source: postlfs/security/shadow.xml@ 60a8ff3

11.2 11.3 12.0 12.1 12.2 gimp3 kea ken/TL2024 ken/inkscape-core-mods ken/tuningfonts lazarus lxqt plabs/newcss plabs/python-mods python3.11 qt5new rahul/power-profiles-daemon renodr/vulkan-addition trunk xry111/for-12.3 xry111/llvm18 xry111/soup3 xry111/spidermonkey128 xry111/xf86-video-removal
Last change on this file since 60a8ff3 was d32d872, checked in by Pierre Labastie <pierre.labastie@…>, 3 years ago

shadow: allow any user to use su

With the present /etc/pam.d/su, the usage of "su" is restricted
to users in the wheel group. Comment out that rule.

  • Property mode set to 100644
File size: 21.1 KB
RevLine 
[b4b71892]1<?xml version="1.0" encoding="ISO-8859-1"?>
[6732c094]2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
[b4b71892]4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
[17fb537e]6
[11fdc11f]7 <!ENTITY shadow-download-http "https://github.com/shadow-maint/shadow/releases/download/v&shadow-version;/shadow-&shadow-version;.tar.xz">
[fb89293]8 <!ENTITY shadow-download-ftp " ">
[07be534]9 <!ENTITY shadow-md5sum "5a95ec069aa91508167d02fecafaa912">
[11fdc11f]10 <!ENTITY shadow-size "1.6 MB">
[07be534]11 <!ENTITY shadow-buildsize "48 MB">
[922e013]12 <!ENTITY shadow-time "0.2 SBU">
[b4b71892]13]>
14
[17fb537e]15<sect1 id="shadow" xreflabel="Shadow-&shadow-version;">
[322f172]16 <?dbhtml filename="shadow.html"?>
17
18 <sect1info>
19 <date>$Date$</date>
20 </sect1info>
21
22 <title>Shadow-&shadow-version;</title>
23
24 <indexterm zone="shadow">
25 <primary sortas="a-Shadow">Shadow</primary>
26 </indexterm>
27
28 <sect2 role="package">
29 <title>Introduction to Shadow</title>
30
[9a3142c]31 <para>
32 <application>Shadow</application> was indeed installed in LFS and there is
33 no reason to reinstall it unless you installed
34 <application>CrackLib</application> or
35 <application>Linux-PAM</application> after your LFS system was completed.
36 If you have installed <application>CrackLib</application> after LFS, then
37 reinstalling <application>Shadow</application> will enable strong password
38 support. If you have installed <application>Linux-PAM</application>,
39 reinstalling <application>Shadow</application> will allow programs such as
40 <command>login</command> and <command>su</command> to utilize PAM.
41 </para>
[322f172]42
[f1a479c7]43 &lfs111_checked;
[f4797d2]44
[322f172]45 <bridgehead renderas="sect3">Package Information</bridgehead>
46 <itemizedlist spacing="compact">
47 <listitem>
[9a3142c]48 <para>
49 Download (HTTP): <ulink url="&shadow-download-http;"/>
50 </para>
[322f172]51 </listitem>
[29d1c248]52 <listitem>
[9a3142c]53 <para>
54 Download (FTP): <ulink url="&shadow-download-ftp;"/>
55 </para>
[29d1c248]56 </listitem>
[322f172]57 <listitem>
[9a3142c]58 <para>
59 Download MD5 sum: &shadow-md5sum;
60 </para>
[322f172]61 </listitem>
62 <listitem>
[9a3142c]63 <para>
64 Download size: &shadow-size;
65 </para>
[322f172]66 </listitem>
67 <listitem>
[9a3142c]68 <para>
69 Estimated disk space required: &shadow-buildsize;
70 </para>
[322f172]71 </listitem>
72 <listitem>
[9a3142c]73 <para>
74 Estimated build time: &shadow-time;
75 </para>
[322f172]76 </listitem>
77 </itemizedlist>
[07be534]78<!--
[922e013]79 <bridgehead renderas="sect3">Additional Downloads</bridgehead>
80 <itemizedlist spacing="compact">
81 <listitem>
82 <para>
83 Required patch:
84 <ulink url="&patch-root;/shadow-&shadow-version;-useradd_segfault-1.patch"/>
85 </para>
86 </listitem>
87 </itemizedlist>
[07be534]88-->
[322f172]89 <bridgehead renderas="sect3">Shadow Dependencies</bridgehead>
90
91 <bridgehead renderas="sect4">Required</bridgehead>
[9a3142c]92 <para role="required">
93 <xref linkend="linux-pam"/> or
[19d6c39]94 <xref role="nodep" linkend="cracklib"/>
[9a3142c]95 </para>
96
97 <para condition="html" role="usernotes">
98 User Notes: <ulink url="&blfs-wiki;/shadow"/>
99 </para>
[322f172]100 </sect2>
101
102 <sect2 role="installation">
103 <title>Installation of Shadow</title>
104
[c6bdcb0]105 <important>
[9a3142c]106 <para>
107 The installation commands shown below are for installations where
[19d6c39]108 <application>Linux-PAM</application> has been installed and
[9a3142c]109 <application>Shadow</application> is being reinstalled to support the
110 <application>Linux-PAM</application> installation.
