summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorChris PeBenito <pebenito@gentoo.org>2003-08-31 04:41:27 +0000
committerChris PeBenito <pebenito@gentoo.org>2003-08-31 04:41:27 +0000
commit225251103dec1c4b268552138a58e6ad3f1e5128 (patch)
tree046e6dabba2ff19a0ce2e2607302d34372fd534b /sys-apps
parent~ppc (diff)
downloadgentoo-2-225251103dec1c4b268552138a58e6ad3f1e5128.tar.gz
gentoo-2-225251103dec1c4b268552138a58e6ad3f1e5128.tar.bz2
gentoo-2-225251103dec1c4b268552138a58e6ad3f1e5128.zip
clean up pam.d files
Diffstat (limited to 'sys-apps')
-rw-r--r--sys-apps/policycoreutils/Manifest4
-rw-r--r--sys-apps/policycoreutils/files/newrole23
-rw-r--r--sys-apps/policycoreutils/files/run_init23
3 files changed, 2 insertions, 48 deletions
diff --git a/sys-apps/policycoreutils/Manifest b/sys-apps/policycoreutils/Manifest
index 08ebfd86676c..f97372d2aca1 100644
--- a/sys-apps/policycoreutils/Manifest
+++ b/sys-apps/policycoreutils/Manifest
@@ -3,8 +3,8 @@ MD5 4f2c31ca41fa2e7583ca6f4bd0e20881 ChangeLog 1268
MD5 2fc7978c9e3ab0b3027ff653bba4c59f policycoreutils-1.1-r1.ebuild 1204
MD5 6d4df7058894970c15d4066f7ad88c29 files/policycoreutils-1.0-gentoo.diff 1818
MD5 1f231a1da642997577ac4567ee9867ac files/rlpkg 2317
-MD5 8daee4f4fd3e4a74c4d5f2ddb6b086a5 files/newrole 1197
-MD5 8daee4f4fd3e4a74c4d5f2ddb6b086a5 files/run_init 1197
+MD5 7821fa9efa9de78861110c8bd21bf714 files/newrole 326
+MD5 7821fa9efa9de78861110c8bd21bf714 files/run_init 326
MD5 2d09b4cfc5e5b399863a1ecd381ba33e files/digest-policycoreutils-1.1-r1 67
MD5 4de7e167223dcedfb7978ffc3fb3c087 files/policycoreutils-1.1-setfiles.diff 2796
MD5 7d5ff0bb4eb573840072c4a8a420cd2a files/avc_enforcing 141
diff --git a/sys-apps/policycoreutils/files/newrole b/sys-apps/policycoreutils/files/newrole
index 12dc3c21b326..7b8b8c0a286c 100644
--- a/sys-apps/policycoreutils/files/newrole
+++ b/sys-apps/policycoreutils/files/newrole
@@ -1,30 +1,7 @@
#%PAM-1.0
-
-# If you want to restrict users begin allowed to su even more,
-# create /etc/security/suauth.allow (or to that matter) that is only
-# writable by root, and add users that are allowed to su to that
-# file, one per line.
-#auth required /lib/security/pam_listfile.so item=ruser sense=allow onerr=fail file=/etc/security/suauth.allow
-
-# Uncomment this to allow users in the wheel group to su without
-# entering a passwd.
-#auth sufficient /lib/security/pam_wheel.so use_uid trust
-
-# Alternatively to above, you can implement a list of users that do
-# not need to supply a passwd with a list.
-#auth sufficient /lib/security/pam_listfile.so item=ruser sense=allow onerr=fail file=/etc/security/suauth.nopass
-
-# Comment this to allow any user, even those not in the 'wheel'
-# group to su
-auth required /lib/security/pam_wheel.so use_uid
-
auth required /lib/security/pam_stack.so service=system-auth
-
account required /lib/security/pam_stack.so service=system-auth
-
password required /lib/security/pam_stack.so service=system-auth
-
session required /lib/security/pam_stack.so service=system-auth
session optional /lib/security/pam_xauth.so
-
diff --git a/sys-apps/policycoreutils/files/run_init b/sys-apps/policycoreutils/files/run_init
index 12dc3c21b326..7b8b8c0a286c 100644
--- a/sys-apps/policycoreutils/files/run_init
+++ b/sys-apps/policycoreutils/files/run_init
@@ -1,30 +1,7 @@
#%PAM-1.0
-
-# If you want to restrict users begin allowed to su even more,
-# create /etc/security/suauth.allow (or to that matter) that is only
-# writable by root, and add users that are allowed to su to that
-# file, one per line.
-#auth required /lib/security/pam_listfile.so item=ruser sense=allow onerr=fail file=/etc/security/suauth.allow
-
-# Uncomment this to allow users in the wheel group to su without
-# entering a passwd.
-#auth sufficient /lib/security/pam_wheel.so use_uid trust
-
-# Alternatively to above, you can implement a list of users that do
-# not need to supply a passwd with a list.
-#auth sufficient /lib/security/pam_listfile.so item=ruser sense=allow onerr=fail file=/etc/security/suauth.nopass
-
-# Comment this to allow any user, even those not in the 'wheel'
-# group to su
-auth required /lib/security/pam_wheel.so use_uid
-
auth required /lib/security/pam_stack.so service=system-auth
-
account required /lib/security/pam_stack.so service=system-auth
-
password required /lib/security/pam_stack.so service=system-auth
-
session required /lib/security/pam_stack.so service=system-auth
session optional /lib/security/pam_xauth.so
-