source: postlfs/security/shadow.xml@ 60db080

10.0 10.1 11.0 11.1 11.2 11.3 12.0 12.1 6.3 6.3-rc1 6.3-rc2 6.3-rc3 7.10 7.4 7.5 7.6 7.6-blfs 7.6-systemd 7.7 7.8 7.9 8.0 8.1 8.2 8.3 8.4 9.0 9.1 basic bdubbs/svn elogind gnome kde5-13430 kde5-14269 kde5-14686 kea ken/TL2024 ken/inkscape-core-mods ken/tuningfonts krejzi/svn lazarus lxqt nosym perl-modules plabs/newcss plabs/python-mods python3.11 qt5new rahul/power-profiles-daemon renodr/vulkan-addition systemd-11177 systemd-13485 trunk upgradedb xry111/intltool xry111/llvm18 xry111/soup3 xry111/test-20220226 xry111/xf86-video-removal
Last change on this file since 60db080 was 62c3673, checked in by Randy McMurchy <randy@…>, 17 years ago

Removed broken FTP download URL in the Shadow instructions

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@6982 af4574ff-66df-0310-9fd7-8a98e5e911e0

  • Property mode set to 100644
File size: 23.5 KB
Line 
1<?xml version="1.0" encoding="ISO-8859-1"?>
2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
6
7 <!-- <!ENTITY shadow-download-http "http://ftp.pld.org.pl/software/shadow/old/shadow-&shadow-version;.tar.bz2"> -->
8 <!-- <!ENTITY shadow-download-ftp "ftp://ftp.pld.org.pl/software/shadow/shadow-&shadow-version;.tar.bz2"> -->
9 <!ENTITY shadow-download-http "http://cross-lfs.org/files/packages/svn/shadow-&shadow-version;.tar.bz2">
10 <!ENTITY shadow-download-ftp " ">
11 <!ENTITY shadow-md5sum "e7751d46ecf219c07ae0b028ab3335c6">
12 <!ENTITY shadow-size "1.5 MB">
13 <!ENTITY shadow-buildsize "18 MB">
14 <!ENTITY shadow-time "0.3 SBU">
15]>
16
17<sect1 id="shadow" xreflabel="Shadow-&shadow-version;">
18 <?dbhtml filename="shadow.html"?>
19
20 <sect1info>
21 <othername>$LastChangedBy$</othername>
22 <date>$Date$</date>
23 </sect1info>
24
25 <title>Shadow-&shadow-version;</title>
26
27 <indexterm zone="shadow">
28 <primary sortas="a-Shadow">Shadow</primary>
29 </indexterm>
30
31 <sect2 role="package">
32 <title>Introduction to Shadow</title>
33
34 <para><application>Shadow</application> was indeed installed in LFS and
35 there is no reason to reinstall it unless you installed
36 <application>CrackLib</application> or
37 <application>Linux-PAM</application> after your LFS system was completed.
38 If you have installed <application>CrackLib</application> after LFS, then
39 reinstalling <application>Shadow</application> will enable strong password
40 support. If you have installed <application>Linux-PAM</application>,
41 reinstalling <application>Shadow</application> will allow programs such as
42 <command>login</command> and <command>su</command> to utilize PAM.</para>
43
44 <bridgehead renderas="sect3">Package Information</bridgehead>
45 <itemizedlist spacing="compact">
46 <listitem>
47 <para>Download (HTTP): <ulink url="&shadow-download-http;"/></para>
48 </listitem>
49 <listitem>
50 <para>Download (FTP): <ulink url="&shadow-download-ftp;"/></para>
51 </listitem>
52 <listitem>
53 <para>Download MD5 sum: &shadow-md5sum;</para>
54 </listitem>
55 <listitem>
56 <para>Download size: &shadow-size;</para>
57 </listitem>
58 <listitem>
59 <para>Estimated disk space required: &shadow-buildsize;</para>
60 </listitem>
61 <listitem>
62 <para>Estimated build time: &shadow-time;</para>
63 </listitem>
64 </itemizedlist>
65
66 <bridgehead renderas="sect3">Additional Downloads</bridgehead>
67 <itemizedlist spacing='compact'>
68 <listitem>
69 <para>Required patch: <ulink
70 url="&patch-root;/shadow-&shadow-version;-useradd_fix-2.patch"/></para>
71 </listitem>
72 </itemizedlist>
73
74 <bridgehead renderas="sect3">Shadow Dependencies</bridgehead>
75
76 <bridgehead renderas="sect4">Required</bridgehead>
77 <para role="required"><xref linkend="linux-pam"/> and/or
78 <xref linkend="cracklib"/></para>
79
80 <para condition="html" role="usernotes">User Notes:
81 <ulink url="&blfs-wiki;/shadow"/></para>
82
83 </sect2>
84
85 <sect2 role="installation">
86 <title>Installation of Shadow</title>
87
88 <important>
89 <para>The installation shown below is for a situation where
