pam_timestamp_check
Check to see if the default timestamp is valid
Synopsis
pam_timestamp_check
[-k] [-d] [target_user]
add an example, a script, a trick and tips
examples
auth sufficient pam_timestamp.so verbose
auth required pam_unix.so
session required pam_unix.so
session optional pam_timestamp.so
description
With no
arguments pam_timestamp_check will check to see if
the default timestamp is valid, or optionally remove it.
options
-k
Instead of checking the
validity of a timestamp, remove it. This is analogous to
sudo's -k option.
-d
Instead of returning validity
using an exit status, loop indefinitely, polling regularly
and printing the status on standard output.
target_user
By default
pam_timestamp_check checks or removes timestamps
generated by pam_timestamp when the user
authenticates as herself. When the user authenticates as a
different user, the name of the timestamp file changes to
accommodate this. target_user allows to specify this
user name.
files
/var/run/sudo/...
timestamp files and directories
notes
Users can get confused when they are not always asked for
passwords when running a given program. Some users reflexively
begin typing information before noticing that it is not being
asked for.
return values
0
The timestamp is valid.
2
The binary is not setuid root.
3
Invalid invocation.
4
User is unknown.
5
Permissions error.
6
Invalid controlling tty.
7
Timestamp is not valid.
see also
pam_timestamp_check,
pam.conf, pam.d, pam
author
pam_tally was
written by Nalin Dahyabhai.