111 </para>
112
113 <para>
114 If you are reinstalling <application>Shadow</application> to provide
115 strong password support using the <application>CrackLib</application>
116 library without using <application>Linux-PAM</application>, ensure you
117 add the <parameter>--with-libcrack</parameter> parameter to the
118 <command>configure</command> script below and also issue the following
119 command:
120 </para>
[bca744f]121
[cac7f93]122<screen role="nodump"><userinput>sed -i 's@DICTPATH.*@DICTPATH\t/lib/cracklib/pw_dict@' etc/login.defs</userinput></screen>
[c6bdcb0]123 </important>
124
[9a3142c]125 <para>
126 Reinstall <application>Shadow</application> by running the following
127 commands:
128 </para>
[07be534]129<!--
[7af20d4]130<screen><userinput>patch -Np1 -i ../shadow-4.10-useradd_segfault-1.patch &amp;&amp;
[517579a]131
[922e013]132sed -i "224s/rounds/min_rounds/" libmisc/salt.c &amp;&amp;
[07be534]133-->
134<screen><userinput>sed -i 's/groups$(EXEEXT) //' src/Makefile.in &amp;&amp;
[4af9931]135
136find man -name Makefile.in -exec sed -i 's/groups\.1 / /' {} \; &amp;&amp;
[dcf64b5f]137find man -name Makefile.in -exec sed -i 's/getspnam\.3 / /' {} \; &amp;&amp;
138find man -name Makefile.in -exec sed -i 's/passwd\.5 / /' {} \; &amp;&amp;
[e5b9fc73]139
[a83fdb2]140sed -e 's@#ENCRYPT_METHOD DES@ENCRYPT_METHOD SHA512@' \
141 -e 's@/var/spool/mail@/var/mail@' \
[7c95cc15]142 -e '/PATH=/{s@/sbin:@@;s@/bin:@@}' \
[a83fdb2]143 -i etc/login.defs &amp;&amp;
[5443006d]144
[cacd76ad]145./configure --sysconfdir=/etc \
[ab01ea5]146 --disable-static \
[922e013]147 --with-group-name-max-length=32 &amp;&amp;
[322f172]148make</userinput></screen>
[17fb537e]149
[9a3142c]150 <para>
151 This package does not come with a test suite.
152 </para>
[31f3a57]153
[9a3142c]154 <para>
155 Now, as the <systemitem class="username">root</systemitem> user:
156 </para>
[17fb537e]157
[dba76a7]158<screen role="root"><userinput>make exec_prefix=/usr install</userinput></screen>
[8558044]159
[5b01088]160 <para>
161 The man pages were installed in LFS, but if reinstallation is
162 desired, run (as the <systemitem class="username">root</systemitem> user):
163 </para>
164
165<screen role="root"><userinput>make -C man install-man</userinput></screen>
166
[322f172]167 </sect2>
[b4b71892]168
[322f172]169 <sect2 role="commands">
170 <title>Command Explanations</title>
[b4b71892]171
[9a3142c]172 <para>
173 <command>sed -i 's/groups$(EXEEXT) //' src/Makefile.in</command>: This sed
174 is used to suppress the installation of the <command>groups</command>
175 program as the version from the <application>Coreutils</application>
176 package installed during LFS is preferred.
177 </para>
178
179 <para>
[07be534]180 <command>find man -name Makefile.in -exec ... {} \;</command>: The
181 first command is used to suppress the installation of the
[9a3142c]182 <command>groups</command> man pages so the existing ones installed from
183 the <application>Coreutils</application> package are not replaced.
