| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
Signed-off-by: Mikle Kolyada <zlogene@gentoo.org>
|
|
|
|
| |
Signed-off-by: Mikle Kolyada <zlogene@gentoo.org>
|
|
|
|
| |
Signed-off-by: Mikle Kolyada <zlogene@gentoo.org>
|
|
|
|
|
|
| |
This reverts commit 4a97472903679c7d85ca391aeedaea3ce7797acf.
Signed-off-by: Mikle Kolyada <zlogene@gentoo.org>
|
|
|
|
|
|
|
| |
- disable cracklib in favor of passwdqc
- disable tally{,2} in favor of faillock
Signed-off-by: Mikle Kolyada <zlogene@gentoo.org>
|
|
|
|
| |
Signed-off-by: Mikle Kolyada <zlogene@gentoo.org>
|
|
|
|
|
|
|
|
|
| |
* Running pam_systemd.so before setting user environment
variables makes it possible for the user to use variables
such as `XDG_RUNTIME_DIR` in their own definitions.
Bug: https://bugs.gentoo.org/711450
Signed-off-by: David Seifert <soap@gentoo.org>
|
|
|
|
| |
Signed-off-by: Mikle Kolyada <zlogene@gentoo.org>
|
|
|
|
| |
Signed-off-by: Mikle Kolyada <zlogene@gentoo.org>
|
|
|
|
| |
Signed-off-by: Mikle Kolyada <zlogene@gentoo.org>
|
|
|
|
| |
Signed-off-by: Mikle Kolyada <zlogene@gentoo.org>
|
|
|
|
| |
Signed-off-by: Mikle Kolyada <zlogene@gentoo.org>
|
|
|
|
| |
URL: https://bugs.gentoo.org/540096
|
|
|
|
| |
URL: https://bugs.gentoo.org/511600
|
| |
|
| |
|
|
|
|
| |
URL: https://bugs.gentoo.org/539508
|
| |
|
| |
|
|
|
|
| |
#372229 and #485470
|
|
|
|
| |
Those should be shared between shadow implementations.
|
| |
|
|
|
|
|
|
| |
When setting the MINIMAL flag on, the generated PAM chains will not use
tally, motd, mail or lastlog modules, making th elogin quiet and skipping
over the update of the login files.
|
|
|
|
| |
Thanks to Simon Alman for reporting, in bug #333393
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
This implements drop-in support for Kerberos (pam_krb5) in Gentoo systems;
if the kerberos USE flag has been enabled, it'll use pam_krb5 for login,
ignoring pam_unix, but no other module in the chain.
It requires Linux-PAM.
|
|
|
|
|
|
|
|
|
|
|
|
| |
The system-services stack will now provide auth (always permitted) and
account (use system-auth stack) chains, so that services like fcron can use
it.
Session handling is instead split out of system-auth and system-services
into not a stack but an included file providing the session chain for both
of them, this allows to edit a single file in pambase and provide the two
session chains, that might very well be separated (indeed, services don't
use pam_ssh).
|
|
|
|
| |
different paths.
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
The pam_tally module, only provided by Linux-PAM for us, is replaced in
newer instances with the pam_tally2 module which is wordsize-independent.
For this reason, make the configuration choose the best tally module
between the two depending on the version of the Linux-PAM package.
Also drop the DEBUG indication: the module does not support the debug
option.
|
| |
|
|
|
|
|
|
|
| |
Instead of only enabling it for local login, enable it for _any_ kind of
interactive login session, included ssh and other sessions.
See bug #260842 for details about the change.
|
|\ |
|
| |
| |
| |
| |
| |
| |
| | |
Instead of only supporting MD5-hashed passwords, make it possible to
use SHA512-hashed passwords, which should be stronger. This requires
glibc 2.7 and Linux-PAM 1.0.1. If the SHA512 hasher is not supported
by libcrypt, Linux-PAM will fallback to MD5 like before.
|
| | |
|
| |
| |
| |
| |
| |
| | |
The pam_unix module from FreeBSD 6.2 also does not support the session
chain; thus disable it for the whole FreeBSD case rather than just for
FreeBSD 7.
|
|/
|
|
|
|
| |
The system-services stack provides a session chain for services to
have the same session settings as standard user logins. This includes
limits (on Linux), temporary directories, namespaces and so on.
|
|
|
|
|
|
|
|
|
| |
On Gentoo/FreeBSD 7 the session entries for system-auth are all
disabled (unless you enable pam_mktemp), and thus everything including
it will fail.
To avoid this, make sure there is always at least one entry at the end
of the session chain.
|
|
|
|
|
|
|
| |
The try_first_pass option is not supported (any longer) by the
pam_cracklib module shipped with Linux-PAM.
This change will close bug #231819 as reported by Brian Claywell.
|
| |
|
|
|
|
|
|
|
|
|
| |
In FreeBSD 7, the pam_nologin module changed from being an
authentication module to an account module. In Linux-PAM it's
both. For this reasn make it optional for the two types of chains to
be used with pam_nologin.
This should close bug #232669 entirely.
|
|
|
|
| |
This way it's more likely to understand which module supports what.
|
|
|
|
| |
Temporarily to try making it look nicer.
|
|
|
|
|
|
| |
This fixes bug #232669 for what concern pam_unix. The pam_unix module
shipped with FreeBSD 7 has no support for session management so cannot
be used for that.
|
|
|
|
|
|
| |
The pam_ssh module allows you to type in your SSH key passphrase to
login in the system, and also spawns an ssh-agent that has the
passphrase cached in.
|
| |
|
|
|
|
| |
If we want to chainload other auth methods we can do it in pambase now.
|
| |
|