Changeset 5fc45b2d


Ignore:
Timestamp:
10/23/2022 05:38:01 PM (18 months ago)
Author:
Bruce Dubbs <bdubbs@…>
Branches:
11.3, 12.0, 12.1, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, lazarus, lxqt, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, trunk, xry111/llvm18, xry111/xf86-video-removal
Children:
aa3cf5b
Parents:
f9e1bc3 (diff), 7f70be6 (diff)
Note: this is a merge changeset, the changes displayed below correspond to the merge itself.
Use the (diff) links above to see all the changes relative to each parent.
Message:

Merge branch 'trunk' of git.linuxfromscratch.org:blfs into trunk

File:
1 edited

Legend:

Unmodified
Added
Removed
  • postlfs/security/linux-pam.xml

    rf9e1bc3 r5fc45b2d  
    3838    <para>
    3939      The <application>Linux PAM</application> package contains
    40       Pluggable Authentication Modules used to enable the local
    41       system administrator to choose how applications authenticate
     40      Pluggable Authentication Modules used by the local
     41      system administrator to control how application programs authenticate
    4242      users.
    4343    </para>
     
    124124        <xref role="runtime" linkend="shadow"/>
    125125        <phrase revision="systemd"> and <xref role="runtime" linkend="systemd"/>
    126         need</phrase><phrase revision="sysv">needs</phrase> to be reinstalled
     126        must</phrase><phrase revision="sysv">must</phrase> be reinstalled
     127        and reconfigured
    127128        after installing and configuring <application>Linux PAM</application>.
    128129      </para>
     
    130131      <para role="recommended">
    131132         With Linux-PAM-1.4.0 and higher, the pam_cracklib module is not
    132          installed by default. To enforce strong passwords, it is recommended
    133          to use <xref role="runtime" linkend="libpwquality"/>.
     133         installed by default. Use <xref role="runtime" linkend="libpwquality"/>
     134         to enforce strong passwords.
    134135      </para>
    135136    </note>
     
    144145
    145146    <para revision="sysv">
    146       First prevent the installation of an unneeded systemd file:
     147      First, prevent the installation of an unneeded systemd file:
    147148    </para>
    148149
     
    159160
    160161    <para>
    161       If you instead want to regenerate the documentation, fix the
    162       <command>configure</command> script so that it detects lynx if installed:
     162      If you want to regenerate the documentation yourself, fix the
     163      <command>configure</command> script so it will detect lynx:
    163164    </para>
    164165
     
    168169
    169170    <para>
    170       Install <application>Linux PAM</application> by
     171      Compile and link <application>Linux PAM</application> by
    171172      running the following commands:
    172173    </para>
     
    186187
    187188    <caution>
    188       <title>Reinstallation or upgrade of Linux PAM</title>
     189      <title>Reinstallation or Upgrade of Linux PAM</title>
    189190      <para>
    190191        If you have a system with Linux PAM installed and working, be careful
     
    193194        may become totally unusable. If you want to run the tests, you do not
    194195        need to create another <filename>/etc/pam.d/other</filename> file. The
    195         installed one can be used for that purpose.
     196        existing file can be used for the tests.
    196197      </para>
    197198
     
    200201         overwrites the configuration files in
    201202         <filename class="directory">/etc/security</filename> as well as
    202          <filename>/etc/environment</filename>. In case you
     203         <filename>/etc/environment</filename>. If you
    203204         have modified those files, be sure to back them up.
    204205      </para>
     
    206207
    207208    <para>
    208       For a first installation, create the configuration file by issuing the
     209      For a first-time installation, create a configuration file by issuing the
    209210      following commands as the <systemitem class="username">root</systemitem>
    210211      user:
     
    222223    <para>
    223224      Now run the tests by issuing <command>make check</command>.
    224       Ensure there are no errors produced by the tests before continuing the
    225       installation. Note that the checks are quite long.  It may be useful to
    226       redirect the output to a log file in order to inspect it thoroughly.
    227     </para>
    228 
    229     <para>
    230       Only in case of a first installation, remove the configuration file
     225      Be sure the tests produced no errors before continuing the
     226      installation. Note that the tests are very long.
     227      Redirect the output to a log file, so you can inspect it thoroughly.
     228    </para>
     229
     230    <para>
     231      For a first-time installation, remove the configuration file
    231232      created earlier by issuing the following command as the
    232233      <systemitem class="username">root</systemitem> user:
     
    259260      linkend="libxslt"/>, and <xref linkend="lynx"/> or <ulink
    260261      url="&w3m-url;">W3m</ulink>) are installed, the manual pages, and the
    261       html and text documentations are (re)generated and installed.
     262      html and text documentation files, are generated and installed.
    262263      Furthermore, if <xref linkend="fop"/> is installed, the PDF
    263264      documentation is generated and installed. Use this switch if you do not
     
    267268    <para>
    268269      <command>chmod -v 4755 /usr/sbin/unix_chkpwd</command>:
    269       The <command>unix_chkpwd</command> helper program must be setuid
    270       so that non-<systemitem class="username">root</systemitem>
     270      The setuid bit for the <command>unix_chkpwd</command> helper program must be
     271      turned on, so that non-<systemitem class="username">root</systemitem>
    271272      processes can access the shadow file.
    272273    </para>
     
    278279
    279280    <sect3 id="pam-config">
    280       <title>Config Files</title>
     281      <title>Configuration Files</title>
    281282
    282283      <para>
     
    301302        Configuration information is placed in
    302303        <filename class="directory">/etc/pam.d/</filename>.
    303         Below is an example file:
     304        Here is a sample file:
    304305      </para>
    305306
     
    314315
    315316      <para>
    316         Now set up some generic files.  As the
     317        Now create some generic configuration files.  As the
    317318        <systemitem class="username">root</systemitem> user:
    318319      </para>
     
    356357       If you wish to enable strong password support, install
    357358       <xref linkend="libpwquality"/>, and follow the
    358        instructions in that page to configure the pam_pwquality
     359       instructions on that page to configure the pam_pwquality
    359360       PAM module with strong password support.
    360361     </para>
    361362
    362363<!-- With the removal of the pam_cracklib module, we're supposed to be using
    363      libpwquality. That already includes instructions in it's configuration
     364     libpwquality. That already includes instructions in its configuration
    364365     information page, so we'll use those instead.
    365366
     
    417418-->
    418419      <para>
    419         Now add a restrictive <filename>/etc/pam.d/other</filename>
     420        Next, add a restrictive <filename>/etc/pam.d/other</filename>
    420421        configuration file.  With this file, programs that are PAM aware will
    421422        not run unless a configuration file specifically for that application
    422         is created.
     423        exists.
    423424      </para>
    424425
     
    440441      <para>
    441442        The <application>PAM</application> man page (<command>man
    442         pam</command>) provides a good starting point for descriptions
    443         of fields and allowable entries.
    444         <!-- not accessible 2022-09-08
     443        pam</command>) provides a good starting point to learn
     444        about the several fields, and allowable entries.
     445        <!-- not accessible 2022-09-08 -->
     446        <!-- it's available at a different address 2022-10-23-->
    445447        The
    446         <ulink url="http://www.linux-pam.org/Linux-PAM-html/Linux-PAM_SAG.html">
     448        <ulink url="https://www.docs4dev.com/docs/en/linux-pam/1.1.2/reference/Linux-PAM_SAG.html">
    447449          Linux-PAM System Administrators' Guide
    448         </ulink> is recommended for additional information.-->
     450        </ulink> is recommended for additional information.
    449451      </para>
    450452
Note: See TracChangeset for help on using the changeset viewer.