Ignore:
File:
1 edited

Legend:

Unmodified
Added
Removed
  • postlfs/security/linux-pam.xml

    r3f2db3a6 rbf1e213  
    2323  <?dbhtml filename="linux-pam.html"?>
    2424
     25  <sect1info>
     26    <date>$Date$</date>
     27  </sect1info>
    2528
    2629  <title>Linux-PAM-&linux-pam-version;</title>
     
    3538    <para>
    3639      The <application>Linux PAM</application> package contains
    37       Pluggable Authentication Modules used by the local
    38       system administrator to control how application programs authenticate
     40      Pluggable Authentication Modules used to enable the local
     41      system administrator to choose how applications authenticate
    3942      users.
    4043    </para>
    4144
    42     &lfs112_checked;
     45    &lfs110a_checked;
    4346
    4447    <bridgehead renderas="sect3">Package Information</bridgehead>
     
    104107      <xref linkend="libtirpc"/>,
    105108      <ulink url="https://github.com/linux-audit/audit-userspace">libaudit</ulink>, and
    106       <ulink url="https://www.prelude-siem.org">Prelude</ulink>
     109      <ulink url="http://www.prelude-siem.org">Prelude</ulink>
    107110    </para>
    108111
     
    121124        <xref role="runtime" linkend="shadow"/>
    122125        <phrase revision="systemd"> and <xref role="runtime" linkend="systemd"/>
    123         must</phrase><phrase revision="sysv">must</phrase> be reinstalled
    124         and reconfigured
     126        need</phrase><phrase revision="sysv">needs</phrase> to be reinstalled
    125127        after installing and configuring <application>Linux PAM</application>.
    126128      </para>
     
    128130      <para role="recommended">
    129131         With Linux-PAM-1.4.0 and higher, the pam_cracklib module is not
    130          installed by default. Use <xref role="runtime" linkend="libpwquality"/>
    131          to enforce strong passwords.
     132         installed by default. To enforce strong passwords, it is recommended
     133         to use <xref role="runtime" linkend="libpwquality"/>.
    132134      </para>
    133135    </note>
     
    142144
    143145    <para revision="sysv">
    144       First, prevent the installation of an unneeded systemd file:
     146      First prevent the installation of an unneeded systemd file:
    145147    </para>
    146148
     
    157159
    158160    <para>
    159       If you want to regenerate the documentation yourself, fix the
    160       <command>configure</command> script so it will detect lynx:
     161      If you instead want to regenerate the documentation, fix the
     162      <command>configure</command> script so that it detects lynx if installed:
    161163    </para>
    162164
     
    166168
    167169    <para>
    168       Compile and link <application>Linux PAM</application> by
     170      Install <application>Linux PAM</application> by
    169171      running the following commands:
    170172    </para>
     
    184186
    185187    <caution>
    186       <title>Reinstallation or Upgrade of Linux PAM</title>
     188      <title>Reinstallation or upgrade of Linux PAM</title>
    187189      <para>
    188190        If you have a system with Linux PAM installed and working, be careful
     
    191193        may become totally unusable. If you want to run the tests, you do not
    192194        need to create another <filename>/etc/pam.d/other</filename> file. The
    193         existing file can be used for the tests.
     195        installed one can be used for that purpose.
    194196      </para>
    195197
     
    198200         overwrites the configuration files in
    199201         <filename class="directory">/etc/security</filename> as well as
    200          <filename>/etc/environment</filename>. If you
     202         <filename>/etc/environment</filename>. In case you
    201203         have modified those files, be sure to back them up.
    202204      </para>
     
    204206
    205207    <para>
    206       For a first-time installation, create a configuration file by issuing the
     208      For a first installation, create the configuration file by issuing the
    207209      following commands as the <systemitem class="username">root</systemitem>
    208210      user:
     
    220222    <para>
    221223      Now run the tests by issuing <command>make check</command>.
    222       Be sure the tests produced no errors before continuing the
    223       installation. Note that the tests are very long.
    224       Redirect the output to a log file, so you can inspect it thoroughly.
    225     </para>
    226 
    227     <para>
    228       For a first-time installation, remove the configuration file
     224      Ensure there are no errors produced by the tests before continuing the
     225      installation. Note that the checks are quite long.  It may be useful to
     226      redirect the output to a log file in order to inspect it thoroughly.
     227    </para>
     228
     229    <para>
     230      Only in case of a first installation, remove the configuration file
    229231      created earlier by issuing the following command as the
    230232      <systemitem class="username">root</systemitem> user:
     
