source: postlfs/security/linux-pam.xml@ f6c28f4

12.0 12.1 kea ken/TL2024 ken/tuningfonts lazarus lxqt plabs/newcss python3.11 rahul/power-profiles-daemon renodr/vulkan-addition trunk xry111/llvm18 xry111/xf86-video-removal
Last change on this file since f6c28f4 was caa9f5ba, checked in by Xi Ruoyao <xry111@…>, 14 months ago

linux-pam: Also comment out the desc of --disable-regenerate-docu

  • Property mode set to 100644
File size: 20.9 KB
RevLine 
[b4b71892]1<?xml version="1.0" encoding="ISO-8859-1"?>
[6732c094]2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
[b4b71892]4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
6
[7eaa8018]7 <!ENTITY linux-pam-download-http "https://github.com/linux-pam/linux-pam/releases/download/v&linux-pam-version;/Linux-PAM-&linux-pam-version;.tar.xz">
[1ae6204]8 <!ENTITY linux-pam-download-ftp " ">
[516e46e3]9 <!ENTITY linux-pam-md5sum "a913bd5fbf9edeafaacf3eb1eb86fd83">
10 <!ENTITY linux-pam-size "967 KB">
[d732663]11 <!ENTITY linux-pam-buildsize "39 MB (with tests)">
[10bfa7e0]12 <!ENTITY linux-pam-time "0.4 SBU (with tests)">
[7eaa8018]13
[c246bfab]14 <!ENTITY linux-pam-docs-download "https://github.com/linux-pam/linux-pam/releases/download/v&linux-pam-version;/Linux-PAM-&linux-pam-docs-version;-docs.tar.xz">
[516e46e3]15 <!ENTITY linux-pam-docs-md5sum "c3771fdc447be78b4c1756b875235965">
16 <!ENTITY linux-pam-docs-size "456 KB">
[7eaa8018]17 <!--
[1ae6204]18 <!ENTITY debian-pam-docs "http://debian.securedservers.com/kernel/pub/linux/libs/pam">
[7eaa8018]19 -->
[b4b71892]20]>
21
[6603f8b]22<sect1 id="linux-pam" xreflabel="Linux-PAM-&linux-pam-version;">
23 <?dbhtml filename="linux-pam.html"?>
[c7eb655]24
25
[6603f8b]26 <title>Linux-PAM-&linux-pam-version;</title>
[c7eb655]27
[6603f8b]28 <indexterm zone="linux-pam">
29 <primary sortas="a-Linux-PAM">Linux-PAM</primary>
[c7eb655]30 </indexterm>
31
32 <sect2 role="package">
[db248d06]33 <title>Introduction to Linux PAM</title>
[c7eb655]34
[db248d06]35 <para>
36 The <application>Linux PAM</application> package contains
[7f70be6]37 Pluggable Authentication Modules used by the local
38 system administrator to control how application programs authenticate
[db248d06]39 users.
