diff options
author | Chris PeBenito <pebenito@gentoo.org> | 2003-08-31 04:41:27 +0000 |
---|---|---|
committer | Chris PeBenito <pebenito@gentoo.org> | 2003-08-31 04:41:27 +0000 |
commit | 225251103dec1c4b268552138a58e6ad3f1e5128 (patch) | |
tree | 046e6dabba2ff19a0ce2e2607302d34372fd534b /sys-apps | |
parent | ~ppc (diff) | |
download | gentoo-2-225251103dec1c4b268552138a58e6ad3f1e5128.tar.gz gentoo-2-225251103dec1c4b268552138a58e6ad3f1e5128.tar.bz2 gentoo-2-225251103dec1c4b268552138a58e6ad3f1e5128.zip |
clean up pam.d files
Diffstat (limited to 'sys-apps')
-rw-r--r-- | sys-apps/policycoreutils/Manifest | 4 | ||||
-rw-r--r-- | sys-apps/policycoreutils/files/newrole | 23 | ||||
-rw-r--r-- | sys-apps/policycoreutils/files/run_init | 23 |
3 files changed, 2 insertions, 48 deletions
diff --git a/sys-apps/policycoreutils/Manifest b/sys-apps/policycoreutils/Manifest index 08ebfd86676c..f97372d2aca1 100644 --- a/sys-apps/policycoreutils/Manifest +++ b/sys-apps/policycoreutils/Manifest @@ -3,8 +3,8 @@ MD5 4f2c31ca41fa2e7583ca6f4bd0e20881 ChangeLog 1268 MD5 2fc7978c9e3ab0b3027ff653bba4c59f policycoreutils-1.1-r1.ebuild 1204 MD5 6d4df7058894970c15d4066f7ad88c29 files/policycoreutils-1.0-gentoo.diff 1818 MD5 1f231a1da642997577ac4567ee9867ac files/rlpkg 2317 -MD5 8daee4f4fd3e4a74c4d5f2ddb6b086a5 files/newrole 1197 -MD5 8daee4f4fd3e4a74c4d5f2ddb6b086a5 files/run_init 1197 +MD5 7821fa9efa9de78861110c8bd21bf714 files/newrole 326 +MD5 7821fa9efa9de78861110c8bd21bf714 files/run_init 326 MD5 2d09b4cfc5e5b399863a1ecd381ba33e files/digest-policycoreutils-1.1-r1 67 MD5 4de7e167223dcedfb7978ffc3fb3c087 files/policycoreutils-1.1-setfiles.diff 2796 MD5 7d5ff0bb4eb573840072c4a8a420cd2a files/avc_enforcing 141 diff --git a/sys-apps/policycoreutils/files/newrole b/sys-apps/policycoreutils/files/newrole index 12dc3c21b326..7b8b8c0a286c 100644 --- a/sys-apps/policycoreutils/files/newrole +++ b/sys-apps/policycoreutils/files/newrole @@ -1,30 +1,7 @@ #%PAM-1.0 - -# If you want to restrict users begin allowed to su even more, -# create /etc/security/suauth.allow (or to that matter) that is only -# writable by root, and add users that are allowed to su to that -# file, one per line. -#auth required /lib/security/pam_listfile.so item=ruser sense=allow onerr=fail file=/etc/security/suauth.allow - -# Uncomment this to allow users in the wheel group to su without -# entering a passwd. -#auth sufficient /lib/security/pam_wheel.so use_uid trust - -# Alternatively to above, you can implement a list of users that do -# not need to supply a passwd with a list. -#auth sufficient /lib/security/pam_listfile.so item=ruser sense=allow onerr=fail file=/etc/security/suauth.nopass - -# Comment this to allow any user, even those not in the 'wheel' -# group to su -auth required /lib/security/pam_wheel.so use_uid - auth required /lib/security/pam_stack.so service=system-auth - account required /lib/security/pam_stack.so service=system-auth - password required /lib/security/pam_stack.so service=system-auth - session required /lib/security/pam_stack.so service=system-auth session optional /lib/security/pam_xauth.so - diff --git a/sys-apps/policycoreutils/files/run_init b/sys-apps/policycoreutils/files/run_init index 12dc3c21b326..7b8b8c0a286c 100644 --- a/sys-apps/policycoreutils/files/run_init +++ b/sys-apps/policycoreutils/files/run_init @@ -1,30 +1,7 @@ #%PAM-1.0 - -# If you want to restrict users begin allowed to su even more, -# create /etc/security/suauth.allow (or to that matter) that is only -# writable by root, and add users that are allowed to su to that -# file, one per line. -#auth required /lib/security/pam_listfile.so item=ruser sense=allow onerr=fail file=/etc/security/suauth.allow - -# Uncomment this to allow users in the wheel group to su without -# entering a passwd. -#auth sufficient /lib/security/pam_wheel.so use_uid trust - -# Alternatively to above, you can implement a list of users that do -# not need to supply a passwd with a list. -#auth sufficient /lib/security/pam_listfile.so item=ruser sense=allow onerr=fail file=/etc/security/suauth.nopass - -# Comment this to allow any user, even those not in the 'wheel' -# group to su -auth required /lib/security/pam_wheel.so use_uid - auth required /lib/security/pam_stack.so service=system-auth - account required /lib/security/pam_stack.so service=system-auth - password required /lib/security/pam_stack.so service=system-auth - session required /lib/security/pam_stack.so service=system-auth session optional /lib/security/pam_xauth.so - |