Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.190.253.56
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
authconfig-6.2.8 /
[ HOME SHELL ]
Name
Size
Permission
Action
COPYING
17.58
KB
-rw-r--r--
NOTES
1.76
KB
-rw-r--r--
README.samba3
1.56
KB
-rw-r--r--
TODO
1.13
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : NOTES
We split naming services from authentication services because they are not the same thing. Any nsswitch module that provides a crypted-password field is enough to make pam_unix work, so nss_ldap + pam_unix can be used for authentication. Problem being that this is not enough (users can't change their passwords with this setup), and you can't assume nss_ldap implies that pam_ldap is the right thing to use, because the network might just as likely be using Kerberos for authentication. Currently, we read and parse the "passwd" entry in /etc/nsswitch.conf to get the client configuration. We always assume that either "files" or "compat" is enabled, and don't preserve order or control flags. Depending on what is enabled, we write out entries in the file, adding modules for a particular service based on a priori knowledge of whether or not a particular module is applicable to the service. Because we control nis, hesiod, ldap, and winbind, we add and remove those always. We preserve "db", "nisplus", and a few other modules if we found them being used, but neither add nor remove them. PAM configuration only touches /etc/pam.d/system-auth. We assume pam_unix first. If enabled, pam_krb5 (or if /afs exists) pam_krb5afs comes next, then pam_ldap, then pam_winbind. For passwords, pam_cracklib goes first. All services use pam_limits*. Not all can use pam_access (which requires that a TTY is set by the calling application). The code is roughly divided into two modules: the back and the fronts. The back is in authinfo.[ch], and the fronts are authconfig.c and authconfig-gtk.py, which needs authconfigmodule.c. They communicate by using the authInfoRead() and authInfoWrite() functions. The rest is gravy, so to speak. * Due to PAM's design, pam_limits can never work perfectly.
Close