40 </para>
[c7eb655]41
[18aa9339]42 &lfs113_checked;
[f4797d2]43
[c7eb655]44 <bridgehead renderas="sect3">Package Information</bridgehead>
45 <itemizedlist spacing="compact">
46 <listitem>
[db248d06]47 <para>
48 Download (HTTP): <ulink url="&linux-pam-download-http;"/>
49 </para>
[c7eb655]50 </listitem>
51 <listitem>
[db248d06]52 <para>
53 Download (FTP): <ulink url="&linux-pam-download-ftp;"/>
54 </para>
[c7eb655]55 </listitem>
56 <listitem>
[db248d06]57 <para>
58 Download MD5 sum: &linux-pam-md5sum;
59 </para>
[c7eb655]60 </listitem>
61 <listitem>
[db248d06]62 <para>
63 Download size: &linux-pam-size;
64 </para>
[c7eb655]65 </listitem>
66 <listitem>
[db248d06]67 <para>
68 Estimated disk space required: &linux-pam-buildsize;
69 </para>
[c7eb655]70 </listitem>
71 <listitem>
[db248d06]72 <para>
73 Estimated build time: &linux-pam-time;
74 </para>
[c7eb655]75 </listitem>
76 </itemizedlist>
77
78 <bridgehead renderas="sect3">Additional Downloads</bridgehead>
[db248d06]79 <itemizedlist spacing="compact">
[07f0c976]80 <title>Optional Documentation</title>
[c7eb655]81 <listitem>
[db248d06]82 <para>
83 Download (HTTP): <ulink url="&linux-pam-docs-download;"/>
84 </para>
[903f671]85 </listitem>
86 <listitem>
[db248d06]87 <para>
88 Download MD5 sum: &linux-pam-docs-md5sum;
89 </para>
[903f671]90 </listitem>
91 <listitem>
[db248d06]92 <para>
93 Download size &linux-pam-docs-size;
94 </para>
[6576f3e]95 </listitem>
96 </itemizedlist>
97
[db248d06]98 <bridgehead renderas="sect3">Linux PAM Dependencies</bridgehead>
[c7eb655]99
100 <bridgehead renderas="sect4">Optional</bridgehead>
[db248d06]101 <para role="optional">
102 <xref linkend="db"/>,
[7e11b83c]103 <xref linkend="libnsl"/>,
[8558044]104 <xref linkend="libtirpc"/>,
[7e11b83c]105 <ulink url="https://github.com/linux-audit/audit-userspace">libaudit</ulink>, and
[cd29bc9]106 <ulink url="https://www.prelude-siem.org">Prelude</ulink>
[db248d06]107 </para>
[f8dd4ec]108<!-- With 1.5.3, building the doc requires the namespaced version of
109 docbook-xsl, which is beyond BLFS.
[db248d06]110
111 <bridgehead renderas="sect4">Optional (To Rebuild the Documentation)</bridgehead>
112 <para role="optional">
113 <xref linkend="DocBook"/>,
114 <xref linkend="docbook-xsl"/>,
115 <xref linkend="fop"/>,
[5ffb9f5]116 <xref linkend="libxslt"/> and either
[1eac9eb]117 <xref linkend="lynx"/> or
118 <ulink url="&w3m-url;">W3m</ulink>
[db248d06]119 </para>
[f8dd4ec]120-->
[58dfbe3]121 <note>
122 <para role="required">
123 <xref role="runtime" linkend="shadow"/>
124 <phrase revision="systemd"> and <xref role="runtime" linkend="systemd"/>
[7f70be6]125 must</phrase><phrase revision="sysv">must</phrase> be reinstalled
126 and reconfigured
[58dfbe3]127 after installing and configuring <application>Linux PAM</application>.
128 </para>
[19d6c39]129
130 <para role="recommended">
131 With Linux-PAM-1.4.0 and higher, the pam_cracklib module is not
[7f70be6]132 installed by default. Use <xref role="runtime" linkend="libpwquality"/>
133 to enforce strong passwords.
[19d6c39]134 </para>
[58dfbe3]135 </note>
136
[3597eb6]137 <para condition="html" role="usernotes">User Notes:
[db248d06]138 <ulink url="&blfs-wiki;/linux-pam"/>
139 </para>
[c7eb655]140 </sect2>
141
142 <sect2 role="installation">
[db248d06]143 <title>Installation of Linux PAM</title>
[c7eb655]144
[ad539dbe]145 <para revision="sysv">
[7f70be6]146 First, prevent the installation of an unneeded systemd file:
[ad539dbe]147 </para>
148
149<screen revision="sysv"><userinput>sed -e /service_DATA/d \
150 -i modules/pam_namespace/Makefile.am &amp;&amp;
151autoreconf</userinput></screen>
152
[db248d06]153 <para>
154 If you downloaded the documentation, unpack the tarball by issuing
155 the following command.
156 </para>
[903f671]157
[f330e62]158<screen><userinput>tar -xf ../Linux-PAM-&linux-pam-docs-version;-docs.tar.xz --strip-components=1</userinput></screen>
[f8dd4ec]159<!--
[1eac9eb]160 <para>
[7f70be6]161 If you want to regenerate the documentation yourself, fix the
162 <command>configure</command> script so it will detect lynx:
[1eac9eb]163 </para>
164
[ad539dbe]165<screen><userinput>sed -e 's/dummy elinks/dummy lynx/' \
[1eac9eb]166 -e 's/-no-numbering -no-references/-force-html -nonumbers -stdin/' \
167 -i configure</userinput></screen>
[f8dd4ec]168-->
[db248d06]169 <para>
[7f70be6]170 Compile and link <application>Linux PAM</application> by
[db248d06]171 running the following commands:
172 </para>
[c7eb655]173
[2a77179]174<screen><userinput>./configure --prefix=/usr \
[bf1e213]175 --sbindir=/usr/sbin \
176 --sysconfdir=/etc \
177 --libdir=/usr/lib \
178 --enable-securedir=/usr/lib/security \
[7cadfea]179 --docdir=/usr/share/doc/Linux-PAM-&linux-pam-version; &amp;&amp;
[c7eb655]180make</userinput></screen>
[17fb537e]181
[db248d06]182 <para>
[5c6a906]183 To test the results, a suitable <filename>/etc/pam.d/other</filename>
184 configuration file must exist.
185 </para>
186
187 <caution>
[7f70be6]188 <title>Reinstallation or Upgrade of Linux PAM</title>
[5c6a906]189 <para>
190 If you have a system with Linux PAM installed and working, be careful
191 when modifying the files in
192 <filename class="directory">/etc/pam.d</filename>, since your system
193 may become totally unusable. If you want to run the tests, you do not
194 need to create another <filename>/etc/pam.d/other</filename> file. The
[7f70be6]195 existing file can be used for the tests.
[5c6a906]196 </para>
197
198 <para>
199 You should also be aware that <command>make install</command>
200 overwrites the configuration files in
201 <filename class="directory">/etc/security</filename> as well as
[7f70be6]202 <filename>/etc/environment</filename>. If you
[7f92f72]203 have modified those files, be sure to back them up.
[5c6a906]204 </para>
205 </caution>
206
207 <para>
[7f70be6]208 For a first-time installation, create a configuration file by issuing the
[5c6a906]209 following commands as the <systemitem class="username">root</systemitem>
210 user:
[db248d06]211 </para>
[903f671]212
213<screen role="root"><userinput>install -v -m755 -d /etc/pam.d &amp;&amp;
[c03a8bd]214
[903f671]215cat &gt; /etc/pam.d/other &lt;&lt; "EOF"
[51dfb3e]216<literal>auth required pam_deny.so
[903f671]217account required pam_deny.so
218password required pam_deny.so
[51dfb3e]219session required pam_deny.so</literal>
[903f671]220EOF</userinput></screen>
[1ad238d8]221
[db248d06]222 <para>
223 Now run the tests by issuing <command>make check</command>.
[7f70be6]224 Be sure the tests produced no errors before continuing the
225 installation. Note that the tests are very long.
226 Redirect the output to a log file, so you can inspect it thoroughly.
[db248d06]227 </para>
[903f671]228
[db248d06]229 <para>
[7f70be6]230 For a first-time installation, remove the configuration file
[5c6a906]231 created earlier by issuing the following command as the
[db248d06]232 <systemitem class="username">root</systemitem> user:
233 </para>
[903f671]234
[8d9c3ed]235<screen role="root"><userinput>rm -fv /etc/pam.d/other</userinput></screen>
[f691f2b]236
[db248d06]237 <para>
238 Now, as the <systemitem class="username">root</systemitem>
239 user:
240 </para>
[17fb537e]241
[c7eb655]242<screen role="root"><userinput>make install &amp;&amp;
[2a77179]243chmod -v 4755 /usr/sbin/unix_chkpwd</userinput></screen>
[5ae7a99]244
[c7eb655]245 </sect2>
[b4b71892]246
[c7eb655]247 <sect2 role="commands">
248 <title>Command Explanations</title>
[b4b71892]249
[db248d06]250 <para>
[2a77179]251 <parameter>--enable-securedir=/usr/lib/security</parameter>:
[e52afdd]252 This switch sets the installation location for the
[5ae7a99]253 <application>PAM</application> modules.
254 </para>
[caa9f5ba]255<!--
[5ffb9f5]256 <para>
[caa9f5ba]257 <option>- -disable-regenerate-docu</option> : If the needed dependencies
[1eac9eb]258 (<xref linkend="DocBook"/>, <xref linkend="docbook-xsl"/>, <xref
259 linkend="libxslt"/>, and <xref linkend="lynx"/> or <ulink
260 url="&w3m-url;">W3m</ulink>) are installed, the manual pages, and the
[7f70be6]261 html and text documentation files, are generated and installed.
[1eac9eb]262 Furthermore, if <xref linkend="fop"/> is installed, the PDF
263 documentation is generated and installed. Use this switch if you do not
264 want to rebuild the documentation.
[5ffb9f5]265 </para>
[caa9f5ba]266-->
[db248d06]267 <para>
[2a77179]268 <command>chmod -v 4755 /usr/sbin/unix_chkpwd</command>:
[54d58907]269 The setuid bit for the <command>unix_chkpwd</command> helper program must be
[7f70be6]270 turned on, so that non-<systemitem class="username">root</systemitem>
[db248d06]271 processes can access the shadow file.
272 </para>
273
[c7eb655]274 </sect2>
[b4b71892]275
[c7eb655]276 <sect2 role="configuration">
277 <title>Configuring Linux-PAM</title>
[b4b71892]278
[c7eb655]279 <sect3 id="pam-config">
[7f70be6]280 <title>Configuration Files</title>
[b4b71892]281
[db248d06]282 <para>
283 <filename>/etc/security/*</filename> and
284 <filename>/etc/pam.d/*</filename>
285 </para>
[b4b71892]286
[6603f8b]287 <indexterm zone="linux-pam pam-config">
[c7eb655]288 <primary sortas="e-etc-security">/etc/security/*</primary>
289 </indexterm>
[b4b71892]290
[6603f8b]291 <indexterm zone="linux-pam pam-config">
[c7eb655]292 <primary sortas="e-etc-pam.d">/etc/pam.d/*</primary>
293 </indexterm>
294
295 </sect3>
296
297 <sect3>
298 <title>Configuration Information</title>
299
[db248d06]300 <para>
301 Configuration information is placed in
302 <filename class="directory">/etc/pam.d/</filename>.
[7f70be6]303 Here is a sample file:
[db248d06]304 </para>
[c7eb655]305
306<screen><literal># Begin /etc/pam.d/other
[b4b71892]307
308auth required pam_unix.so nullok
309account required pam_unix.so
310session required pam_unix.so
311password required pam_unix.so nullok
312
[db248d06]313# End /etc/pam.d/other</literal></screen>
[b4b71892]314
[47274444]315 <para>
[7f70be6]316 Now create some generic configuration files. As the
[f43bcd7]317 <systemitem class="username">root</systemitem> user:
[47274444]318 </para>
[78b5501]319
[2ec7beca]320<screen role="root"><userinput>install -vdm755 /etc/pam.d &amp;&amp;
321cat &gt; /etc/pam.d/system-account &lt;&lt; "EOF" &amp;&amp;
[78b5501]322<literal># Begin /etc/pam.d/system-account
323
324account required pam_unix.so
325
326# End /etc/pam.d/system-account</literal>
327EOF
328
[2ec7beca]329cat &gt; /etc/pam.d/system-auth &lt;&lt; "EOF" &amp;&amp;
[78b5501]330<literal># Begin /etc/pam.d/system-auth
331
332auth required pam_unix.so
333
334# End /etc/pam.d/system-auth</literal>
335EOF
336
[48dbad5]337cat &gt; /etc/pam.d/system-session &lt;&lt; "EOF" &amp;&amp;
[78b5501]338<literal># Begin /etc/pam.d/system-session
339
340session required pam_unix.so
341
342# End /etc/pam.d/system-session</literal>
[7e11b83c]343EOF
[48dbad5]344
[7e11b83c]345cat &gt; /etc/pam.d/system-password &lt;&lt; "EOF"
346<literal># Begin /etc/pam.d/system-password
[78b5501]347
[7e11b83c]348# use sha512 hash for encryption, use shadow, and try to use any previously
[48dbad5]349# defined authentication token (chosen password) set by any prior module.
