- Timestamp:
- 09/27/2003 02:37:14 AM (21 years ago)
- Branches:
- 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 6.0, 6.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, v5_0, v5_0-pre1, v5_1, v5_1-pre1, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
- Children:
- 4e0d045
- Parents:
- 64b92847
- Location:
- postlfs/security
- Files:
-
- 5 edited
Legend:
- Unmodified
- Added
- Removed
-
postlfs/security/pam/linux_pam-inst.xml
r64b92847 r419dd50 6 6 running the following commands:</para> 7 7 8 <screen><userinput><command>./configure --enable-static-libpam --with-mailspool=/var/mail \ 8 <screen><userinput><command>patch -Np1 -i ../Linux-PAM-0.77-linkage-1.patch && 9 ./configure --enable-static-libpam --with-mailspool=/var/mail \ 9 10 --enable-read-both-confs --sysconfdir=/etc && 10 11 make && -
postlfs/security/pam/linux_pam-intro.xml
r64b92847 r419dd50 20 20 </sect3> 21 21 22 <sect3><title>Additional download</title> 23 <itemizedlist spacing='compact'> 24 <listitem><para>Required patch: 25 <ulink url="&patch-root;/Linux-PAM-0.77-linkage-1.patch"/></para></listitem></itemizedlist> 26 </sect3> 27 28 22 29 <sect3><title><application>Linux-<acronym>PAM</acronym></application> 23 30 dependencies</title> -
postlfs/security/security.xml
r64b92847 r419dd50 4 4 5 5 <para>Security takes many forms in a computing environment. This chapter 6 gives examples of three different types of security ;access, prevention6 gives examples of three different types of security: access, prevention 7 7 and detection.</para> 8 8 … … 15 15 16 16 <para>Prevention of breaches, like a trojan, are assisted by applications like 17 <application> gnupg</application>, specifically the ability to confirm signed17 <application>GnuPG</application>, specifically the ability to confirm signed 18 18 packages, which prevents modification of the tarball after the packager creates 19 19 it.</para> -
postlfs/security/shadow.xml
r64b92847 r419dd50 1 1 <sect1 id="shadow"> 2 2 <?dbhtml filename="shadow.html" dir="postlfs"?> 3 <title>Shadow-4.0.3</title> 4 5 <sect2> 3 6 <title>Configuring shadow</title> 4 7 … … 9 12 <para>Enabling MD5 Passwords</para> 10 13 11 <para>To enable MD5 Passwords, modify the line in the login.defs file12 that reads:14 <para>To enable MD5 Passwords, modify the line in the 15 <filename>login.defs</filename> file that reads: 13 16 <screen><userinput>#MD5_CRYPT_ENAB no</userinput></screen> 14 17 to read: 15 18 <screen><userinput>MD5_CRYPT_ENAB yes</userinput></screen> 16 19 Passwords created after this change will be encrypted using MD5 17 instead of using DES encryption.</para> 20 (Message-Degest Algroithm) instead of using <acronym>DES</acronym> encryption. 21 </para> 22 </sect2> 18 23 19 24 &shadow-inst; -
postlfs/security/shadow/shadow-inst.xml
r64b92847 r419dd50 16 16 <para>Reinstall shadow by running the following commands:</para> 17 17 18 <screen><userinput><command>patch -Np1 -i ../shadow-4.0.3-pam fix-1.patch &&19 LDFLAGS="-lpam -lpam_misc"./configure --prefix=/usr --libdir=/usr/lib \18 <screen><userinput><command>patch -Np1 -i ../shadow-4.0.3-pam-2.patch && 19 ./configure --prefix=/usr --libdir=/usr/lib \ 20 20 --enable-shared --with-libpam && 21 21 make &&
Note:
See TracChangeset
for help on using the changeset viewer.