90 <application>Linux-PAM</application> has been installed (with or
91 without a <application>CrackLib</application> installation) and
92 <application>Shadow</application> is being reinstalled to support the
93 <application>Linux-PAM</application> installation. If you are
94 reinstalling <application>Shadow</application> to provide strong
95 password support via the <application>CrackLib</application> library
96 and you have not installed <application>Linux-PAM</application>, ensure
97 you add the <parameter>--with-libcrack</parameter> parameter to the
98 <command>configure</command> script below.</para>
99 </important>
100
101 <para>Reinstall <application>Shadow</application> by running the following
102 commands:</para>
103
104<screen><userinput>patch -Np1 -i ../shadow-&shadow-version;-useradd_fix-2.patch &amp;&amp;
105
106./configure --libdir=/lib \
107 --sysconfdir=/etc \
108 --enable-shared \
109 --without-selinux &amp;&amp;
110
111sed -i 's/groups$(EXEEXT) //' src/Makefile &amp;&amp;
112find man -name Makefile -exec sed -i 's/groups\.1 / /' {} \; &amp;&amp;
113sed -i -e 's/ ko//' -e 's/ zh_CN zh_TW//' man/Makefile &amp;&amp;
114
115for i in de es fi fr id it pt_BR; do
116 convert-mans UTF-8 ISO-8859-1 man/${i}/*.?
117done &amp;&amp;
118
119for i in cs hu pl; do
120 convert-mans UTF-8 ISO-8859-2 man/${i}/*.?
121done &amp;&amp;
122
123convert-mans UTF-8 EUC-JP man/ja/*.? &amp;&amp;
124convert-mans UTF-8 KOI8-R man/ru/*.? &amp;&amp;
125convert-mans UTF-8 ISO-8859-9 man/tr/*.? &amp;&amp;
126
127make</userinput></screen>
128
129 <para>This package does not come with a test suite.</para>
130
131 <para>Now, as the <systemitem class="username">root</systemitem> user:</para>
132
133<screen role="root"><userinput>make install &amp;&amp;
134mv -v /usr/bin/passwd /bin &amp;&amp;
135mv -v /lib/libshadow.*a /usr/lib &amp;&amp;
136rm -v /lib/libshadow.so &amp;&amp;
137ln -v -sf ../../lib/libshadow.so.0 /usr/lib/libshadow.so</userinput></screen>
138
139 </sect2>
140
141 <sect2 role="commands">
142 <title>Command Explanations</title>
143
144 <!-- Removed the -with-libpam and -without-libcrack options from the
145 default as these are the defaults. Pam will automatically be picked
146 up if it is installed, and CrackLib won't be used unless specifically
147 requested via -with-libcrack
148 <para><parameter>-without-libcrack</parameter>: This switch tells
149 <application>Shadow</application> not to use
150 <filename class='libraryfile'>libcrack</filename>. This is desired as
151 <application>Linux-PAM</application> will provide
152 <filename class='libraryfile'>libcrack</filename> functionality.</para>
153 -->
154
155 <para><parameter>--without-selinux</parameter>: Support for selinux is
156 enabled by default, but selinux is not built in a base LFS system. The
157 <command>configure</command> script will fail if this option is not
158 used.</para>
159
160 <para><command>sed -i 's/groups$(EXEEXT) //' src/Makefile</command>: This
161 command is used to suppress the installation of the
162 <command>groups</command> program as the version from the
163 <application>Coreutils</application> package installed during LFS is
164 preferred.</para>
165
166 <para><command>find man -name Makefile -exec ... {} \;</command>: This
167 command is used to suppress the installation of the
168 <command>groups</command> man pages so the existing ones installed from
169 the <application>Coreutils</application> package are not replaced.</para>
170
171 <para><command>sed -i -e '...' -e '...' man/Makefile</command>: This
172 command disables the installation of Chinese and Korean manual pages, since
173 <application>Man-DB</application> cannot format them properly.</para>
174
175 <para><command>convert-mans ...</command>: These commands are used to
176 convert some of the man pages so that <application>Man-DB</application>
177 will display them in the expected encodings.</para>
178
179 <para><command>mv -v /usr/bin/passwd /bin</command>: The