[07be534]184 The two other commands prevent installation of manual pages that
185 are already installed by <application>Man-pages</application> in LFS.
[9a3142c]186 </para>
187
188 <para>
[a83fdb2]189 <command>sed -e 's@#ENCRYPT_METHOD DES@ENCRYPT_METHOD SHA512@' -e
[8558044]190 's@/var/spool/mail@/var/mail@' -e '/PATH=/{s@/sbin:@@;s@/bin:@@}'
[7c95cc15]191 -i etc/login.defs</command>: Instead of using
[9a3142c]192 the default 'DES' method, this command modifies the installation to use
193 the more secure 'SHA512' method of hashing passwords, which also allows
194 passwords longer than eight characters. It also changes the obsolete
195 <filename class="directory">/var/spool/mail</filename> location for user
196 mailboxes that <application>Shadow</application> uses by default to the
[7c95cc15]197 <filename class="directory">/var/mail</filename> location. It also
198 changes the default path to be consistent with that set in LFS.
[9a3142c]199 </para>
[07be534]200<!--
[9a3142c]201 <para>
[8558044]202 <command>sed ... libmisc/salt.c</command> and
[d233271a]203 <command>sed ... libsubid/Makefile.am</command>: Fix a couple of errors
204 that were found after the package was released.
[9a3142c]205 </para>
[07be534]206-->
[49ee2def]207 <para>
[f1d7196]208 <parameter>--with-group-name-max-length=32</parameter>: The maximum
209 user name is 32 characters. Make the maximum group name the same.
[49ee2def]210 </para>
[7af20d4]211<!--
[cacd76ad]212 <para>
[7af20d4]213 <parameter>-\-without-su</parameter>: Don't reinstall
[8ddd8400]214 <command>su</command> because upstream recommends using the
[cacd76ad]215 <command>su</command> command from <xref linkend='util-linux'/>
216 when <application>Linux-PAM</application> is available.
217 </para>
[7af20d4]218-->
[322f172]219 </sect2>
[b4b71892]220
[1189cb89]221<!-- Now, /etc/default/useradd is not reinstalled anymore, and this
222 configuration has been done in lfs
[e807ae1d]223 <sect2 role="configuration">
224 <title>Configuring Shadow</title>
225
[9a3142c]226 <para>
227 <application>Shadow</application>'s stock configuration for the
228 <command>useradd</command> utility may not be desirable for your
229 installation. One default parameter causes <command>useradd</command> to
230 create a mailbox file for any newly created user.
231 <command>useradd</command> will make the group ownership of this file to
232 the <systemitem class="groupname">mail</systemitem> group with 0660
233 permissions. If you would prefer that these mailbox files are not created
234 by <command>useradd</command>, issue the following command as the
235 <systemitem class="username">root</systemitem> user:
236 </para>
[e807ae1d]237
[bca744f]238<screen role="root"><userinput>sed -i 's/yes/no/' /etc/default/useradd</userinput></screen>
[e807ae1d]239 </sect2>
[1189cb89]240-->
[322f172]241 <sect2 role="configuration">
242 <title>Configuring Linux-PAM to Work with Shadow</title>
[b4b71892]243
[8f68b03]244 <note>
[9a3142c]245 <para>
246 The rest of this page is devoted to configuring
247 <application>Shadow</application> to work properly with
248 <application>Linux-PAM</application>. If you do not have
249 <application>Linux-PAM</application> installed, and you reinstalled
250 <application>Shadow</application> to support strong passwords via the
251 <application>CrackLib</application> library, no further configuration is
252 required.
