Print this page
5069 Removal of wu-ftpd
Reviewed by: Josef 'Jeff' Sipek <josef.sipek@nexenta.com>
Reviewed by: Garrett D'Amore <garrett@damore.org>
Reviewed by: Milan Jurik <milan.jurik@xylab.cz>
Reviewed by: Igor Kozhukhov <ikozhukhov@gmail.com>
Reviewed by: Gary Mills <gary_mills@fastmail.fm>
Reviewed by: Toomas Soome <tsoome@me.com>
Reviewed by: Adam Stevko <adam.stevko@gmail.com>

Split Close
Expand all
Collapse all
          --- old/usr/src/man/man4/pam.conf.4
          +++ new/usr/src/man/man4/pam.conf.4
↓ open down ↓ 5 lines elided ↑ open up ↑
   6    6  .TH PAM.CONF 4 "Jun 19, 2006"
   7    7  .SH NAME
   8    8  pam.conf \- configuration file for pluggable authentication modules
   9    9  .SH SYNOPSIS
  10   10  .LP
  11   11  .nf
  12   12  \fB/etc/pam.conf\fR
  13   13  .fi
  14   14  
  15   15  .SH DESCRIPTION
  16      -.sp
  17   16  .LP
  18   17  \fBpam.conf\fR is the configuration file for the Pluggable Authentication
  19   18  Module architecture, or \fBPAM\fR. A \fBPAM\fR module provides functionality
  20   19  for one or more of four possible services: authentication, account management,
  21   20  session management, and password management.
  22   21  .sp
  23   22  .ne 2
  24   23  .na
  25   24  \fBauthentication service module\fR
  26   25  .ad
↓ open down ↓ 32 lines elided ↑ open up ↑
  59   58  .sp .6
  60   59  .RS 4n
  61   60  Provides functionality to change a user's authentication token or password.
  62   61  .RE
  63   62  
  64   63  .sp
  65   64  .LP
  66   65  Each of the four service modules can be implemented as a shared library object
  67   66  which can be referenced in the \fBpam.conf\fR configuration file.
  68   67  .SS "Simplified pam.conf Configuration File"
  69      -.sp
  70   68  .LP
  71   69  The \fBpam.conf\fR file contains a listing of services. Each service is paired
  72   70  with a corresponding service module. When a service is requested, its
  73   71  associated module is invoked. Each entry may be a maximum of 256 characters,
  74   72  including the end of line, and has the following format:
  75   73  .sp
  76   74  .in +2
  77   75  .nf
  78   76  \fIservice_name module_type control_flag module_path options\fR
  79   77  .fi
↓ open down ↓ 64 lines elided ↑ open up ↑
 144  142  .LP
 145  143  The \fIoptions\fR field is used by the \fBPAM\fR framework layer to pass module
 146  144  specific options to the modules. It is up to the module to parse and interpret
 147  145  the options.
 148  146  .sp
 149  147  .LP
 150  148  This field can be used by the modules to turn on debugging or to pass any
 151  149  module specific parameters such as a \fBTIMEOUT\fR value. The options supported
 152  150  by the modules are documented in their respective manual pages.
 153  151  .SS "Integrating Multiple Authentication Services With Stacking"
 154      -.sp
 155  152  .LP
 156  153  When a \fIservice_name\fR of the same \fImodule_type\fR is defined more than
 157  154  once, the service is said to be stacked. Each module referenced in the
 158  155  \fImodule_path\fR for that service is then processed in the order that it
 159  156  occurs in the configuration file. The \fIcontrol_flag\fR field specifies the
 160  157  continuation and failure semantics of the modules, and can contain one of the
 161  158  following values:
 162  159  .sp
 163  160  .ne 2
 164  161  .na
↓ open down ↓ 142 lines elided ↑ open up ↑
 307  304  which are in the stack, will only be invoked if the \fBrhosts\fR check fails.
 308  305  This gives the system administrator the flexibility to determine if
 309  306  \fBrhosts\fR alone is sufficient enough to authenticate a remote user.