180 <command>passwd</command> program may be needed during times when the
181 <filename class='directory'>/usr</filename> filesystem is not mounted so
182 it is moved into the root partition.</para>
183
184 <para><command>mv -v ...; rm -v ...; ln -v ...</command>: These commands
185 are used to move the <filename class='libraryfile'>libshadow</filename>
186 library to the root partition to support the moving of the
187 <command>passwd</command> program earlier.</para>
188
189 </sect2>
190
191 <sect2 role="configuration">
192 <title>Configuring Shadow</title>
193
194 <para><application>Shadow</application>'s stock configuration for the
195 <command>useradd</command> utility is not suitable for LFS systems. Use the
196 following commands as the <systemitem class="username">root</systemitem>
197 user to change the default home directory for new users and prevent the
198 creation of mail spool files:</para>
199
200<screen role="root"><userinput>useradd -D -b /home &amp;&amp;
201sed -i 's/yes/no/' /etc/default/useradd</userinput></screen>
202
203 </sect2>
204
205 <sect2 role="configuration">
206 <title>Configuring Linux-PAM to Work with Shadow</title>
207
208 <note>
209 <para>The rest of this page is devoted to configuring
210 <application>Shadow</application> to work properly with
211 <application>Linux-PAM</application>. If you do not have
212 <application>Linux-PAM</application> installed, and you reinstalled
213 <application>Shadow</application> to support strong passwords via
214 the <application>CrackLib</application> library, no further configuration
215 is required.</para>
216 </note>
217
218 <sect3 id="pam.d">
219 <title>Config Files</title>
220
221 <para><filename>/etc/pam.d/*</filename> or alternatively
222 <filename>/etc/pam.conf, /etc/login.defs and
223 /etc/security/*</filename></para>
224
225 <indexterm zone="shadow pam.d">
226 <primary sortas="e-etc-pam.d">/etc/pam.d/*</primary>
227 </indexterm>
228
229 <indexterm zone="shadow pam.d">
230 <primary sortas="e-etc-pam.conf">/etc/pam.conf</primary>
231 </indexterm>
232
233 <indexterm zone="shadow pam.d">
234 <primary sortas="e-etc-login.defs">/etc/login.defs</primary>
235 </indexterm>
236
237 <indexterm zone="shadow pam.d">
238 <primary sortas="e-etc-security">/etc/security/*</primary>
239 </indexterm>
240
241 </sect3>
242
243 <sect3>
244 <title>Configuration Information</title>
245
246 <para>Configuring your system to use <application>Linux-PAM</application>
247 can be a complex task. The information below will provide a basic setup
248 so that <application>Shadow</application>'s login and password
249 functionality will work effectively with
250 <application>Linux-PAM</application>. Review the information and links on
251 the <xref linkend="linux-pam"/> page for further configuration
252 information. For information specific to integrating
253 <application>Shadow</application>, <application>Linux-PAM</application>
254 and <application>CrackLib</application>, you can visit the following
255 links:</para>
256
257 <itemizedlist spacing="compact">
258 <listitem>
259 <para><ulink
260 url="http://www.kernel.org/pub/linux/libs/pam/Linux-PAM-html/pam-6.html#ss6.3"/></para>
261 </listitem>
262 <listitem>
263 <para><ulink
264 url="http://www.deer-run.com/~hal/sysadmin/pam_cracklib.html"/></para>
265 </listitem>
266 </itemizedlist>
267
268 <sect4 id="pam-login-defs">
269 <title>Configuring /etc/login.defs</title>
270
271 <para>The <command>login</command> program currently performs many
272 functions which <application>Linux-PAM</application> modules should
273 now handle. The following <command>sed</command> command will comment
274 out the appropriate lines in <filename>/etc/login.defs</filename>, and
275 stop <command>login</command> from performing these functions (a backup
276 file named <filename>/etc/login.defs.orig</filename> is also created
277 to preserve the original file's contents). Issue the following commands