253 </para>
[8f68b03]254 </note>
255
[322f172]256 <sect3 id="pam.d">
257 <title>Config Files</title>
[b4b71892]258
[9a3142c]259 <para>
260 <filename>/etc/pam.d/*</filename> or alternatively
261 <filename>/etc/pam.conf</filename>,
262 <filename>/etc/login.defs</filename> and
263 <filename>/etc/security/*</filename>
264 </para>
[b4b71892]265
[322f172]266 <indexterm zone="shadow pam.d">
267 <primary sortas="e-etc-pam.d">/etc/pam.d/*</primary>
268 </indexterm>
[2197589]269
[322f172]270 <indexterm zone="shadow pam.d">
271 <primary sortas="e-etc-pam.conf">/etc/pam.conf</primary>
272 </indexterm>
[4fcf20a5]273
[1ba671c]274 <indexterm zone="shadow pam.d">
275 <primary sortas="e-etc-login.defs">/etc/login.defs</primary>
276 </indexterm>
277
278 <indexterm zone="shadow pam.d">
279 <primary sortas="e-etc-security">/etc/security/*</primary>
280 </indexterm>
[322f172]281 </sect3>
282
283 <sect3>
284 <title>Configuration Information</title>
285
[9a3142c]286 <para>
287 Configuring your system to use <application>Linux-PAM</application> can
288 be a complex task. The information below will provide a basic setup so
289 that <application>Shadow</application>'s login and password
290 functionality will work effectively with
291 <application>Linux-PAM</application>. Review the information and links
292 on the <xref linkend="linux-pam"/> page for further configuration
293 information. For information specific to integrating
294 <application>Shadow</application>, <application>Linux-PAM</application>
[19d6c39]295 and <application>libpwquality</application>, you can visit the
296 following link:
[9a3142c]297 </para>
[8f68b03]298
299 <itemizedlist spacing="compact">
[9a3142c]300 <listitem>
[18f18c2]301 <!-- New URL for the below link, according to it's author. -->
[9a3142c]302 <para>
[18f18c2]303 <ulink url="http://www.deer-run.com/~hal/linux_passwords_pam.html"/>
[9a3142c]304 </para>
305 </listitem>
[8f68b03]306 </itemizedlist>
307
[1ba671c]308 <sect4 id="pam-login-defs">
309 <title>Configuring /etc/login.defs</title>
310
[9a3142c]311 <para>
312 The <command>login</command> program currently performs many functions
313 which <application>Linux-PAM</application> modules should now handle.
314 The following <command>sed</command> command will comment out the
315 appropriate lines in <filename>/etc/login.defs</filename>, and stop
316 <command>login</command> from performing these functions (a backup
317 file named <filename>/etc/login.defs.orig</filename> is also created
318 to preserve the original file's contents). Issue the following
319 commands as the <systemitem class="username">root</systemitem> user:
320 </para>
[1ba671c]321
322 <indexterm zone="shadow pam-login-defs">
323 <primary sortas="e-etc-login.defs">/etc/login.defs</primary>
324 </indexterm>
325
326<screen role="root"><userinput>install -v -m644 /etc/login.defs /etc/login.defs.orig &amp;&amp;
[265c7da]327for FUNCTION in FAIL_DELAY \
328 FAILLOG_ENAB \
329 LASTLOG_ENAB \
330 MAIL_CHECK_ENAB \
331 OBSCURE_CHECKS_ENAB \
332 PORTTIME_CHECKS_ENAB \
333 QUOTAS_ENAB \
334 CONSOLE MOTD_FILE \
335 FTMP_FILE NOLOGINS_FILE \
336 ENV_HZ PASS_MIN_LEN \
337 SU_WHEEL_ONLY \
338 CRACKLIB_DICTPATH \
339 PASS_CHANGE_TRIES \
340 PASS_ALWAYS_WARN \
[574d896d]341 CHFN_AUTH ENCRYPT_METHOD \
342 ENVIRON_FILE
[1ba671c]343do
[9a3142c]344 sed -i "s/^${FUNCTION}/# &amp;/" /etc/login.defs
[1ba671c]345done</userinput></screen>
346 </sect4>
347
348 <sect4>
349 <title>Configuring the /etc/pam.d/ Files</title>
350
[9a3142c]351 <para>
352 As mentioned previously in the <application>Linux-PAM</application>
353 instructions, <application>Linux-PAM</application> has two supported
354 methods for configuration. The commands below assume that you've
355 chosen to use a directory based configuration, where each program has
356 its own configuration file. You can optionally use a single
357 <filename>/etc/pam.conf</filename> configuration file by using the
358 text from the files below, and supplying the program name as an
359 additional first field for each line.
360 </para>
[1ba671c]361
[9a3142c]362 <para>
[bd2412e]363 As the <systemitem class="username">root</systemitem> user, create
[9a3142c]364 the following <application>Linux-PAM</application> configuration files
365 in the <filename class="directory">/etc/pam.d/</filename> directory
366 (or add the contents to the <filename>/etc/pam.conf</filename> file)
367 using the following commands:
368 </para>
[1ba671c]369 </sect4>
[322f172]370
371 <sect4>
[3e8fb4c]372 <title>'login'</title>
373
374<screen role="root"><userinput>cat &gt; /etc/pam.d/login &lt;&lt; "EOF"
375<literal># Begin /etc/pam.d/login
376
377# Set failure delay before next prompt to 3 seconds
378auth optional pam_faildelay.so delay=3000000
379
380# Check to make sure that the user is allowed to login
381auth requisite pam_nologin.so
382
[0d7900a]383# Check to make sure that root is allowed to login
[d265d4c]384# Disabled by default. You will need to create /etc/securetty
385# file for this module to function. See man 5 securetty.
386#auth required pam_securetty.so
[3e8fb4c]387
388# Additional group memberships - disabled by default
389#auth optional pam_group.so
390
[a5b9f1e]391# include system auth settings
[3e8fb4c]392auth include system-auth
393
394# check access for the user
395account required pam_access.so
396
[a5b9f1e]397# include system account settings
[3e8fb4c]398account include system-account
399
400# Set default environment variables for the user
401session required pam_env.so
402
403# Set resource limits for the user
404session required pam_limits.so
405
406# Display date of last login - Disabled by default
407#session optional pam_lastlog.so
408
409# Display the message of the day - Disabled by default
410#session optional pam_motd.so
411
412# Check user's mail - Disabled by default
413#session optional pam_mail.so standard quiet
414
[a5b9f1e]415# include system session and password settings
[3e8fb4c]416session include system-session
417password include system-password
418
419# End /etc/pam.d/login</literal>
420EOF</userinput></screen>
421 </sect4>
422
423 <sect4>
424 <title>'passwd'</title>
[4fcf20a5]425
[322f172]426<screen role="root"><userinput>cat &gt; /etc/pam.d/passwd &lt;&lt; "EOF"
427<literal># Begin /etc/pam.d/passwd
[4fcf20a5]428
[3e8fb4c]429password include system-password
[b4b71892]430
[322f172]431# End /etc/pam.d/passwd</literal>
432EOF</userinput></screen>
433 </sect4>
[4fcf20a5]434
[922e013]435 <sect4>
436 <title>'su'</title>
437
[7af20d4]438<screen role="root"><userinput>cat &gt; /etc/pam.d/su &lt;&lt; "EOF"
[922e013]439<literal># Begin /etc/pam.d/su
440
441# always allow root
442auth sufficient pam_rootok.so
443
444# Allow users in the wheel group to execute su without a password
445# disabled by default
446#auth sufficient pam_wheel.so trust use_uid
447
448# include system auth settings
449auth include system-auth
450
451# limit su to users in the wheel group
[d32d872]452# disabled by default
453#auth required pam_wheel.so use_uid
[922e013]454
455# include system account settings
456account include system-account
457
458# Set default environment variables for the service user
459session required pam_env.so
460
461# include system session settings
462session include system-session
463
464# End /etc/pam.d/su</literal>
465EOF</userinput></screen>
466 </sect4>
467
[bc7e5a7]468 <sect4>
469 <title>'chpasswd' and 'newusers'</title>
470
471<screen role="root"><userinput>cat &gt; /etc/pam.d/chpasswd &lt;&lt; "EOF"
472<literal># Begin /etc/pam.d/chpasswd
473
474# always allow root
475auth sufficient pam_rootok.so
476
477# include system auth and account settings
478auth include system-auth
479account include system-account
480password include system-password
481
482# End /etc/pam.d/chpasswd</literal>
483EOF
484
[c26cfe08]485sed -e s/chpasswd/newusers/ /etc/pam.d/chpasswd >/etc/pam.d/newusers</userinput></screen>
[bc7e5a7]486 </sect4>
487
[322f172]488 <sect4>
489 <title>'chage'</title>
490
491<screen role="root"><userinput>cat &gt; /etc/pam.d/chage &lt;&lt; "EOF"
[2f12da13]492<literal># Begin /etc/pam.d/chage
[3e8fb4c]493
494# always allow root
495auth sufficient pam_rootok.so
496
[bc7e5a7]497# include system auth and account settings
[3e8fb4c]498auth include system-auth
499account include system-account
[b4b71892]500
[322f172]501# End /etc/pam.d/chage</literal>
502EOF</userinput></screen>
503 </sect4>
[b4b71892]504
[322f172]505 <sect4>
[bc7e5a7]506 <title>Other shadow utilities</title>
[39975e9]507
[bc7e5a7]508<screen role="root"><userinput>for PROGRAM in chfn chgpasswd chsh groupadd groupdel \
509 groupmems groupmod useradd userdel usermod
[4fcf20a5]510do
[9a3142c]511 install -v -m644 /etc/pam.d/chage /etc/pam.d/${PROGRAM}
512 sed -i "s/chage/$PROGRAM/" /etc/pam.d/${PROGRAM}
[322f172]513done</userinput></screen>
514
515 <warning>
[9a3142c]516 <para>
517 At this point, you should do a simple test to see if
518 <application>Shadow</application> is working as expected. Open
[cacd76ad]519 another terminal and log in as
520 <systemitem class="username">root</systemitem>, and then run
521 <command>login</command> and login as another user. If you do
522 not see any errors, then all is well and you should proceed with
523 the rest of the configuration. If you did receive errors, stop
524 now and double check the above configuration files manually.
