pam_timestamp_check — Check to see if the default timestamp is valid
Synopsis
Description
With no arguments pam_timestamp_check will check to see if the default timestamp is valid, or optionally remove it.
Options
- -k
Instead of checking the validity of a timestamp, remove it. This is analogous to sudo's -k option.
- -d
Instead of returning validity using an exit status, loop indefinitely, polling regularly and printing the status on standard output.
- target_user
By default pam_timestamp_check checks or removes timestamps generated by pam_timestamp when the user authenticates as herself. When the user authenticates as a different user, the name of the timestamp file changes to accommodate this. target_user allows to specify this user name.
Return Values
- 0
The timestamp is valid.
- 2
The binary is not setuid root.
- 3
Invalid invocation.
- 4
User is unknown.
- 5
Permissions error.
- 6
Invalid controlling tty.
- 7
Timestamp is not valid.
Notes
Users can get confused when they are not always asked for passwords when running a given program. Some users reflexively begin typing information before noticing that it is not being asked for.
Examples
auth sufficient pam_timestamp.so verbose auth required pam_unix.so session required pam_unix.so session optional pam_timestamp.so
Files
- /var/run/sudo/...
timestamp files and directories
See Also
pam_timestamp_check(8), pam.conf(5), pam.d(5), pam(8)
Referenced By
pam-panel-icon(1), pam_timestamp(8).