summaryrefslogtreecommitdiffstats
path: root/factory
diff options
context:
space:
mode:
authorLennart Poettering <lennart@poettering.net>2019-07-12 12:17:12 +0200
committerLennart Poettering <lennart@poettering.net>2019-07-13 11:06:24 +0200
commited40cb82f7fe59f6584309553f5619c263f8c64f (patch)
tree3fb1326c368014bc6b585c3a1b4aac547bfabe38 /factory
parentalloc-util: drop _alloc_ decorator from memdup_suffix0() (diff)
downloadsystemd-ed40cb82f7fe59f6584309553f5619c263f8c64f.tar.xz
systemd-ed40cb82f7fe59f6584309553f5619c263f8c64f.zip
factory: tighten PAM configuration
Apparently PAM reacts differently on different systems (?) and if no authoritative matching module is found might either succeed/fail, depending on the system. Let's lock this down explicitly, by hooking in pam_deny.so. Of course, these PAM files are just examples, and no distro in its right mind would ship these unmodified, but let's default to something safe. Fixes: #12950
Diffstat (limited to 'factory')
-rw-r--r--factory/etc/pam.d/system-auth3
1 files changed, 3 insertions, 0 deletions
diff --git a/factory/etc/pam.d/system-auth b/factory/etc/pam.d/system-auth
index dec7a8f017..d988233d1c 100644
--- a/factory/etc/pam.d/system-auth
+++ b/factory/etc/pam.d/system-auth
@@ -1,11 +1,14 @@
# This file is part of systemd.
auth sufficient pam_unix.so nullok try_first_pass
+auth required pam_deny.so
account required pam_nologin.so
account sufficient pam_unix.so
+account required pam_permit.so
password sufficient pam_unix.so nullok sha512 shadow try_first_pass try_authtok
+password required pam_deny.so
-session optional pam_loginuid.so
-session optional pam_systemd.so