From ed006a8eb44831189e152826c692330d0a0cfe3b Mon Sep 17 00:00:00 2001 From: Manuel Traut Date: Mon, 18 Jul 2011 14:00:12 +0200 Subject: delete beagle-dir Signed-off-by: Manuel Traut --- beagle/debian-rfs/etc/pam.d/chfn | 16 ------ beagle/debian-rfs/etc/pam.d/chpasswd | 5 -- beagle/debian-rfs/etc/pam.d/chsh | 20 ------- beagle/debian-rfs/etc/pam.d/login | 107 ----------------------------------- beagle/debian-rfs/etc/pam.d/newusers | 5 -- beagle/debian-rfs/etc/pam.d/other | 16 ------ beagle/debian-rfs/etc/pam.d/passwd | 6 -- beagle/debian-rfs/etc/pam.d/su | 62 -------------------- 8 files changed, 237 deletions(-) delete mode 100644 beagle/debian-rfs/etc/pam.d/chfn delete mode 100644 beagle/debian-rfs/etc/pam.d/chpasswd delete mode 100644 beagle/debian-rfs/etc/pam.d/chsh delete mode 100644 beagle/debian-rfs/etc/pam.d/login delete mode 100644 beagle/debian-rfs/etc/pam.d/newusers delete mode 100644 beagle/debian-rfs/etc/pam.d/other delete mode 100644 beagle/debian-rfs/etc/pam.d/passwd delete mode 100644 beagle/debian-rfs/etc/pam.d/su (limited to 'beagle/debian-rfs/etc/pam.d') diff --git a/beagle/debian-rfs/etc/pam.d/chfn b/beagle/debian-rfs/etc/pam.d/chfn deleted file mode 100644 index 10fcf07..0000000 --- a/beagle/debian-rfs/etc/pam.d/chfn +++ /dev/null @@ -1,16 +0,0 @@ -# -# The PAM configuration file for the Shadow `chfn' service -# - -# This allows root to change user infomation without being -# prompted for a password -auth sufficient pam_rootok.so - -# The standard Unix authentication modules, used with -# NIS (man nsswitch) as well as normal /etc/passwd and -# /etc/shadow entries. -@include common-auth -@include common-account -@include common-session - - diff --git a/beagle/debian-rfs/etc/pam.d/chpasswd b/beagle/debian-rfs/etc/pam.d/chpasswd deleted file mode 100644 index da2adcc..0000000 --- a/beagle/debian-rfs/etc/pam.d/chpasswd +++ /dev/null @@ -1,5 +0,0 @@ -# The PAM configuration file for the Shadow 'chpasswd' service -# - -@include common-password - diff --git a/beagle/debian-rfs/etc/pam.d/chsh b/beagle/debian-rfs/etc/pam.d/chsh deleted file mode 100644 index 7eb604d..0000000 --- a/beagle/debian-rfs/etc/pam.d/chsh +++ /dev/null @@ -1,20 +0,0 @@ -# -# The PAM configuration file for the Shadow `chsh' service -# - -# This will not allow a user to change their shell unless -# their current one is listed in /etc/shells. This keeps -# accounts with special shells from changing them. -auth required pam_shells.so - -# This allows root to change user shell without being -# prompted for a password -auth sufficient pam_rootok.so - -# The standard Unix authentication modules, used with -# NIS (man nsswitch) as well as normal /etc/passwd and -# /etc/shadow entries. -@include common-auth -@include common-account -@include common-session - diff --git a/beagle/debian-rfs/etc/pam.d/login b/beagle/debian-rfs/etc/pam.d/login deleted file mode 100644 index 6ac4fd7..0000000 --- a/beagle/debian-rfs/etc/pam.d/login +++ /dev/null @@ -1,107 +0,0 @@ -# -# The PAM configuration file for the Shadow `login' service -# - -# Enforce a minimal delay in case of failure (in microseconds). -# (Replaces the `FAIL_DELAY' setting from login.defs) -# Note that other modules may require another minimal delay. (for example, -# to disable any delay, you should add the nodelay option to pam_unix) -auth optional pam_faildelay.so delay=3000000 - -# Outputs an issue file prior to each login prompt (Replaces the -# ISSUE_FILE option from login.defs). Uncomment for use -# auth required pam_issue.so issue=/etc/issue - -# Disallows root logins except on tty's listed in /etc/securetty -# (Replaces the `CONSOLE' setting from login.defs) -# -# With the default control of this module: -# [success=ok new_authtok_reqd=ok ignore=ignore user_unknown=bad default=die] -# root will not be prompted for a pasword on insecure lines. -# if an invalid username is entered, a password is prompted (but login -# will eventually be rejected) -# -# You can change it to a "requisite" module if you think root may mis-type -# her login and should not be prompted for a password in that case. But -# this will leave the system as vulnerable to user enumeration attacks. -# -# You can change it to a "required" module if you think it permits to -# guess valid user names of your system (invalid user names are considered -# as possibly being root on insecure lines), but root passwords may be -# communicated over insecure lines. -auth [success=ok new_authtok_reqd=ok ignore=ignore user_unknown=bad default=die] pam_securetty.so - -# Disallows other than root logins when /etc/nologin exists -# (Replaces the `NOLOGINS_FILE' option from login.defs) -auth requisite pam_nologin.so - -# SELinux needs to be the first session rule. This ensures that any -# lingering context has been cleared. Without out this it is possible -# that a module could execute code in the wrong domain. -# When the module is present, "required" would be sufficient (When SELinux -# is disabled, this returns success.) -session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close - -# This module parses environment configuration file(s) -# and also allows you to use an extended config -# file /etc/security/pam_env.conf. -# -# parsing /etc/environment needs "readenv=1" -session required pam_env.so readenv=1 -# locale variables are also kept into /etc/default/locale in etch -# reading this file *in addition to /etc/environment* does not hurt -session required pam_env.so readenv=1 envfile=/etc/default/locale - -# Standard Un*x authentication. -@include common-auth - -# This allows certain extra groups to be granted to a user -# based on things like time of day, tty, service, and user. -# Please edit /etc/security/group.conf to fit your needs -# (Replaces the `CONSOLE_GROUPS' option in login.defs) -auth optional pam_group.so - -# Uncomment and edit /etc/security/time.conf if you need to set -# time restrainst on logins. -# (Replaces the `PORTTIME_CHECKS_ENAB' option from login.defs -# as well as /etc/porttime) -# account requisite pam_time.so - -# Uncomment and edit /etc/security/access.conf if you need to -# set access limits. -# (Replaces /etc/login.access file) -# account required pam_access.so - -# Sets up user limits according to /etc/security/limits.conf -# (Replaces the use of /etc/limits in old login) -session required pam_limits.so - -# Prints the last login info upon succesful login -# (Replaces the `LASTLOG_ENAB' option from login.defs) -session optional pam_lastlog.so - -# Prints the motd upon succesful login -# (Replaces the `MOTD_FILE' option in login.defs) -session optional pam_motd.so - -# Prints the status of the user's mailbox upon succesful login -# (Replaces the `MAIL_CHECK_ENAB' option from login.defs). -# -# This also defines the MAIL environment variable -# However, userdel also needs MAIL_DIR and MAIL_FILE variables -# in /etc/login.defs to make sure that removing a user -# also removes the user's mail spool file. -# See comments in /etc/login.defs -session optional pam_mail.so standard - -# Standard Un*x account and session -@include common-account -@include common-session -@include common-password - -# SELinux needs to intervene at login time to ensure that the process -# starts in the proper default security context. Only sessions which are -# intended to run in the user's context should be run after this. -session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open -# When the module is present, "required" would be sufficient (When SELinux -# is disabled, this returns success.) diff --git a/beagle/debian-rfs/etc/pam.d/newusers