From 454ade95b7c6ee01587bf215944bfb6c5980d42f Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Dag-Erling=20Sm=C3=B8rgrav?= Date: Thu, 6 Feb 2003 11:50:55 +0000 Subject: [PATCH] Reword parts of the "Policies" section (old uncommitted diff) Start writing the "FreeBSD PAM Modules" section, which will provide short descriptions of each of the PAM modules we ship in the base system, along with recommendations about their use. Note to translators: more to come in the very near future, so you may wish to hold back on this one for a while. Sponsored by: DARPA, NAI Labs --- en_US.ISO8859-1/articles/pam/article.sgml | 209 +++++++++++++++++++++- 1 file changed, 201 insertions(+), 8 deletions(-) diff --git a/en_US.ISO8859-1/articles/pam/article.sgml b/en_US.ISO8859-1/articles/pam/article.sgml index 574730912f..65240eb7df 100644 --- a/en_US.ISO8859-1/articles/pam/article.sgml +++ b/en_US.ISO8859-1/articles/pam/article.sgml @@ -4,7 +4,7 @@ ]> This section has not yet been written. +
+ &man.pam.deny.8; + + The &man.pam.deny.8; module is one of the simplest modules + available; it resonds PAM_AUTH_ERR to all + requests. It is useful for quickly disabling a service (add + it to the top of every chain), or for terminating chains of + sufficient modules. +
+ +
+ &man.pam.echo.8; + + The &man.pam.echo.8; module +
+ +
+ &man.pam.exec.8; + + The &man.pam.exec.8; module +
+ +
+ &man.pam.ftp.8; + + The &man.pam.ftp.8; module +
+ +
+ &man.pam.ftpusers.8; + + The &man.pam.ftpusers.8; module +
+ +
+ &man.pam.kerberosIV.8; + + The &man.pam.kerberosIV.8; module +
+ +
+ &man.pam.krb5.8; + + The &man.pam.krb5.8; module +
+ +
+ &man.pam.ksu.8; + + The &man.pam.ksu.8; module +
+ +
+ &man.pam.lastlog.8; + + The &man.pam.lastlog.8; module +
+ +
+ &man.pam.login.access.8; + + The &man.pam.login.access.8; module +
+ +
+ &man.pam.nologin.8; + + The &man.pam.nologin.8; module +
+ +
+ &man.pam.opie.8; + + The &man.pam.opie.8; module implements the &man.opie.4; + authentication method. The &man.opie.4; system is a + challenge-response mechanism where the response to each + challenge is a direct function of the challenge and a + passphrase, so the response can be easily computed just + in time by anyone possessing the passphrase, + eliminating the need for password lists. Moreover, since + &man.opie.4; never reuses a challenge that has been correctly + answered, it is not vulnerable to replay attacks. +
+ +
+ &man.pam.opieaccess.8; + + The &man.pam.opieaccess.8; module is a companion module to + &man.pam.opie.8;. Its purpose is to enforce the restrictions + codified in &man.opieaccess.5;, which regulate the conditions + under which a user who would normally authenticate herself + using &man.opie.4; is allowed to use alternate methods. This + is most often used to prohibit the use of password + authentication from untrusted hosts. + + In order to be effective, the &man.pam.opieaccess.8; + module must be listed as required + immediately after a sufficient entry for + &man.pam.opie.8;, and before any other modules, in the + auth chain. +
+ +
+ &man.pam.passwdqc.8; + + The &man.pam.passwdqc.8; module +
+ +
+ &man.pam.permit.8; + + The &man.pam.permit.8; module is one of the simplest + modules available; it responds PAM_SUCCESS + to all requests. It is useful as a placeholder for services + where one or more chains would otherwise be empty. +
+ +
+ &man.pam.radius.8; + + The &man.pam.radius.8; module +
+ +
+ &man.pam.rhosts.8; + + The &man.pam.rhosts.8; module +
+ +
+ &man.pam.rootok.8; + + The &man.pam.rootok.8; module reports success if and only + if the real user id of the process calling it (which is + assumed to be run by the applicant) is 0. This is useful for + non-networked services such as &man.su.1; or &man.passwd.1;, + to which the root should have automatic + access. +
+ +
+ &man.pam.securetty.8; + + The &man.pam.securetty.8; module +
+ +
+ &man.pam.self.8; + + The &man.pam.self.8; module reports success if and only if + the names of the applicant matches that of the target account. + It is most useful for non-networked services such as + &man.su.1;, where the identity of the applicant can be easily + verified. +
+ +
+ &man.pam.ssh.8; + + The &man.pam.ssh.8; module +
+ +
+ &man.pam.tacplus.8; + + The &man.pam.tacplus.8; module +
+ +
+ &man.pam.unix.8; + + The &man.pam.unix.8; module implements traditional Unix + password authentication, using &man.getpwnam.3; to obtain the + target account's password and compare it with the one provided + by the applicant. It also provides account management + services (enforcing account and password expiration times) and + password-changing services. This is probably the single most + useful module, as the great majority of admins will want to + maintain historical behaviour for at least some + services. +
+ +
+ &man.pam.wheel.8; + + The &man.pam.wheel.8; module rejects applicant which are + not members of the wheel group, or some + other file group specified in the module options. It is + primarily intended for maintaining the traditional behaviour + of BSD &man.su.1;. Linux and SysV-derived Unices generally do + not enforce wheel membership, so some + admins may wish to disable this for consistency with other + systems in their network. +