    257259      linkend="libxslt"/>, and <xref linkend="lynx"/> or <ulink
    258260      url="&w3m-url;">W3m</ulink>) are installed, the manual pages, and the
    259       html and text documentation files, are generated and installed.
     261      html and text documentations are (re)generated and installed.
    260262      Furthermore, if <xref linkend="fop"/> is installed, the PDF
    261263      documentation is generated and installed. Use this switch if you do not
     
    265267    <para>
    266268      <command>chmod -v 4755 /usr/sbin/unix_chkpwd</command>:
    267       The setuid bit for the <command>unix_chkpwd</command> helper program must be
    268       turned on, so that non-<systemitem class="username">root</systemitem>
     269      The <command>unix_chkpwd</command> helper program must be setuid
     270      so that non-<systemitem class="username">root</systemitem>
    269271      processes can access the shadow file.
    270272    </para>
     
    276278
    277279    <sect3 id="pam-config">
    278       <title>Configuration Files</title>
     280      <title>Config Files</title>
    279281
    280282      <para>
     
    299301        Configuration information is placed in
    300302        <filename class="directory">/etc/pam.d/</filename>.
    301         Here is a sample file:
     303        Below is an example file:
    302304      </para>
    303305
     
    312314
    313315      <para>
    314         Now create some generic configuration files.  As the
     316        Now set up some generic files.  As the
    315317        <systemitem class="username">root</systemitem> user:
    316318      </para>
     
    345347# use sha512 hash for encryption, use shadow, and try to use any previously
    346348# defined authentication token (chosen password) set by any prior module
    347 # Use the same number of rounds as shadow.
    348 password  required    pam_unix.so       sha512 shadow try_first_pass \
    349                                         rounds=500000
     349password  required    pam_unix.so       sha512 shadow try_first_pass
    350350
    351351# End /etc/pam.d/system-password</literal>
     
    356356       If you wish to enable strong password support, install
    357357       <xref linkend="libpwquality"/>, and follow the
    358        instructions on that page to configure the pam_pwquality
     358       instructions in that page to configure the pam_pwquality
    359359       PAM module with strong password support.
    360360     </para>
    361361
    362362<!-- With the removal of the pam_cracklib module, we're supposed to be using
    363      libpwquality. That already includes instructions in its configuration
     363     libpwquality. That already includes instructions in it's configuration
    364364     information page, so we'll use those instead.
    365365
     
    367367     is built in, and the PAM module is built.
    368368-->
    369 <!-- WARNING: If for any reason the instructions below are reinstated be
    370      careful with the number of rounds, which should match the one in shadow.
     369<!--
    371370      <para>
    372371        The remaining generic file depends on whether <xref
     
    418417-->
    419418      <para>
    420         Next, add a restrictive <filename>/etc/pam.d/other</filename>
     419        Now add a restrictive <filename>/etc/pam.d/other</filename>
    421420        configuration file.  With this file, programs that are PAM aware will
    422421        not run unless a configuration file specifically for that application
    423         exists.
     422        is created.
    424423      </para>
    425424
     
    441440      <para>
    442441        The <application>PAM</application> man page (<command>man
    443         pam</command>) provides a good starting point to learn
    444         about the several fields, and allowable entries.
    445         <!-- not accessible 2022-09-08 -->
    446         <!-- it's available at a different address 2022-10-23-->
    447         The
    448         <ulink url="https://www.docs4dev.com/docs/en/linux-pam/1.1.2/reference/Linux-PAM_SAG.html">
     442        pam</command>) provides a good starting point for descriptions
     443        of fields and allowable entries. The
     444        <ulink url="http://www.linux-pam.org/Linux-PAM-html/Linux-PAM_SAG.html">
    449445          Linux-PAM System Administrators' Guide
    450446        </ulink> is recommended for additional information.
     
    454450        <para>
    455451          You should now reinstall the <xref linkend="shadow"/>
    456           <phrase revision="sysv">package</phrase>
     452          <phrase revision="sysv">package.</phrase>
    457453          <phrase revision="systemd"> and <xref linkend="systemd"/>
    458           packages</phrase>.
     454          packages.</phrase>
    459455        </para>
    460456      </important>
Note: See TracChangeset for help on using the changeset viewer.