b/beagle/debian-rfs/etc/pam.d/newusers deleted file mode 100644 index 552ca90..0000000 --- a/beagle/debian-rfs/etc/pam.d/newusers +++ /dev/null @@ -1,5 +0,0 @@ -# The PAM configuration file for the Shadow 'newusers' service -# - -@include common-password - diff --git a/beagle/debian-rfs/etc/pam.d/other b/beagle/debian-rfs/etc/pam.d/other deleted file mode 100644 index 59d776c..0000000 --- a/beagle/debian-rfs/etc/pam.d/other +++ /dev/null @@ -1,16 +0,0 @@ -# -# /etc/pam.d/other - specify the PAM fallback behaviour -# -# Note that this file is used for any unspecified service; for example -#if /etc/pam.d/cron specifies no session modules but cron calls -#pam_open_session, the session module out of /etc/pam.d/other is -#used. If you really want nothing to happen then use pam_permit.so or -#pam_deny.so as appropriate. - -# We fall back to the system default in /etc/pam.d/common-* -# - -@include common-auth -@include common-account -@include common-password -@include common-session diff --git a/beagle/debian-rfs/etc/pam.d/passwd b/beagle/debian-rfs/etc/pam.d/passwd deleted file mode 100644 index 5872e7b..0000000 --- a/beagle/debian-rfs/etc/pam.d/passwd +++ /dev/null @@ -1,6 +0,0 @@ -# -# The PAM configuration file for the Shadow `passwd' service -# - -@include common-password - diff --git a/beagle/debian-rfs/etc/pam.d/su b/beagle/debian-rfs/etc/pam.d/su deleted file mode 100644 index c1a84ae..0000000 --- a/beagle/debian-rfs/etc/pam.d/su +++ /dev/null @@ -1,62 +0,0 @@ -# -# The PAM configuration file for the Shadow `su' service -# - -# This allows root to su without passwords (normal operation) -auth sufficient pam_rootok.so - -# Uncomment this to force users to be a member of group root -# before they can use `su'. You can also add "group=foo" -# to the end of this line if you want to use a group other -# than the default "root" (but this may have side effect of -# denying "root" user, unless she's a member of "foo" or explicitly -# permitted earlier by e.g. "sufficient pam_rootok.so"). -# (Replaces the `SU_WHEEL_ONLY' option from login.defs) -# auth required pam_wheel.so - -# Uncomment this if you want wheel members to be able to -# su without a password. -# auth sufficient pam_wheel.so trust - -# Uncomment this if you want members of a specific group to not -# be allowed to use su at all. -# auth required pam_wheel.so deny group=nosu - -# Uncomment and edit /etc/security/time.conf if you need to set -# time restrainst on su usage. -# (Replaces the `PORTTIME_CHECKS_ENAB' option from login.defs -# as well as /etc/porttime) -# account requisite pam_time.so - -# This module parses environment configuration file(s) -# and also allows you to use an extended config -# file /etc/security/pam_env.conf. -# -# parsing /etc/environment needs "readenv=1" -session required pam_env.so readenv=1 -# locale variables are also kept into /etc/default/locale in etch -# reading this file *in addition to /etc/environment* does not hurt -session required pam_env.so readenv=1 envfile=/etc/default/locale - -# Defines the MAIL environment variable -# However, userdel also needs MAIL_DIR and MAIL_FILE variables -# in /etc/login.defs to make sure that removing a user -# also removes the user's mail spool file. -# See comments in /etc/login.defs -# -# "nopen" stands to avoid reporting new mail when su'ing to another user -session optional pam_mail.so nopen - -# Sets up user limits, please uncomment and read /etc/security/limits.conf -# to enable this functionality. -# (Replaces the use of /etc/limits in old login) -# session required pam_limits.so - -# The standard Unix authentication modules, used with -# NIS (man nsswitch) as well as normal /etc/passwd and -# /etc/shadow entries. -@include common-auth -@include common-account -@include common-session - - -- cgit v1.2.3