mirror of
git://slackware.nl/current.git
synced 2024-12-27 09:59:16 +01:00
2f42776b89
a/kernel-firmware-20210928_7a30050-noarch-1.txz: Upgraded. d/ccache-4.4.2-x86_64-1.txz: Upgraded. d/meson-0.59.2-x86_64-1.txz: Upgraded. l/gc-8.0.6-x86_64-1.txz: Upgraded. l/mlt-7.0.1-x86_64-2.txz: Rebuilt. Fixed man page installation. Thanks to GazL and Markus Wiesner. l/netpbm-10.96.00-x86_64-1.txz: Upgraded. n/epic5-2.1.5-x86_64-2.txz: Rebuilt. Fixed man page installation. Thanks to GazL and kaott. n/openssh-8.8p1-x86_64-2.txz: Rebuilt. Add pam_elogind.so to /etc/pam.d/sshd to track user sessions over ssh, properly set the XDG_ variables, and create the runtime directory. Thanks to davjohn. xap/NetworkManager-openvpn-1.8.16-x86_64-1.txz: Upgraded.
23 lines
1.2 KiB
Text
23 lines
1.2 KiB
Text
#%PAM-1.0
|
|
# pam_securetty.so is commented out since sshd already does a good job of
|
|
# protecting itself. You may uncomment it if you like, but then you may
|
|
# need to add additional consoles to /etc/securetty if you want to allow
|
|
# root logins on them, such as: ssh, pts/0, :0, etc
|
|
#auth required pam_securetty.so
|
|
# When using pam_faillock, print a message to the user if the account is
|
|
# locked. This lets the user know what is going on, but it also potentially
|
|
# gives additional information to attackers:
|
|
#auth requisite pam_faillock.so preauth
|
|
auth include system-auth
|
|
# To set a limit on failed authentications, the pam_faillock module
|
|
# can be enabled. See pam_faillock(8) for more information.
|
|
#auth [default=die] pam_faillock.so authfail
|
|
#auth sufficient pam_faillock.so authsucc
|
|
auth include postlogin
|
|
account required pam_nologin.so
|
|
account include system-auth
|
|
password include system-auth
|
|
session include system-auth
|
|
session include postlogin
|
|
session required pam_loginuid.so
|
|
-session optional pam_elogind.so
|