278 as the <systemitem class="username">root</systemitem> user:</para>
279
280 <indexterm zone="shadow pam-login-defs">
281 <primary sortas="e-etc-login.defs">/etc/login.defs</primary>
282 </indexterm>
283
284<screen role="root"><userinput>install -v -m644 /etc/login.defs /etc/login.defs.orig &amp;&amp;
285for FUNCTION in LASTLOG_ENAB MAIL_CHECK_ENAB \
286 PORTTIME_CHECKS_ENAB CONSOLE \
287 MOTD_FILE NOLOGINS_FILE PASS_MIN_LEN \
288 SU_WHEEL_ONLY MD5_CRYPT_ENAB \
289 CONSOLE_GROUPS ENVIRON_FILE \
290 ULIMIT ENV_TZ ENV_HZ ENV_SUPATH \
291 ENV_PATH QMAIL_DIR MAIL_DIR MAIL_FILE \
292 CHFN_AUTH FAILLOG_ENAB QUOTAS_ENAB FTMP_FILE \
293 OBSCURE_CHECKS_ENAB CRACKLIB_DICTPATH \
294 PASS_CHANGE_TRIES PASS_ALWAYS_WARN ISSUE_FILE
295do
296 sed -i "s/^$FUNCTION/# &amp;/" /etc/login.defs
297done</userinput></screen>
298
299 <!-- Moved the commenting of these four parameters into the section
300 above. If PAM is installed, it complains if these are not commented
301 regardless if CrackLib is installed.
302
303 <para>If you have <application>CrackLib</application> installed,
304 also comment out four more lines using the following command as the
305 <systemitem class="username">root</systemitem> user:</para>
306
307<screen role="root"><userinput>for FUNCTION in OBSCURE_CHECKS_ENAB CRACKLIB_DICTPATH \
308 PASS_CHANGE_TRIES PASS_ALWAYS_WARN
309do
310 sed -i "s/^$FUNCTION/# &amp;/" /etc/login.defs
311done</userinput></screen>
312
313 -->
314
315 </sect4>
316
317 <sect4>
318 <title>Configuring the /etc/pam.d/ Files</title>
319
320 <para>As mentioned previously in the
321 <application>Linux-PAM</application> instructions,
322 <application>Linux-PAM</application> has two supported methods for
323 configuration. The commands below assume that you've chosen to use
324 a directory based configuration, where each program has its own
325 configuration file. You can optionally use a single
326 <filename>/etc/pam.conf</filename> configuration file by using the
327 text from the files below, and supplying the program name as an
328 additional first field for each line.</para>
329
330 <para>As the <systemitem class="username">root</systemitem> user,
331 create the <filename class="directory">/etc/pam.d</filename>
332 directory with the following command:</para>
333
334 <screen role="root"><userinput>install -v -d -m755 /etc/pam.d</userinput></screen>
335
336 <para>While still the <systemitem class="username">root</systemitem>
337 user, add the following <application>Linux-PAM</application>
338 configuration files to the
339 <filename class="directory">/etc/pam.d/</filename> directory (or
340 add the contents to the <filename>/etc/pam.conf</filename> file) with
341 the following commands:</para>
342
343 </sect4>
344
345 <sect4>
346 <title>'login' (with CrackLib)</title>
347
348<screen role="root"><userinput>cat &gt; /etc/pam.d/login &lt;&lt; "EOF"
349<literal># Begin /etc/pam.d/login
350
351auth requisite pam_nologin.so
352auth required pam_securetty.so
353auth required pam_unix.so
354account required pam_access.so
355account required pam_unix.so
356session required pam_env.so
357session required pam_motd.so
358session required pam_limits.so
359session optional pam_mail.so dir=/var/mail standard
360session optional pam_lastlog.so
361session required pam_unix.so
362password required pam_cracklib.so retry=3
363password required pam_unix.so md5 shadow use_authtok
364
365# End /etc/pam.d/login</literal>
366EOF</userinput></screen>
367
368 </sect4>
369
370 <sect4>
371 <title>'login' (without CrackLib)</title>
372
373<screen role="root"><userinput>cat &gt; /etc/pam.d/login &lt;&lt; "EOF"
374<literal># Begin /etc/pam.d/login
375
376auth requisite pam_nologin.so
377auth required pam_securetty.so
378auth required pam_env.so
379auth required pam_unix.so
380account required pam_access.so
381account required pam_unix.so
382session required pam_motd.so
383session required pam_limits.so
384session optional pam_mail.so dir=/var/mail standard
385session optional pam_lastlog.so
