Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els11.x86_64 #1 SMP Sun Nov 3 09:06:59 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.119.108.233
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
pam-1.1.8 /
html /
[ HOME SHELL ]
Name
Size
Permission
Action
Linux-PAM_SAG.html
8.98
KB
-rw-r--r--
sag-author.html
3.04
KB
-rw-r--r--
sag-configuration-directory.ht...
2.89
KB
-rw-r--r--
sag-configuration-example.html
5.39
KB
-rw-r--r--
sag-configuration-file.html
17.11
KB
-rw-r--r--
sag-configuration.html
2.99
KB
-rw-r--r--
sag-copyright.html
3.53
KB
-rw-r--r--
sag-introduction.html
4.34
KB
-rw-r--r--
sag-module-reference.html
37.26
KB
-rw-r--r--
sag-overview.html
7.81
KB
-rw-r--r--
sag-pam_access.html
17.54
KB
-rw-r--r--
sag-pam_cracklib.html
19.79
KB
-rw-r--r--
sag-pam_debug.html
7.9
KB
-rw-r--r--
sag-pam_deny.html
4.59
KB
-rw-r--r--
sag-pam_echo.html
5.62
KB
-rw-r--r--
sag-pam_env.html
11.58
KB
-rw-r--r--
sag-pam_exec.html
8.17
KB
-rw-r--r--
sag-pam_faildelay.html
4.48
KB
-rw-r--r--
sag-pam_filter.html
9.12
KB
-rw-r--r--
sag-pam_ftp.html
6.06
KB
-rw-r--r--
sag-pam_group.html
9.86
KB
-rw-r--r--
sag-pam_issue.html
6.23
KB
-rw-r--r--
sag-pam_keyinit.html
6.85
KB
-rw-r--r--
sag-pam_lastlog.html
7.89
KB
-rw-r--r--
sag-pam_limits.html
17.51
KB
-rw-r--r--
sag-pam_listfile.html
10.29
KB
-rw-r--r--
sag-pam_localuser.html
5.28
KB
-rw-r--r--
sag-pam_loginuid.html
5.08
KB
-rw-r--r--
sag-pam_mail.html
7.58
KB
-rw-r--r--
sag-pam_mkhomedir.html
6.05
KB
-rw-r--r--
sag-pam_motd.html
4.19
KB
-rw-r--r--
sag-pam_namespace.html
19.79
KB
-rw-r--r--
sag-pam_nologin.html
5.21
KB
-rw-r--r--
sag-pam_permit.html
4.2
KB
-rw-r--r--
sag-pam_pwhistory.html
7.63
KB
-rw-r--r--
sag-pam_rhosts.html
6.25
KB
-rw-r--r--
sag-pam_rootok.html
4.99
KB
-rw-r--r--
sag-pam_securetty.html
6.33
KB
-rw-r--r--
sag-pam_selinux.html
8.12
KB
-rw-r--r--
sag-pam_shells.html
4.16
KB
-rw-r--r--
sag-pam_succeed_if.html
8.94
KB
-rw-r--r--
sag-pam_tally.html
13.68
KB
-rw-r--r--
sag-pam_tally2.html
14.6
KB
-rw-r--r--
sag-pam_time.html
9.5
KB
-rw-r--r--
sag-pam_timestamp.html
6.28
KB
-rw-r--r--
sag-pam_umask.html
6.17
KB
-rw-r--r--
sag-pam_unix.html
14.29
KB
-rw-r--r--
sag-pam_userdb.html
8.29
KB
-rw-r--r--
sag-pam_warn.html
4.46
KB
-rw-r--r--
sag-pam_wheel.html
7.01
KB
-rw-r--r--
sag-pam_xauth.html
8.22
KB
-rw-r--r--
sag-security-issues-other.html
2.92
KB
-rw-r--r--
sag-security-issues-wrong.html
2.89
KB
-rw-r--r--
sag-security-issues.html
2.11
KB
-rw-r--r--
sag-see-also.html
2.23
KB
-rw-r--r--
sag-text-conventions.html
3.11
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : sag-pam_pwhistory.html
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>6.25. pam_pwhistory - grant access using .pwhistory file</title><meta name="generator" content="DocBook XSL Stylesheets V1.78.1"><link rel="home" href="Linux-PAM_SAG.html" title="The Linux-PAM System Administrators' Guide"><link rel="up" href="sag-module-reference.html" title="Chapter 6. A reference guide for available modules"><link rel="prev" href="sag-pam_permit.html" title="6.24. pam_permit - the promiscuous module"><link rel="next" href="sag-pam_rhosts.html" title="6.26. pam_rhosts - grant access using .rhosts file"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">6.25. pam_pwhistory - grant access using .pwhistory file</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="sag-pam_permit.html">Prev</a> </td><th width="60%" align="center">Chapter 6. A reference guide for available modules</th><td width="20%" align="right"> <a accesskey="n" href="sag-pam_rhosts.html">Next</a></td></tr></table><hr></div><div class="section"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sag-pam_pwhistory"></a>6.25. pam_pwhistory - grant access using .pwhistory file</h2></div></div></div><div class="cmdsynopsis"><p><code class="command">pam_pwhistory.so</code> [ debug ] [ use_authtok ] [ enforce_for_root ] [ remember=<em class="replaceable"><code>N</code></em> ] [ retry=<em class="replaceable"><code>N</code></em> ] [ authtok_type=<em class="replaceable"><code>STRING</code></em> ]</p></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_pwhistory-description"></a>6.25.1. DESCRIPTION</h3></div></div></div><p> This module saves the last passwords for each user in order to force password change history and keep the user from alternating between the same password too frequently. </p><p> This module does not work together with kerberos. In general, it does not make much sense to use this module in conjunction with NIS or LDAP, since the