Blame SOURCES/pam-1.3.1-tty-audit-manfix.patch

43d219
From e31dd6c7d0faa7a06d3ebd50a0b6957b9f822d15 Mon Sep 17 00:00:00 2001
43d219
From: Tomas Mraz <tmraz@fedoraproject.org>
43d219
Date: Wed, 7 Aug 2019 18:13:57 +0200
43d219
Subject: [PATCH] pam_tty_audit: Manual page clarification about password
43d219
 logging
43d219
43d219
* modules/pam_tty_audit/pam_tty_audit.8.xml: Explanation why passwords
43d219
can be sometimes logged even when the option is not set.
43d219
---
43d219
 modules/pam_tty_audit/pam_tty_audit.8.xml | 7 +++++++
43d219
 1 file changed, 7 insertions(+)
43d219
43d219
diff --git a/modules/pam_tty_audit/pam_tty_audit.8.xml b/modules/pam_tty_audit/pam_tty_audit.8.xml
43d219
index 59a3406..e346c68 100644
43d219
--- a/modules/pam_tty_audit/pam_tty_audit.8.xml
43d219
+++ b/modules/pam_tty_audit/pam_tty_audit.8.xml
43d219
@@ -149,6 +149,13 @@
43d219
       greater than or equal to <replaceable>min_uid</replaceable> will be
43d219
       matched.
43d219
     </para>
43d219
+    <para>
43d219
+      Please note that passwords in some circumstances may be logged by TTY auditing
43d219
+      even if the <option>log_passwd</option> is not used. For example, all input to
43d219
+      an ssh session will be logged - even if there is a password being typed into
43d219
+      some software running at the remote host because only the local TTY state
43d219
+      affects the local TTY auditing.
43d219
+    </para>
43d219
   </refsect1>
43d219
 
43d219
   <refsect1 id='pam_tty_audit-examples'>
43d219
-- 
43d219
2.20.1
43d219