[3619a5b9]350# Use the same number of rounds as shadow.
351password required pam_unix.so sha512 shadow try_first_pass \
[024fb949]352 rounds=500000
[7e11b83c]353
354# End /etc/pam.d/system-password</literal>
355EOF
356</userinput></screen>
357
358 <para>
359 If you wish to enable strong password support, install
360 <xref linkend="libpwquality"/>, and follow the
[7f70be6]361 instructions on that page to configure the pam_pwquality
[7e11b83c]362 PAM module with strong password support.
363 </para>
364
365<!-- With the removal of the pam_cracklib module, we're supposed to be using
[7f70be6]366 libpwquality. That already includes instructions in its configuration
[7e11b83c]367 information page, so we'll use those instead.
368
369 Linux-PAM must be installed prior to libpwquality so that PAM support
370 is built in, and the PAM module is built.
371-->
[3619a5b9]372<!-- WARNING: If for any reason the instructions below are reinstated be
373 careful with the number of rounds, which should match the one in shadow.
[47274444]374 <para>
375 The remaining generic file depends on whether <xref
376 linkend="cracklib"/> is installed. If it is installed, use:
377 </para>
[78b5501]378
379<screen role="root"><userinput>cat &gt; /etc/pam.d/system-password &lt;&lt; "EOF"
380<literal># Begin /etc/pam.d/system-password
381
382# check new passwords for strength (man pam_cracklib)
[62066a54]383password required pam_cracklib.so authtok_type=UNIX retry=1 difok=5 \
384 minlen=9 dcredit=1 ucredit=1 \
385 lcredit=1 ocredit=1 minclass=0 \
[a5660ad]386 maxrepeat=0 maxsequence=0 \
[62066a54]387 maxclassrepeat=0 \
388 dictpath=/lib/cracklib/pw_dict
[78b5501]389# use sha512 hash for encryption, use shadow, and use the
390# authentication token (chosen password) set by pam_cracklib
391# above (or any previous modules)
[62066a54]392password required pam_unix.so sha512 shadow use_authtok
[78b5501]393
394# End /etc/pam.d/system-password</literal>
395EOF</userinput></screen>
[f3429309]396
[47274444]397 <note>
398 <para>
399 In its default configuration, pam_cracklib will
400 allow multiple case passwords as short as 6 characters, even with
401 the <parameter>minlen</parameter> value set to 11. You should review
402 the pam_cracklib(8) man page and determine if these default values
403 are acceptable for the security of your system.
404 </para>
405 </note>
[78b5501]406
[47274444]407 <para>
408 If <xref linkend="cracklib"/> is <emphasis>NOT</emphasis> installed,
409 use:
410 </para>
[78b5501]411
[58dfbe3]412<screen role="nodump"><userinput>cat &gt; /etc/pam.d/system-password &lt;&lt; "EOF"
[78b5501]413<literal># Begin /etc/pam.d/system-password
414
415# use sha512 hash for encryption, use shadow, and try to use any previously
416# defined authentication token (chosen password) set by any prior module
417password required pam_unix.so sha512 shadow try_first_pass
418
419# End /etc/pam.d/system-password</literal>
[74f20a1]420EOF</userinput></screen>
[7e11b83c]421-->
[47274444]422 <para>
[7f70be6]423 Next, add a restrictive <filename>/etc/pam.d/other</filename>
[47274444]424 configuration file. With this file, programs that are PAM aware will
425 not run unless a configuration file specifically for that application
[7f70be6]426 exists.
[47274444]427 </para>
[74f20a1]428
429<screen role="root"><userinput>cat &gt; /etc/pam.d/other &lt;&lt; "EOF"
430<literal># Begin /etc/pam.d/other
431
432auth required pam_warn.so
433auth required pam_deny.so
434account required pam_warn.so
435account required pam_deny.so
436password required pam_warn.so
437password required pam_deny.so
438session required pam_warn.so
439session required pam_deny.so
440
441# End /etc/pam.d/other</literal>
[78b5501]442EOF</userinput></screen>
443
[db248d06]444 <para>
445 The <application>PAM</application> man page (<command>man
[7f70be6]446 pam</command>) provides a good starting point to learn
447 about the several fields, and allowable entries.
448 <!-- not accessible 2022-09-08 -->
449 <!-- it's available at a different address 2022-10-23-->
[cd29bc9]450 The
[7f70be6]451 <ulink url="https://www.docs4dev.com/docs/en/linux-pam/1.1.2/reference/Linux-PAM_SAG.html">
[47274444]452 Linux-PAM System Administrators' Guide
[7f70be6]453 </ulink> is recommended for additional information.
[db248d06]454 </para>
[47274444]455
[ccb8b2d]456 <important>
[db248d06]457 <para>
458 You should now reinstall the <xref linkend="shadow"/>
[e2453ed5]459 <phrase revision="sysv">package</phrase>
[f586237]460 <phrase revision="systemd"> and <xref linkend="systemd"/>
[ae2e9fd8]461 packages</phrase>.
[db248d06]462 </para>
[ccb8b2d]463 </important>
[db248d06]464
[c7eb655]465 </sect3>
[db248d06]466
[c7eb655]467 </sect2>
468
469 <sect2 role="content">
470 <title>Contents</title>
471
472 <segmentedlist>
[ccb8b2d]473 <segtitle>Installed Program</segtitle>
[c7eb655]474 <segtitle>Installed Libraries</segtitle>
475 <segtitle>Installed Directories</segtitle>
476
477 <seglistitem>
[db248d06]478 <seg>
[e52afdd]479 faillock, mkhomedir_helper, pam_namespace_helper,
480 pam_timestamp_check, pwhistory_helper, unix_chkpwd and
[db248d06]481 unix_update
482 </seg>
483 <seg>
484 libpam.so, libpamc.so and libpam_misc.so
485 </seg>
486 <seg>
487 /etc/security,
[d732663]488 /usr/lib/security,
[db248d06]489 /usr/include/security and
490 /usr/share/doc/Linux-PAM-&linux-pam-version;
491 </seg>
[c7eb655]492 </seglistitem>
493 </segmentedlist>
494
495 <variablelist>
496 <bridgehead renderas="sect3">Short Descriptions</bridgehead>
497 <?dbfo list-presentation="list"?>
498 <?dbhtml list-presentation="table"?>
499
[7e11b83c]500 <varlistentry id="faillock">
501 <term><command>faillock</command></term>
502 <listitem>
503 <para>
[4c24eb0a]504 displays and modifies the authentication failure record files
[7e11b83c]505 </para>
506 <indexterm zone="linux-pam faillock">
507 <primary sortas="b-faillock">faillock</primary>
508 </indexterm>
509 </listitem>
510 </varlistentry>
511
[db248d06]512 <varlistentry id="mkhomedir_helper">
513 <term><command>mkhomedir_helper</command></term>
514 <listitem>
515 <para>
[4c24eb0a]516 is a helper binary that creates home directories
[db248d06]517 </para>
518 <indexterm zone="linux-pam mkhomedir_helper">
519 <primary sortas="b-mkhomedir_helper">mkhomedir_helper</primary>
520 </indexterm>
521 </listitem>
522 </varlistentry>
523
[e52afdd]524 <varlistentry id="pam_namespace_helper">
525 <term><command>pam_namespace_helper</command></term>
526 <listitem>
527 <para>
528 is a helper program used to configure a private namespace for a
[4c24eb0a]529 user session
[e52afdd]530 </para>
531 <indexterm zone="linux-pam pam_namespace_helper">
532 <primary sortas="b-pam_namespace_helper">pam_namespace_helper</primary>
533 </indexterm>
534 </listitem>
535 </varlistentry>
536
537 <varlistentry id="pwhistory_helper">
538 <term><command>pwhistory_helper</command></term>
539 <listitem>
540 <para>
541 is a helper program that transfers password hashes from passwd or
[4c24eb0a]542 shadow to opasswd
[e52afdd]543 </para>
544 <indexterm zone="linux-pam pwhistory_helper">
545 <primary sortas="b-pwhistory_helper">pwhistory_helper</primary>
546 </indexterm>
547 </listitem>
548 </varlistentry>
[7e11b83c]549<!-- Removed with the removal of the pam_tally{,2} module
[c7eb655]550 <varlistentry id="pam_tally">
551 <term><command>pam_tally</command></term>
552 <listitem>
[db248d06]553 <para>
554 is used to interrogate and manipulate the login counter file.
555 </para>
[6603f8b]556 <indexterm zone="linux-pam pam_tally">
[c7eb655]557 <primary sortas="b-pam_tally">pam_tally</primary>
558 </indexterm>
559 </listitem>
560 </varlistentry>
561
[db248d06]562 <varlistentry id="pam_tally2">
563 <term><command>pam_tally2</command></term>
564 <listitem>
565 <para>
566 is used to interrogate and manipulate the login counter file, but
567 does not have some limitations that <command>pam_tally</command>
568 does.
569 </para>
570 <indexterm zone="linux-pam pam_tally2">
571 <primary sortas="b-pam_tally2">pam_tally2</primary>
572 </indexterm>
573 </listitem>
574 </varlistentry>
[7e11b83c]575-->
[db248d06]576
577 <varlistentry id="pam_timestamp_check">
578 <term><command>pam_timestamp_check</command></term>
579 <listitem>
580 <para>
581 is used to check if the default timestamp is valid
582 </para>
583 <indexterm zone="linux-pam pam_timestamp_check">
584 <primary sortas="b-pam_timestamp_check">pam_timestamp_check</primary>
585 </indexterm>
586 </listitem>
587 </varlistentry>
588
589 <varlistentry id="unix_chkpwd">
590 <term><command>unix_chkpwd</command></term>
591 <listitem>
592 <para>
[4c24eb0a]593 is a helper binary that verifies the password of the current user
[db248d06]594 </para>
595 <indexterm zone="linux-pam unix_chkpwd">
596 <primary sortas="b-unix_chkpwd">unix_chkpwd</primary>
597 </indexterm>
598 </listitem>
599 </varlistentry>
600
601 <varlistentry id="unix_update">
602 <term><command>unix_update</command></term>
603 <listitem>
604 <para>
[4c24eb0a]605 is a helper binary that updates the password of a given user
[db248d06]606 </para>
607 <indexterm zone="linux-pam unix_update">
608 <primary sortas="b-unix_update">unix_update</primary>
609 </indexterm>
610 </listitem>
611 </varlistentry>
612
[c7eb655]613 <varlistentry id="libpam">
[db248d06]614 <term><filename class="libraryfile">libpam.so</filename></term>
[c7eb655]615 <listitem>
[db248d06]616 <para>
617 provides the interfaces between applications and the
[4c24eb0a]618 PAM modules
[db248d06]619 </para>
[6603f8b]620 <indexterm zone="linux-pam libpam">
[db248d06]621 <primary sortas="c-libpam">libpam.so</primary>
[c7eb655]622 </indexterm>
623 </listitem>
624 </varlistentry>
[db248d06]625
[c7eb655]626 </variablelist>
[db248d06]627
[c7eb655]628 </sect2>
[db248d06]629
[3c52f859]630</sect1>
Note: See TracBrowser for help on using the repository browser.