 310  307  .sp
 311  308  .LP
 312  309  Some modules return \fBPAM_IGNORE\fR in certain situations. In these cases the
 313  310  \fBPAM\fR framework ignores the entire entry in \fBpam.conf\fR regardless of
 314  311  whether or not it is \fBbinding\fR, \fBrequisite\fR, \fBrequired\fR,
 315  312  \fBoptional\fR, or \fBsufficient\fR.
 316  313  .SS "Utilities and Files"
 317      -.sp
 318  314  .LP
 319  315  The specific service names and module types for each service should be
 320  316  documented in the man page for that service. For instance, the \fBsshd\fR(1M)
 321  317  man page lists all of the \fBPAM\fR service names and module types for the
 322  318  \fBsshd\fR command.
 323  319  .sp
 324  320  .LP
 325  321  The \fBPAM\fR configuration file does not dictate either the name or the
 326  322  location of the service specific modules. The convention, however, is the
 327  323  following:
↓ open down ↓ 89 lines elided ↑ open up ↑
 417  413  #
 418  414  # Default definition for  Password management
 419  415  # Used when service name is not explicitly mentioned
 420  416  #
 421  417  OTHER   password include        unix_common
 422  418  .fi
 423  419  .in -2
 424  420  .sp
 425  421  
 426  422  .SH ATTRIBUTES
 427      -.sp
 428  423  .LP
 429  424  See \fBattributes\fR(5) for descriptions of the following attributes:
 430  425  .sp
 431  426  
 432  427  .sp
 433  428  .TS
 434  429  box;
 435  430  c | c
 436  431  l | l .
 437  432  ATTRIBUTE TYPE  ATTRIBUTE VALUE
 438  433  _
 439  434  Interface Stability     See Below.
 440  435  .TE
 441  436  
 442  437  .sp
 443  438  .LP
 444  439  The format is Stable. The contents has no stability attributes.
 445  440  .SH SEE ALSO
 446      -.sp
 447  441  .LP
 448      -\fBlogin\fR(1), \fBpasswd\fR(1), \fBin.ftpd\fR(1M), \fBin.rlogind\fR(1M),
      442 +\fBlogin\fR(1), \fBpasswd\fR(1), \fBin.rlogind\fR(1M),
 449  443  \fBin.rshd\fR(1M), \fBin.telnetd\fR(1M), \fBin.uucpd\fR(1M), \fBinit\fR(1M),
 450  444  \fBrpc.rexd\fR(1M), \fBsac\fR(1M), \fBttymon\fR(1M), \fBsu\fR(1M),
 451  445  \fBpam\fR(3PAM), \fBsyslog\fR(3C), \fBlibpam\fR(3LIB), \fBattributes\fR(5),
 452  446  \fBenviron\fR(5), \fBpam_authtok_check\fR(5), \fBpam_authtok_get\fR(5),
 453  447  \fBpam_authtok_store\fR(5), \fBpam_dhkeys\fR(5), \fBpam_krb5\fR(5),
 454  448  \fBpam_passwd_auth\fR(5), \fBpam_unix_account\fR(5), \fBpam_unix_auth\fR(5),
 455  449  \fBpam_unix_session\fR(5)
 456  450  .SH NOTES
 457      -.sp
 458  451  .LP
 459  452  The \fBpam_unix\fR module is no longer supported. Similar functionality is
 460  453  provided by \fBpam_authtok_check\fR(5), \fBpam_authtok_get\fR(5),
 461  454  \fBpam_authtok_store\fR(5), \fBpam_dhkeys\fR(5), \fBpam_passwd_auth\fR(5),
 462  455  \fBpam_unix_account\fR(5), \fBpam_unix_auth\fR(5), and
 463  456  \fBpam_unix_session\fR(5).
 464  457  .sp
 465  458  .LP
 466  459  With the removal of the \fBpam_unix\fR module, the SunOS delivered PAM service
 467  460  modules no longer need or support the "\fBuse_first_pass\fR" or
 468  461  "\fBtry_first_pass\fR" options. This functionality is provided by stacking
 469  462  \fBpam_authtok_get\fR(5) above a module that requires a password.
    
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX