summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDiego Elio Pettenò <flameeyes@gentoo.org>2005-06-03 18:02:25 +0000
committerDiego Elio Pettenò <flameeyes@gentoo.org>2005-06-03 18:02:25 +0000
commit1b7fd570400a0c498f04e522e684799eed4b7309 (patch)
tree25175df2ab1de29a5aff3275cecba45f91a65f56 /sys-apps/shadow/files
parentStable on sparc (diff)
downloadgentoo-2-1b7fd570400a0c498f04e522e684799eed4b7309.tar.gz
gentoo-2-1b7fd570400a0c498f04e522e684799eed4b7309.tar.bz2
gentoo-2-1b7fd570400a0c498f04e522e684799eed4b7309.zip
New revision depending on virtual/pam and using include syntax. Fixes OpenPAM and AMD64 compatibility.
(Portage version: 2.0.51.22-r1)
Diffstat (limited to 'sys-apps/shadow/files')
-rw-r--r--sys-apps/shadow/files/digest-shadow-4.0.7-r21
-rw-r--r--sys-apps/shadow/files/pam.d-include/login12
-rw-r--r--sys-apps/shadow/files/pam.d-include/other9
-rw-r--r--sys-apps/shadow/files/pam.d-include/passwd5
-rw-r--r--sys-apps/shadow/files/pam.d-include/shadow8
-rw-r--r--sys-apps/shadow/files/pam.d-include/su32
-rw-r--r--sys-apps/shadow/files/pam.d-include/su-openpam14
-rw-r--r--sys-apps/shadow/files/pam.d-include/system-auth14
-rw-r--r--sys-apps/shadow/files/pam.d-include/system-auth-1.114
9 files changed, 109 insertions, 0 deletions
diff --git a/sys-apps/shadow/files/digest-shadow-4.0.7-r2 b/sys-apps/shadow/files/digest-shadow-4.0.7-r2
new file mode 100644
index 000000000000..57cfe54be85e
--- /dev/null
+++ b/sys-apps/shadow/files/digest-shadow-4.0.7-r2
@@ -0,0 +1 @@
+MD5 89ebec0d1c0d861a5bd5c4c63e5cb0cc shadow-4.0.7.tar.bz2 1019749
diff --git a/sys-apps/shadow/files/pam.d-include/login b/sys-apps/shadow/files/pam.d-include/login
new file mode 100644
index 000000000000..9d2167793cc5
--- /dev/null
+++ b/sys-apps/shadow/files/pam.d-include/login
@@ -0,0 +1,12 @@
+#%PAM-1.0
+
+auth required pam_securetty.so
+auth include system-auth
+auth required pam_nologin.so
+
+account include system-auth
+
+password include system-auth
+
+session include system-auth
+session optional pam_console.so
diff --git a/sys-apps/shadow/files/pam.d-include/other b/sys-apps/shadow/files/pam.d-include/other
new file mode 100644
index 000000000000..bb0b9647c076
--- /dev/null
+++ b/sys-apps/shadow/files/pam.d-include/other
@@ -0,0 +1,9 @@
+#%PAM-1.0
+
+auth required pam_deny.so
+
+account required pam_deny.so
+
+password required pam_deny.so
+
+session required pam_deny.so
diff --git a/sys-apps/shadow/files/pam.d-include/passwd b/sys-apps/shadow/files/pam.d-include/passwd
new file mode 100644
index 000000000000..3a9871522066
--- /dev/null
+++ b/sys-apps/shadow/files/pam.d-include/passwd
@@ -0,0 +1,5 @@
+#%PAM-1.0
+
+auth include system-auth
+account include system-auth
+password include system-auth
diff --git a/sys-apps/shadow/files/pam.d-include/shadow b/sys-apps/shadow/files/pam.d-include/shadow
new file mode 100644
index 000000000000..743b2f0260d6
--- /dev/null
+++ b/sys-apps/shadow/files/pam.d-include/shadow
@@ -0,0 +1,8 @@
+#%PAM-1.0
+
+auth sufficient pam_rootok.so
+auth required pam_permit.so
+
+account include system-auth
+
+password required pam_permit.so
diff --git a/sys-apps/shadow/files/pam.d-include/su b/sys-apps/shadow/files/pam.d-include/su
new file mode 100644
index 000000000000..d15c7edfc5d9
--- /dev/null
+++ b/sys-apps/shadow/files/pam.d-include/su
@@ -0,0 +1,32 @@
+#%PAM-1.0
+
+auth sufficient pam_rootok.so
+
+# If you want to restrict users begin allowed to su even more,
+# create /etc/security/suauth.allow (or to that matter) that is only
+# writable by root, and add users that are allowed to su to that
+# file, one per line.
+#auth required pam_listfile.so item=ruser sense=allow onerr=fail file=/etc/security/suauth.allow
+
+# Uncomment this to allow users in the wheel group to su without
+# entering a passwd.
+#auth sufficient pam_wheel.so use_uid trust
+
+# Alternatively to above, you can implement a list of users that do
+# not need to supply a passwd with a list.
+#auth sufficient pam_listfile.so item=ruser sense=allow onerr=fail file=/etc/security/suauth.nopass
+
+# Comment this to allow any user, even those not in the 'wheel'
+# group to su
+auth required pam_wheel.so use_uid
+
+auth include system-auth
+
+account include system-auth
+
+password include system-auth
+
+session include system-auth
+session required pam_env.so
+session optional pam_xauth.so
+
diff --git a/sys-apps/shadow/files/pam.d-include/su-openpam b/sys-apps/shadow/files/pam.d-include/su-openpam
new file mode 100644
index 000000000000..e9ec7d3dd295
--- /dev/null
+++ b/sys-apps/shadow/files/pam.d-include/su-openpam
@@ -0,0 +1,14 @@
+#%PAM-1.0
+
+auth sufficient pam_rootok.so
+
+auth include system-auth
+
+account include system-auth
+
+password include system-auth
+
+session include system-auth
+session required pam_env.so
+session optional pam_xauth.so
+
diff --git a/sys-apps/shadow/files/pam.d-include/system-auth b/sys-apps/shadow/files/pam.d-include/system-auth
new file mode 100644
index 000000000000..b7c37afdad1f
--- /dev/null
+++ b/sys-apps/shadow/files/pam.d-include/system-auth
@@ -0,0 +1,14 @@
+#%PAM-1.0
+
+auth required pam_env.so
+auth sufficient pam_unix.so likeauth nullok nodelay
+auth required pam_deny.so
+
+account required pam_unix.so
+
+password required pam_cracklib.so retry=3
+password sufficient pam_unix.so nullok md5 shadow use_authtok
+password required pam_deny.so
+
+session required pam_limits.so
+session required pam_unix.so
diff --git a/sys-apps/shadow/files/pam.d-include/system-auth-1.1 b/sys-apps/shadow/files/pam.d-include/system-auth-1.1
new file mode 100644
index 000000000000..795f0fe723f0
--- /dev/null
+++ b/sys-apps/shadow/files/pam.d-include/system-auth-1.1
@@ -0,0 +1,14 @@
+#%PAM-1.0
+
+auth required /lib/security/pam_env.so
+auth sufficient /lib/security/pam_unix.so likeauth nullok
+auth required /lib/security/pam_deny.so
+
+account required /lib/security/pam_unix.so
+
+password required /lib/security/pam_cracklib.so retry=3
+password sufficient /lib/security/pam_unix.so nullok md5 shadow use_authtok
+password required /lib/security/pam_deny.so
+
+session required /lib/security/pam_limits.so
+session required /lib/security/pam_unix.so