525 Any error is the sign of an error in the above procedure.
[e6ae99a]526 You can also run the
[cacd76ad]527 test suite from the <application>Linux-PAM</application> package
528 to assist you in determining the problem. If you cannot find and
529 fix the error, you should recompile
530 <application>Shadow</application> adding the
531 <option>--without-libpam</option> switch to the
532 <command>configure</command> command in the above instructions
533 (also move the <filename>/etc/login.defs.orig</filename> backup
534 file to <filename>/etc/login.defs</filename>). If you fail to do
535 this and the errors remain, you will be unable to log into your
536 system.
[9a3142c]537 </para>
[322f172]538 </warning>
[349b53dd]539 </sect4>
540
[322f172]541 <sect4 id="pam-access">
542 <title>Configuring Login Access</title>
[4fcf20a5]543
[9a3142c]544 <para>
545 Instead of using the <filename>/etc/login.access</filename> file for
546 controlling access to the system, <application>Linux-PAM</application>
547 uses the <filename class='libraryfile'>pam_access.so</filename> module
548 along with the <filename>/etc/security/access.conf</filename> file.
549 Rename the <filename>/etc/login.access</filename> file using the
550 following command:
551 </para>
[322f172]552
553 <indexterm zone="shadow pam-access">
554 <primary sortas="e-etc-security-access.conf">/etc/security/access.conf</primary>
555 </indexterm>
556
[9a3142c]557<screen role="root"><userinput>[ -f /etc/login.access ] &amp;&amp; mv -v /etc/login.access{,.NOUSE}</userinput></screen>
[322f172]558 </sect4>
559
560 <sect4 id="pam-limits">
561 <title>Configuring Resource Limits</title>
562
[9a3142c]563 <para>
564 Instead of using the <filename>/etc/limits</filename> file for
565 limiting usage of system resources,
566 <application>Linux-PAM</application> uses the
567 <filename class='libraryfile'>pam_limits.so</filename> module along
568 with the <filename>/etc/security/limits.conf</filename> file. Rename
569 the <filename>/etc/limits</filename> file using the following command:
570 </para>
[322f172]571
572 <indexterm zone="shadow pam-limits">
573 <primary sortas="e-etc-security-limits.conf">/etc/security/limits.conf</primary>
574 </indexterm>
575
[9a3142c]576<screen role="root"><userinput>[ -f /etc/limits ] &amp;&amp; mv -v /etc/limits{,.NOUSE}</userinput></screen>
[74f20a1]577
[bd2412e]578 <caution>
579 <para>
580 Be sure to test the login capabilities of the system before logging
581 out. Errors in the configuration can cause a permanent
582 lockout requiring a boot from an external source to correct the
583 problem.
584 </para>
585 </caution>
[74f20a1]586
[322f172]587 </sect4>
588 </sect3>
[74f20a1]589
[322f172]590 </sect2>
[f45b1953]591
[322f172]592 <sect2 role="content">
593 <title>Contents</title>
[17fb537e]594
[9a3142c]595 <para>
596 A list of the installed files, along with their short descriptions can be
[f586237]597 found at
[50836740]598 <ulink url="&lfs-root;/chapter08/shadow.html#contents-shadow"/>.
[9a3142c]599 </para>
[c627795]600
[322f172]601 </sect2>
[c627795]602
[f45b1953]603</sect1>
Note: See TracBrowser for help on using the repository browser.