386session required pam_unix.so
387password required pam_unix.so md5 shadow
388
389# End /etc/pam.d/login</literal>
390EOF</userinput></screen>
391
392 </sect4>
393
394 <sect4>
395 <title>'passwd' (with CrackLib)</title>
396
397<screen role="root"><userinput>cat &gt; /etc/pam.d/passwd &lt;&lt; "EOF"
398<literal># Begin /etc/pam.d/passwd
399
400password required pam_cracklib.so type=Linux retry=1 \
401 difok=5 diffignore=23 minlen=9 \
402 dcredit=1 ucredit=1 lcredit=1 \
403 ocredit=1 \
404 dictpath=/lib/cracklib/pw_dict
405password required pam_unix.so md5 shadow use_authtok
406
407# End /etc/pam.d/passwd</literal>
408EOF</userinput></screen>
409
410 <note><para>In its default configuration, owing to credits,
411 pam_cracklib will allow multiple case passwords as short as 6
412 characters, even with the <parameter>minlen</parameter> value
413 set to 11. You should review the pam_cracklib(8) man page and
414 determine if these default values are acceptable for the security
415 of your system.</para></note>
416
417 </sect4>
418
419 <sect4>
420 <title>'passwd' (without CrackLib)</title>
421
422<screen role="root"><userinput>cat &gt; /etc/pam.d/passwd &lt;&lt; "EOF"
423<literal># Begin /etc/pam.d/passwd
424
425password required pam_unix.so md5 shadow
426
427# End /etc/pam.d/passwd</literal>
428EOF</userinput></screen>
429
430 </sect4>
431
432 <sect4>
433 <title>'su'</title>
434
435<screen role="root"><userinput>cat &gt; /etc/pam.d/su &lt;&lt; "EOF"
436<literal># Begin /etc/pam.d/su
437
438auth sufficient pam_rootok.so
439auth required pam_unix.so
440account required pam_unix.so
441session optional pam_mail.so dir=/var/mail standard
442session required pam_env.so
443session required pam_unix.so
444
445# End /etc/pam.d/su</literal>
446EOF</userinput></screen>
447
448 </sect4>
449
450 <sect4>
451 <title>'chage'</title>
452
453<screen role="root"><userinput>cat &gt; /etc/pam.d/chage &lt;&lt; "EOF"
454<literal># Begin /etc/pam.d/chage
455
456auth sufficient pam_rootok.so
457auth required pam_unix.so
458account required pam_unix.so
459session required pam_unix.so
460password required pam_permit.so
461
462# End /etc/pam.d/chage</literal>
463EOF</userinput></screen>
464
465 </sect4>
466
467 <sect4>
468 <title>'chpasswd', 'chgpasswd', 'groupadd', 'groupdel', 'groupmems',
469 'groupmod', 'newusers', 'useradd', 'userdel', and 'usermod'</title>
470
471<screen role="root"><userinput>for PROGRAM in chpasswd chgpasswd groupadd groupdel groupmems \
472 groupmod newusers useradd userdel usermod
473do
474 install -v -m644 /etc/pam.d/chage /etc/pam.d/$PROGRAM
475 sed -i "s/chage/$PROGRAM/" /etc/pam.d/$PROGRAM
476done</userinput></screen>
477
478 <warning>
479 <para>At this point, you should do a simple test to see if
480 <application>Shadow</application> is working as expected. Open
481 another terminal and log in as a user, then <command>su</command> to
482 <systemitem class="username">root</systemitem>. If you do not see any
483 errors, then all is well and you should proceed with the rest of the
484 configuration. If you did receive errors, stop now and double check
485 the above configuration files manually. You can also run the test
486 suite from the <application>Linux-PAM</application> package to assist
487 you in determining the problem. If you cannot find and
488 fix the error, you should recompile <application>Shadow</application>
489 replacing <option>--with-libpam</option> with
490 <option>--without-libpam</option> in the above instructions (also move
491 the <filename>/etc/login.defs.orig</filename> backup file to
492 <filename>/etc/login.defs</filename>). If you
493 fail to do this and the errors remain, you will be unable to log into
494 your system.</para>
495 </warning>
496
497 </sect4>
498
499 <sect4>
500 <title>Other</title>
501
502 <para>Currently, <filename>/etc/pam.d/other</filename> is configured
503 to allow anyone with an account on the machine to use PAM-aware
504 programs without a configuration file for that program. After testing
