, is seem to me like the best path forward would be to take inspiration from NixOS's |
First off, thanks for sharing your great nix-darwin setup. Your contributions to nix-darwin, especially the Homebrew module, have been awesome for me! So thanks.
So I love the idea of using Nix-darwin to manage my Touch ID PAM setup. One suggestion I would love implemented would be to add a module to require a password as well Touch ID -- not just Touch ID. That way, sudo auth would be multi factor.
I could see how not everyone would want this, so I could understand maybe making a separate module for this instead of making it the default behavior of security.pam.enableSudoTouchIdAuth.
I am pretty much going to bed right now but I will give it a bit more thought on how I would implement it. I may try to submit a pull request except I suck at Nix's syntax so I thought I'd write up an issue before I tried anything (I am definitely passively hoping you get around to implementing this before I even try anything ;).
The text was updated successfully, but these errors were encountered: