Re: gnome-devel-list digest, Vol 1 #590 - 16 msgs
- From: Heeten <azari geo yahoo com>
- To: gnome-devel-list gnome org, ben kalifornia com
- Subject: Re: gnome-devel-list digest, Vol 1 #590 - 16 msgs
- Date: Fri, 31 Aug 2001 07:08:58 -0700 (PDT)
Doh, I hadn't read this before I sent my last reply :)
The way GDM works right now is that is uses the
chooser which is the GUI front end to get the
Username/password, and sends it to the backend, which
talks to PAM. If you replace the chooser with
something that handles voice rec and can figure out
which user is trying to login, then it'll work with
the gdm backend pretty easily. You could also modify
the chooser to work with both methods too, which is
prolly the better way to go if possible. The chooser
is a one file program, so it's not really that big.
Heeten
> Message: 11
> Date: Thu, 30 Aug 2001 19:24:47 -0700
> From: Ben Ford <ben kalifornia com>
> To: gnome-devel-list gnome org
> Subject: Re: Speaker verification prototype ready
>
> Heeten wrote:
>
> >I think it would be better to try to make it a pam
> >module. If you really want to try and get it into
> gdm
> >and not use pam, you should probally talk to George
> >Lebl <jirka 5z com> first.
> >
> >Heeten
> >
>
> I propose rather that it be BOTH. A plugin for PAM
> to do the
> authentication and a plugin for GDM that would do
> the gui representation
> of it. I haven't looked at GDM code, but it may
> take some work to make
> it modular in this way. We discussed this briefly
> back in May. This is
> a quote of my proposal at that time:
>
> -----------start quote
> The subject came up a while ago of adding voice
> authentication to GDM.
> It was decided that GDM needed to be patched.
>
> I have a different suggestion. Keep in mind that I
> have not looked at
> the GDM code, so I have no way of knowing whether my
> proposal will be
> straightforward or a total rewrite.
>
> I propose that we make GDM modular, in a sense, it
> can be the graphical
> equivilant of PAM. We shouldn't * replace* PAM,
> that should still do
> the core authentication. This is only for the
> graphical representation
> of the user/pass challenges or their equivilants
> (voice ID, retina
> print, thumbprint, DNA sample, etc).
>
> What do you guys think of this? I don't think it's
> been done for Linux
> yet, and that is one thing that keeps Linux off
> corporate desktops. My
> CEO would use a Linux desktop if his thumb scanner
> would work on it.
> -----------end quote
>
> -b
>
>
> --
> Number of restrictions placed on "Alice in
> Wonderland" (public domain)
> eBook: 5
>
> Maximum penalty for reading "Alice in Wonderland"
> aloud (possible DMCA
> violation): 5 years jail
>
> Average sentence for commiting Rape: 5 years
__________________________________________________
Do You Yahoo!?
Get email alerts & NEW webcam video instant messaging with Yahoo! Messenger
http://im.yahoo.com
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]