slackware-current/source/n/openssh/sshd.pam
Patrick J Volkerding 2f42776b89 Wed Sep 29 19:15:54 UTC 2021
a/kernel-firmware-20210928_7a30050-noarch-1.txz:  Upgraded.
d/ccache-4.4.2-x86_64-1.txz:  Upgraded.
d/meson-0.59.2-x86_64-1.txz:  Upgraded.
l/gc-8.0.6-x86_64-1.txz:  Upgraded.
l/mlt-7.0.1-x86_64-2.txz:  Rebuilt.
  Fixed man page installation. Thanks to GazL and Markus Wiesner.
l/netpbm-10.96.00-x86_64-1.txz:  Upgraded.
n/epic5-2.1.5-x86_64-2.txz:  Rebuilt.
  Fixed man page installation. Thanks to GazL and kaott.
n/openssh-8.8p1-x86_64-2.txz:  Rebuilt.
  Add pam_elogind.so to /etc/pam.d/sshd to track user sessions over ssh,
  properly set the XDG_ variables, and create the runtime directory.
  Thanks to davjohn.
xap/NetworkManager-openvpn-1.8.16-x86_64-1.txz:  Upgraded.
2021-09-30 08:59:56 +02:00

23 lines
1.2 KiB
Text

#%PAM-1.0
# pam_securetty.so is commented out since sshd already does a good job of
# protecting itself. You may uncomment it if you like, but then you may
# need to add additional consoles to /etc/securetty if you want to allow
# root logins on them, such as: ssh, pts/0, :0, etc
#auth required pam_securetty.so
# When using pam_faillock, print a message to the user if the account is
# locked. This lets the user know what is going on, but it also potentially
# gives additional information to attackers:
#auth requisite pam_faillock.so preauth
auth include system-auth
# To set a limit on failed authentications, the pam_faillock module
# can be enabled. See pam_faillock(8) for more information.
#auth [default=die] pam_faillock.so authfail
#auth sufficient pam_faillock.so authsucc
auth include postlogin
account required pam_nologin.so
account include system-auth
password include system-auth
session include system-auth
session include postlogin
session required pam_loginuid.so
-session optional pam_elogind.so