505 <application>Linux-PAM</application> for proper configuration, install
506 a more restrictive <filename>other</filename> file so that
507 program-specific configuration files are required:</para>
508
509<screen role="root"><userinput>cat &gt; /etc/pam.d/other &lt;&lt; "EOF"
510<literal># Begin /etc/pam.d/other
511
512auth required pam_deny.so
513auth required pam_warn.so
514account required pam_deny.so
515session required pam_deny.so
516password required pam_deny.so
517password required pam_warn.so
518
519# End /etc/pam.d/other</literal>
520EOF</userinput></screen>
521
522 <para>If you preserved the source tree from the
523 <application>Linux-PAM</application> package (or you feel like unpacking
524 that tarball, then running <command>configure</command> and
525 <command>make</command>), now would be a good time to run the test
526 suite from this package. This test suite will use the configuration you
527 just finished during the tests. All the tests should pass.</para>
528
529 </sect4>
530
531 <sect4 id="pam-access">
532 <title>Configuring Login Access</title>
533
534 <para>Instead of using the <filename>/etc/login.access</filename>
535 file for controlling access to the system,
536 <application>Linux-PAM</application> uses the
537 <filename class='libraryfile'>pam_access.so</filename> module along
538 with the <filename>/etc/security/access.conf</filename> file. Rename
539 the <filename>/etc/login.access</filename> file using the following
540 command:</para>
541
542 <indexterm zone="shadow pam-access">
543 <primary sortas="e-etc-security-access.conf">/etc/security/access.conf</primary>
544 </indexterm>
545
546<screen role="root"><userinput>if [ -f /etc/login.access ]; then
547 mv -v /etc/login.access /etc/login.access.NOUSE
548fi</userinput></screen>
549
550 </sect4>
551
552 <sect4 id="pam-limits">
553 <title>Configuring Resource Limits</title>
554
555 <para>Instead of using the <filename>/etc/limits</filename> file
556 for limiting usage of system resources,
557 <application>Linux-PAM</application> uses the
558 <filename class='libraryfile'>pam_limits.so</filename> module along
559 with the <filename>/etc/security/limits.conf</filename> file. Rename
560 the <filename>/etc/limits</filename> file using the following
561 command:</para>
562
563 <indexterm zone="shadow pam-limits">
564 <primary sortas="e-etc-security-limits.conf">/etc/security/limits.conf</primary>
565 </indexterm>
566
567<screen role="root"><userinput>if [ -f /etc/limits ]; then
568 mv -v /etc/limits /etc/limits.NOUSE
569fi</userinput></screen>
570
571 </sect4>
572
573 <sect4 id="pam-env">
574 <title>Configuring Default Environment</title>
575
576 <para>During previous configuration, several items were removed from
577 <filename>/etc/login.defs</filename>. Some of these items are now
578 controlled by the <filename class='libraryfile'>pam_env.so</filename>
579 module and the <filename>/etc/security/pam_env.conf</filename>
580 configuration file. In particular, the default path has been
581 changed. To recover your default path, execute the following
582 commands:</para>
583
584<screen role="root"><userinput>ENV_PATH=`grep '^ENV_PATH' /etc/login.defs.orig | \
585 awk '{ print $2 }' | sed 's/PATH=//'` &amp;&amp;
586echo 'PATH DEFAULT='`echo "${ENV_PATH}"`\
587' OVERRIDE=${PATH}' \
588 >> /etc/security/pam_env.conf &amp;&amp;
589unset ENV_PATH</userinput></screen>
590
591 <note>
592 <para>ENV_SUPATH is no longer supported. You must create
593 a valid <filename>/root/.bashrc</filename> file to provide a
594 modified path for the super-user.</para>
595 </note>
596
597 </sect4>
598
599 </sect3>
600
601 </sect2>
602
603 <sect2 role="content">
604 <title>Contents</title>
605
606 <para>A list of the installed files, along with their short descriptions
607 can be found at
608 <ulink url="&lfs-root;/chapter06/shadow.html#contents-shadow"/>.</para>
609
610 </sect2>
611
612</sect1>
Note: See TracBrowser for help on using the repository browser.