old passwords are stored on the local machine and are not available on another machine for password history checking. </p></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_pwhistory-options"></a>6.25.2. OPTIONS</h3></div></div></div><div class="variablelist"><dl class="variablelist"><dt><span class="term"> <code class="option">debug</code> </span></dt><dd><p> Turns on debugging via <span class="citerefentry"><span class="refentrytitle">syslog</span>(3)</span>. </p></dd><dt><span class="term"> <code class="option">use_authtok</code> </span></dt><dd><p> When password changing enforce the module to use the new password provided by a previously stacked <code class="option">password</code> module (this is used in the example of the stacking of the <span class="command"><strong>pam_cracklib</strong></span> module documented below). </p></dd><dt><span class="term"> <code class="option">enforce_for_root</code> </span></dt><dd><p> If this option is set, the check is enforced for root, too. </p></dd><dt><span class="term"> <code class="option">remember=<em class="replaceable"><code>N</code></em></code> </span></dt><dd><p> The last <em class="replaceable"><code>N</code></em> passwords for each user are saved in <code class="filename">/etc/security/opasswd</code>. The default is <span class="emphasis"><em>10</em></span>. Value of <span class="emphasis"><em>0</em></span> makes the module to keep the existing contents of the <code class="filename">opasswd</code> file unchanged. </p></dd><dt><span class="term"> <code class="option">retry=<em class="replaceable"><code>N</code></em></code> </span></dt><dd><p> Prompt user at most <em class="replaceable"><code>N</code></em> times before returning with error. The default is <span class="emphasis"><em>1</em></span>. </p></dd><dt><span class="term"> <code class="option">authtok_type=<em class="replaceable"><code>STRING</code></em></code> </span></dt><dd><p> See <span class="citerefentry"><span class="refentrytitle">pam_get_authtok</span>(3)</span> for more details. </p></dd></dl></div></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_pwhistory-types"></a>6.25.3. MODULE TYPES PROVIDED</h3></div></div></div><p> Only the <code class="option">password</code> module type is provided. </p></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_pwhistory-return_values"></a>6.25.4. RETURN VALUES</h3></div></div></div><div class="variablelist"><dl class="variablelist"><dt><span class="term">PAM_AUTHTOK_ERR</span></dt><dd><p> No new password was entered, the user aborted password change or new password couldn't be set. </p></dd><dt><span class="term">PAM_IGNORE</span></dt><dd><p> Password history was disabled. </p></dd><dt><span class="term">PAM_MAXTRIES</span></dt><dd><p> Password was rejected too often. </p></dd><dt><span class="term">PAM_USER_UNKNOWN</span></dt><dd><p> User is not known to system. </p></dd></dl></div></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_pwhistory-files"></a>6.25.5. FILES</h3></div></div></div><div class="variablelist"><dl class="variablelist"><dt><span class="term"><code class="filename">/etc/security/opasswd</code></span></dt><dd><p>File with password history</p></dd></dl></div></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_pwhistory-examples"></a>6.25.6. EXAMPLES</h3></div></div></div><p> An example password section would be: </p><pre class="programlisting"> #%PAM-1.0 password required pam_pwhistory.so password required pam_unix.so use_authtok </pre><p> </p><p> In combination with <span class="command"><strong>pam_cracklib</strong></span>: </p><pre class="programlisting"> #%PAM-1.0 password required pam_cracklib.so retry=3 password required pam_pwhistory.so use_authtok password required pam_unix.so use_authtok </pre><p> </p></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_pwhistory-author"></a>6.25.7. AUTHOR</h3></div></div></div><p> pam_pwhistory was written by Thorsten Kukuk <kukuk@thkukuk.de> </p></div></div><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="sag-pam_permit.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="sag-module-reference.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="sag-pam_rhosts.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">6.24. pam_permit - the promiscuous module </td><td width="20%" align="center"><a accesskey="h" href="Linux-PAM_SAG.html">Home</a></td><td width="40%" align="right" valign="top"> 6.26. pam_rhosts - grant access using .rhosts file</td></tr></table></div></body></html>
Close