-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
systemd --user instance doesn't inherit user's session keyring #14
Comments
We use the session keyring. That keyring is inherited by child processes. Unlike the user and user session keyrings, it is not bound to a UID and can not be used by arbitrary sessions of the same user. As far as I remember, using the session keyring was the only possibility to get the module to work properly (keys in other keyrings would be ignored), but I could well be mistaken. At least the It could well be that This module will probably be of no use for solving this problem. You could try to link the keys to a user keyring using TL;DR: his is clearly outside the scope of this module. Anyways, good luck. |
Just quick recap after I found solution:
User keyring So, finally I had to disable |
Hm, I just thinked about it:
You wrote that you can't use other keyrings within So we end up with keys in both user and session keyrings which should be easier to manage. |
@seebaclo could you publish your service file? I'm trying to do something similiar and this would really help me. |
I don't know if it can help you but I'm using this file to force systemd to inherit keys (in Ubuntu /etc/systemd/system/service_name.service.d/customexec.conf):
|
Thanks for the hint. Maybe I should add this to the README. |
Systemd --user instance which is started through pam_systemd.so module doesn't use user's session keyring so all user services don't have access to encrypted files. I already reported it upstream but it looks like a design choice which breaks many types of authentication. I don't know if pam_e4crypt could help with this linking keys from user keyring to systemd-user keyring or add keys to system-user keyring directly.
The text was updated successfully, but these errors were encountered: