first commit
This commit is contained in:
		
							
								
								
									
										122
									
								
								etc_org/security/access.conf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										122
									
								
								etc_org/security/access.conf
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,122 @@
 | 
			
		||||
# Login access control table.
 | 
			
		||||
#
 | 
			
		||||
# Comment line must start with "#", no space at front.
 | 
			
		||||
# Order of lines is important.
 | 
			
		||||
#
 | 
			
		||||
# When someone logs in, the table is scanned for the first entry that
 | 
			
		||||
# matches the (user, host) combination, or, in case of non-networked
 | 
			
		||||
# logins, the first entry that matches the (user, tty) combination.  The
 | 
			
		||||
# permissions field of that table entry determines whether the login will
 | 
			
		||||
# be accepted or refused.
 | 
			
		||||
#
 | 
			
		||||
# Format of the login access control table is three fields separated by a
 | 
			
		||||
# ":" character:
 | 
			
		||||
#
 | 
			
		||||
# [Note, if you supply a 'fieldsep=|' argument to the pam_access.so
 | 
			
		||||
# module, you can change the field separation character to be
 | 
			
		||||
# '|'. This is useful for configurations where you are trying to use
 | 
			
		||||
# pam_access with X applications that provide PAM_TTY values that are
 | 
			
		||||
# the display variable like "host:0".]
 | 
			
		||||
#
 | 
			
		||||
# 	permission : users : origins
 | 
			
		||||
#
 | 
			
		||||
# The first field should be a "+" (access granted) or "-" (access denied)
 | 
			
		||||
# character.
 | 
			
		||||
#
 | 
			
		||||
# The second field should be a list of one or more login names, group
 | 
			
		||||
# names, or ALL (always matches). A pattern of the form user@host is
 | 
			
		||||
# matched when the login name matches the "user" part, and when the
 | 
			
		||||
# "host" part matches the local machine name.
 | 
			
		||||
#
 | 
			
		||||
# The third field should be a list of one or more tty names (for
 | 
			
		||||
# non-networked logins), host names, domain names (begin with "."), host
 | 
			
		||||
# addresses, internet network numbers (end with "."), ALL (always
 | 
			
		||||
# matches), NONE (matches no tty on non-networked logins) or
 | 
			
		||||
# LOCAL (matches any string that does not contain a "." character).
 | 
			
		||||
#
 | 
			
		||||
# You can use @netgroupname in host or user patterns; this even works
 | 
			
		||||
# for @usergroup@@hostgroup patterns.
 | 
			
		||||
#
 | 
			
		||||
# The EXCEPT operator makes it possible to write very compact rules.
 | 
			
		||||
#
 | 
			
		||||
# The group file is searched only when a name does not match that of the
 | 
			
		||||
# logged-in user. Both the user's primary group is matched, as well as
 | 
			
		||||
# groups in which users are explicitly listed.
 | 
			
		||||
# To avoid problems with accounts, which have the same name as a group,
 | 
			
		||||
# you can use brackets around group names '(group)' to differentiate.
 | 
			
		||||
# In this case, you should also set the "nodefgroup" option.
 | 
			
		||||
#
 | 
			
		||||
# TTY NAMES: Must be in the form returned by ttyname(3) less the initial
 | 
			
		||||
# "/dev" (e.g. tty1 or vc/1)
 | 
			
		||||
#
 | 
			
		||||
##############################################################################
 | 
			
		||||
#
 | 
			
		||||
# Disallow non-root logins on tty1
 | 
			
		||||
#
 | 
			
		||||
#-:ALL EXCEPT root:tty1
 | 
			
		||||
#
 | 
			
		||||
# Disallow console logins to all but a few accounts.
 | 
			
		||||
#
 | 
			
		||||
#-:ALL EXCEPT wheel shutdown sync:LOCAL
 | 
			
		||||
#
 | 
			
		||||
# Same, but make sure that really the group wheel and not the user
 | 
			
		||||
# wheel is used (use nodefgroup argument, too):
 | 
			
		||||
#
 | 
			
		||||
#-:ALL EXCEPT (wheel) shutdown sync:LOCAL
 | 
			
		||||
#
 | 
			
		||||
# Disallow non-local logins to privileged accounts (group wheel).
 | 
			
		||||
#
 | 
			
		||||
#-:wheel:ALL EXCEPT LOCAL .win.tue.nl
 | 
			
		||||
#
 | 
			
		||||
# Some accounts are not allowed to login from anywhere:
 | 
			
		||||
#
 | 
			
		||||
#-:wsbscaro wsbsecr wsbspac wsbsym wscosor wstaiwde:ALL
 | 
			
		||||
#
 | 
			
		||||
# All other accounts are allowed to login from anywhere.
 | 
			
		||||
#
 | 
			
		||||
##############################################################################
 | 
			
		||||
# All lines from here up to the end are building a more complex example.
 | 
			
		||||
##############################################################################
 | 
			
		||||
#
 | 
			
		||||
# User "root" should be allowed to get access via cron .. tty5 tty6.
 | 
			
		||||
#+ : root : cron crond :0 tty1 tty2 tty3 tty4 tty5 tty6
 | 
			
		||||
#
 | 
			
		||||
# User "root" should be allowed to get access from hosts with ip addresses.
 | 
			
		||||
#+ : root : 192.168.200.1 192.168.200.4 192.168.200.9
 | 
			
		||||
#+ : root : 127.0.0.1
 | 
			
		||||
#
 | 
			
		||||
# User "root" should get access from network 192.168.201.
 | 
			
		||||
# This term will be evaluated by string matching.
 | 
			
		||||
# comment: It might be better to use network/netmask instead.
 | 
			
		||||
#          The same is 192.168.201.0/24 or 192.168.201.0/255.255.255.0
 | 
			
		||||
#+ : root : 192.168.201.
 | 
			
		||||
#
 | 
			
		||||
# User "root" should be able to have access from domain.
 | 
			
		||||
# Uses string matching also.
 | 
			
		||||
#+ : root : .foo.bar.org
 | 
			
		||||
#
 | 
			
		||||
# User "root" should be denied to get access from all other sources.
 | 
			
		||||
#- : root : ALL
 | 
			
		||||
#
 | 
			
		||||
# User "foo" and members of netgroup "nis_group" should be
 | 
			
		||||
# allowed to get access from all sources.
 | 
			
		||||
# This will only work if netgroup service is available.
 | 
			
		||||
#+ : @nis_group foo : ALL
 | 
			
		||||
#
 | 
			
		||||
# User "john" should get access from ipv4 net/mask
 | 
			
		||||
#+ : john : 127.0.0.0/24
 | 
			
		||||
#
 | 
			
		||||
# User "john" should get access from ipv4 as ipv6 net/mask
 | 
			
		||||
#+ : john : ::ffff:127.0.0.0/127
 | 
			
		||||
#
 | 
			
		||||
# User "john" should get access from ipv6 host address
 | 
			
		||||
#+ : john : 2001:4ca0:0:101::1
 | 
			
		||||
#
 | 
			
		||||
# User "john" should get access from ipv6 host address (same as above)
 | 
			
		||||
#+ : john : 2001:4ca0:0:101:0:0:0:1
 | 
			
		||||
#
 | 
			
		||||
# User "john" should get access from ipv6 net/mask
 | 
			
		||||
#+ : john : 2001:4ca0:0:101::/64
 | 
			
		||||
#
 | 
			
		||||
# All other users should be denied to get access from all sources.
 | 
			
		||||
#- : ALL : ALL
 | 
			
		||||
							
								
								
									
										106
									
								
								etc_org/security/group.conf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										106
									
								
								etc_org/security/group.conf
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,106 @@
 | 
			
		||||
#
 | 
			
		||||
# This is the configuration file for the pam_group module.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# *** Please note that giving group membership on a session basis is
 | 
			
		||||
# *** NOT inherently secure. If a user can create an executable that
 | 
			
		||||
# *** is setgid a group that they are infrequently given membership
 | 
			
		||||
# *** of, they can basically obtain group membership any time they
 | 
			
		||||
# *** like. Example: games are allowed between the hours of 6pm and 6am
 | 
			
		||||
# *** user joe logs in at 7pm writes a small C-program toplay.c that
 | 
			
		||||
# *** invokes their favorite shell, compiles it and does
 | 
			
		||||
# *** "chgrp play toplay; chmod g+s toplay". They are basically able
 | 
			
		||||
# *** to play games any time... You have been warned. AGM
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# The syntax of the lines is as follows:
 | 
			
		||||
#
 | 
			
		||||
#       services;ttys;users;times;groups
 | 
			
		||||
#
 | 
			
		||||
# white space is ignored and lines maybe extended with '\\n' (escaped
 | 
			
		||||
# newlines). From reading these comments, it is clear that
 | 
			
		||||
# text following a '#' is ignored to the end of the line.
 | 
			
		||||
#
 | 
			
		||||
# the combination of individual users/terminals etc is a logic list
 | 
			
		||||
# namely individual tokens that are optionally prefixed with '!' (logical
 | 
			
		||||
# not) and separated with '&' (logical and) and '|' (logical or).
 | 
			
		||||
#
 | 
			
		||||
# services
 | 
			
		||||
#       is a logic list of PAM service names that the rule applies to.
 | 
			
		||||
#
 | 
			
		||||
# ttys
 | 
			
		||||
#       is a logic list of terminal names that this rule applies to.
 | 
			
		||||
#
 | 
			
		||||
# users
 | 
			
		||||
#       is a logic list of users or a netgroup of users to whom this
 | 
			
		||||
#       rule applies.
 | 
			
		||||
#
 | 
			
		||||
# NB. For these items the simple wildcard '*' may be used only once.
 | 
			
		||||
#     With netgroups no wildcards or logic operators are allowed.
 | 
			
		||||
#
 | 
			
		||||
# times
 | 
			
		||||
#       It is used to indicate "when" these groups are to be given to the
 | 
			
		||||
#       user. The format here is a logic list of day/time-range
 | 
			
		||||
#       entries the days are specified by a sequence of two character
 | 
			
		||||
#       entries, MoTuSa for example is Monday Tuesday and Saturday. Note
 | 
			
		||||
#       that repeated days are unset MoMo = no day, and MoWk = all weekdays
 | 
			
		||||
#       bar Monday. The two character combinations accepted are
 | 
			
		||||
#
 | 
			
		||||
#               Mo Tu We Th Fr Sa Su Wk Wd Al
 | 
			
		||||
#
 | 
			
		||||
#       the last two being week-end days and all 7 days of the week
 | 
			
		||||
#       respectively. As a final example, AlFr means all days except Friday.
 | 
			
		||||
#
 | 
			
		||||
#       Each day/time-range can be prefixed with a '!' to indicate "anything
 | 
			
		||||
#       but"
 | 
			
		||||
#
 | 
			
		||||
#       The time-range part is two 24-hour times HHMM separated by a hyphen
 | 
			
		||||
#       indicating the start and finish time (if the finish time is smaller
 | 
			
		||||
#       than the start time it is deemed to apply on the following day).
 | 
			
		||||
#
 | 
			
		||||
# groups
 | 
			
		||||
#	The (comma or space separated) list of groups that the user
 | 
			
		||||
#	inherits membership of. These groups are added if the previous
 | 
			
		||||
#	fields are satisfied by the user's request
 | 
			
		||||
#
 | 
			
		||||
# For a rule to be active, ALL of service+ttys+users must be satisfied
 | 
			
		||||
# by the applying process.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Note, to get this to work as it is currently typed you need
 | 
			
		||||
#
 | 
			
		||||
# 1. to run an application as root
 | 
			
		||||
# 2. add the following groups to the /etc/group file:
 | 
			
		||||
#		floppy, play, sound
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Here is a simple example: running 'xsh' on tty* (any ttyXXX device),
 | 
			
		||||
# the user 'us' is given access to the floppy (through membership of
 | 
			
		||||
# the floppy group)
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
#xsh;tty*&!ttyp*;us;Al0000-2400;floppy
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# another example: running 'xsh' on tty* (any ttyXXX device),
 | 
			
		||||
# the user 'sword' is given access to games (through membership of
 | 
			
		||||
# the sound and play group) after work hours.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
#xsh; tty* ;sword;!Wk0900-1800;sound, play
 | 
			
		||||
#xsh; tty* ;*;Al0900-1800;floppy
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# yet another example: any member of the group 'admin' running
 | 
			
		||||
# 'xsh' on tty*, is granted access (at any time) to the group 'plugdev'
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
#xsh; tty* ;%admin;Al0000-2400;plugdev
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# End of group.conf file
 | 
			
		||||
#
 | 
			
		||||
							
								
								
									
										56
									
								
								etc_org/security/limits.conf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										56
									
								
								etc_org/security/limits.conf
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,56 @@
 | 
			
		||||
# /etc/security/limits.conf
 | 
			
		||||
#
 | 
			
		||||
#Each line describes a limit for a user in the form:
 | 
			
		||||
#
 | 
			
		||||
#<domain>        <type>  <item>  <value>
 | 
			
		||||
#
 | 
			
		||||
#Where:
 | 
			
		||||
#<domain> can be:
 | 
			
		||||
#        - a user name
 | 
			
		||||
#        - a group name, with @group syntax
 | 
			
		||||
#        - the wildcard *, for default entry
 | 
			
		||||
#        - the wildcard %, can be also used with %group syntax,
 | 
			
		||||
#                 for maxlogin limit
 | 
			
		||||
#        - NOTE: group and wildcard limits are not applied to root.
 | 
			
		||||
#          To apply a limit to the root user, <domain> must be
 | 
			
		||||
#          the literal username root.
 | 
			
		||||
#
 | 
			
		||||
#<type> can have the two values:
 | 
			
		||||
#        - "soft" for enforcing the soft limits
 | 
			
		||||
#        - "hard" for enforcing hard limits
 | 
			
		||||
#
 | 
			
		||||
#<item> can be one of the following:
 | 
			
		||||
#        - core - limits the core file size (KB)
 | 
			
		||||
#        - data - max data size (KB)
 | 
			
		||||
#        - fsize - maximum filesize (KB)
 | 
			
		||||
#        - memlock - max locked-in-memory address space (KB)
 | 
			
		||||
#        - nofile - max number of open files
 | 
			
		||||
#        - rss - max resident set size (KB)
 | 
			
		||||
#        - stack - max stack size (KB)
 | 
			
		||||
#        - cpu - max CPU time (MIN)
 | 
			
		||||
#        - nproc - max number of processes
 | 
			
		||||
#        - as - address space limit (KB)
 | 
			
		||||
#        - maxlogins - max number of logins for this user
 | 
			
		||||
#        - maxsyslogins - max number of logins on the system
 | 
			
		||||
#        - priority - the priority to run user process with
 | 
			
		||||
#        - locks - max number of file locks the user can hold
 | 
			
		||||
#        - sigpending - max number of pending signals
 | 
			
		||||
#        - msgqueue - max memory used by POSIX message queues (bytes)
 | 
			
		||||
#        - nice - max nice priority allowed to raise to values: [-20, 19]
 | 
			
		||||
#        - rtprio - max realtime priority
 | 
			
		||||
#        - chroot - change root to directory (Debian-specific)
 | 
			
		||||
#
 | 
			
		||||
#<domain>      <type>  <item>         <value>
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
#*               soft    core            0
 | 
			
		||||
#root            hard    core            100000
 | 
			
		||||
#*               hard    rss             10000
 | 
			
		||||
#@student        hard    nproc           20
 | 
			
		||||
#@faculty        soft    nproc           20
 | 
			
		||||
#@faculty        hard    nproc           50
 | 
			
		||||
#ftp             hard    nproc           0
 | 
			
		||||
#ftp             -       chroot          /ftp
 | 
			
		||||
#@student        -       maxlogins       4
 | 
			
		||||
 | 
			
		||||
# End of file
 | 
			
		||||
							
								
								
									
										11
									
								
								etc_org/security/limits.d/audio.conf.disabled
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										11
									
								
								etc_org/security/limits.d/audio.conf.disabled
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,11 @@
 | 
			
		||||
# Provided by the jackd package.
 | 
			
		||||
#
 | 
			
		||||
# Changes to this file will be preserved.
 | 
			
		||||
#
 | 
			
		||||
# If you want to enable/disable realtime permissions, run
 | 
			
		||||
#
 | 
			
		||||
#    dpkg-reconfigure -p high jackd
 | 
			
		||||
 | 
			
		||||
@audio   -  rtprio     95
 | 
			
		||||
@audio   -  memlock    unlimited
 | 
			
		||||
#@audio   -  nice      -19
 | 
			
		||||
							
								
								
									
										28
									
								
								etc_org/security/namespace.conf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										28
									
								
								etc_org/security/namespace.conf
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,28 @@
 | 
			
		||||
# /etc/security/namespace.conf
 | 
			
		||||
#
 | 
			
		||||
# See /usr/share/doc/pam-*/txts/README.pam_namespace for more information.
 | 
			
		||||
#
 | 
			
		||||
# Uncommenting the following three lines will polyinstantiate
 | 
			
		||||
# /tmp, /var/tmp and user's home directories. /tmp and /var/tmp will
 | 
			
		||||
# be polyinstantiated based on the MLS level part of the security context as well as user
 | 
			
		||||
# name, Polyinstantion will not be performed for user root and adm for directories
 | 
			
		||||
# /tmp and /var/tmp, whereas home directories will be polyinstantiated for all users.
 | 
			
		||||
# The user name and context is appended to the instance prefix.
 | 
			
		||||
#
 | 
			
		||||
# Note that instance directories do not have to reside inside the
 | 
			
		||||
# polyinstantiated directory. In the examples below, instances of /tmp
 | 
			
		||||
# will be created in /tmp-inst directory, where as instances of /var/tmp
 | 
			
		||||
# and users home directories will reside within the directories that
 | 
			
		||||
# are being polyinstantiated.
 | 
			
		||||
#
 | 
			
		||||
# Instance parent directories must exist for the polyinstantiation
 | 
			
		||||
# mechanism to work. By default, they should be created with the mode
 | 
			
		||||
# of 000. pam_namespace module will enforce this mode unless it
 | 
			
		||||
# is explicitly called with an argument to ignore the mode of the
 | 
			
		||||
# instance parent. System administrators should use this argument with
 | 
			
		||||
# caution, as it will reduce security and isolation achieved by
 | 
			
		||||
# polyinstantiation.
 | 
			
		||||
#
 | 
			
		||||
#/tmp     /tmp-inst/       	level      root,adm
 | 
			
		||||
#/var/tmp /var/tmp/tmp-inst/   	level      root,adm
 | 
			
		||||
#$HOME    $HOME/$USER.inst/     level
 | 
			
		||||
							
								
								
									
										25
									
								
								etc_org/security/namespace.init
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										25
									
								
								etc_org/security/namespace.init
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,25 @@
 | 
			
		||||
#!/bin/sh -p
 | 
			
		||||
# It receives polydir path as $1, the instance path as $2,
 | 
			
		||||
# a flag whether the instance dir was newly created (0 - no, 1 - yes) in $3,
 | 
			
		||||
# and user name in $4.
 | 
			
		||||
#
 | 
			
		||||
# The following section will copy the contents of /etc/skel if this is a
 | 
			
		||||
# newly created home directory.
 | 
			
		||||
if [ "$3" = 1 ]; then
 | 
			
		||||
        # This line will fix the labeling on all newly created directories
 | 
			
		||||
        [ -x /sbin/restorecon ] && /sbin/restorecon "$1"
 | 
			
		||||
        user="$4"
 | 
			
		||||
        passwd=$(getent passwd "$user")
 | 
			
		||||
        homedir=$(echo "$passwd" | cut -f6 -d":")
 | 
			
		||||
        if [ "$1" = "$homedir" ]; then
 | 
			
		||||
                gid=$(echo "$passwd" | cut -f4 -d":")
 | 
			
		||||
                cp -rT /etc/skel "$homedir"
 | 
			
		||||
                chown -R "$user":"$gid" "$homedir"
 | 
			
		||||
                mask=$(awk '/^UMASK/{gsub("#.*$", "", $2); print $2; exit}' /etc/login.defs)
 | 
			
		||||
                mode=$(printf "%o" $((0777 & ~$mask)))
 | 
			
		||||
                chmod ${mode:-700} "$homedir"
 | 
			
		||||
                [ -x /sbin/restorecon ] && /sbin/restorecon -R "$homedir"
 | 
			
		||||
        fi
 | 
			
		||||
fi
 | 
			
		||||
 | 
			
		||||
exit 0
 | 
			
		||||
							
								
								
									
										0
									
								
								etc_org/security/opasswd
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										0
									
								
								etc_org/security/opasswd
									
									
									
									
									
										Normal file
									
								
							
							
								
								
									
										73
									
								
								etc_org/security/pam_env.conf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										73
									
								
								etc_org/security/pam_env.conf
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,73 @@
 | 
			
		||||
#
 | 
			
		||||
# This is the configuration file for pam_env, a PAM module to load in
 | 
			
		||||
# a configurable list of environment variables for a
 | 
			
		||||
#
 | 
			
		||||
# The original idea for this came from Andrew G. Morgan ...
 | 
			
		||||
#<quote>
 | 
			
		||||
#   Mmm. Perhaps you might like to write a pam_env module that reads a
 | 
			
		||||
#   default environment from a file? I can see that as REALLY
 | 
			
		||||
#   useful... Note it would be an "auth" module that returns PAM_IGNORE
 | 
			
		||||
#   for the auth part and sets the environment returning PAM_SUCCESS in
 | 
			
		||||
#   the setcred function...
 | 
			
		||||
#</quote>
 | 
			
		||||
#
 | 
			
		||||
# What I wanted was the REMOTEHOST variable set, purely for selfish
 | 
			
		||||
# reasons, and AGM didn't want it added to the SimpleApps login
 | 
			
		||||
# program (which is where I added the patch). So, my first concern is
 | 
			
		||||
# that variable, from there there are numerous others that might/would
 | 
			
		||||
# be useful to be set: NNTPSERVER, LESS, PATH, PAGER, MANPAGER .....
 | 
			
		||||
#
 | 
			
		||||
# Of course, these are a different kind of variable than REMOTEHOST in
 | 
			
		||||
# that they are things that are likely to be configured by
 | 
			
		||||
# administrators rather than set by logging in, how to treat them both
 | 
			
		||||
# in the same config file?
 | 
			
		||||
#
 | 
			
		||||
# Here is my idea:
 | 
			
		||||
#
 | 
			
		||||
# Each line starts with the variable name, there are then two possible
 | 
			
		||||
# options for each variable DEFAULT and OVERRIDE.
 | 
			
		||||
# DEFAULT allows and administrator to set the value of the
 | 
			
		||||
# variable  to some default value, if none is supplied then the empty
 | 
			
		||||
# string is assumed. The OVERRIDE option tells pam_env that it should
 | 
			
		||||
# enter in its value (overriding the default value) if there is one
 | 
			
		||||
# to use. OVERRIDE is not used, "" is assumed and no override will be
 | 
			
		||||
# done.
 | 
			
		||||
#
 | 
			
		||||
# VARIABLE   [DEFAULT=[value]]  [OVERRIDE=[value]]
 | 
			
		||||
#
 | 
			
		||||
# (Possibly non-existent) environment variables may be used in values
 | 
			
		||||
# using the ${string} syntax and (possibly non-existent) PAM_ITEMs may
 | 
			
		||||
# be used in values using the @{string} syntax. Both the $ and @
 | 
			
		||||
# characters can be backslash escaped to be used as literal values
 | 
			
		||||
# values can be delimited with "", escaped " not supported.
 | 
			
		||||
# Note that many environment variables that you would like to use
 | 
			
		||||
# may not be set by the time the module is called.
 | 
			
		||||
# For example, HOME is used below several times, but
 | 
			
		||||
# many PAM applications don't make it available by the time you need it.
 | 
			
		||||
#
 | 
			
		||||
#
 | 
			
		||||
# First, some special variables
 | 
			
		||||
#
 | 
			
		||||
# Set the REMOTEHOST variable for any hosts that are remote, default
 | 
			
		||||
# to "localhost" rather than not being set at all
 | 
			
		||||
#REMOTEHOST	DEFAULT=localhost OVERRIDE=@{PAM_RHOST}
 | 
			
		||||
#
 | 
			
		||||
# Set the DISPLAY variable if it seems reasonable
 | 
			
		||||
#DISPLAY		DEFAULT=${REMOTEHOST}:0.0 OVERRIDE=${DISPLAY}
 | 
			
		||||
#
 | 
			
		||||
#
 | 
			
		||||
#  Now some simple variables
 | 
			
		||||
#
 | 
			
		||||
#PAGER		DEFAULT=less
 | 
			
		||||
#MANPAGER	DEFAULT=less
 | 
			
		||||
#LESS		DEFAULT="M q e h15 z23 b80"
 | 
			
		||||
#NNTPSERVER	DEFAULT=localhost
 | 
			
		||||
#PATH		DEFAULT=${HOME}/bin:/usr/local/bin:/bin\
 | 
			
		||||
#:/usr/bin:/usr/local/bin/X11:/usr/bin/X11
 | 
			
		||||
#
 | 
			
		||||
# silly examples of escaped variables, just to show how they work.
 | 
			
		||||
#
 | 
			
		||||
#DOLLAR		DEFAULT=\$
 | 
			
		||||
#DOLLARDOLLAR	DEFAULT=	OVERRIDE=\$${DOLLAR}
 | 
			
		||||
#DOLLARPLUS	DEFAULT=\${REMOTEHOST}${REMOTEHOST}
 | 
			
		||||
#ATSIGN		DEFAULT=""	OVERRIDE=\@
 | 
			
		||||
							
								
								
									
										50
									
								
								etc_org/security/pwquality.conf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										50
									
								
								etc_org/security/pwquality.conf
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,50 @@
 | 
			
		||||
# Configuration for systemwide password quality limits
 | 
			
		||||
# Defaults:
 | 
			
		||||
#
 | 
			
		||||
# Number of characters in the new password that must not be present in the
 | 
			
		||||
# old password.
 | 
			
		||||
# difok = 1
 | 
			
		||||
#
 | 
			
		||||
# Minimum acceptable size for the new password (plus one if
 | 
			
		||||
# credits are not disabled which is the default). (See pam_cracklib manual.)
 | 
			
		||||
# Cannot be set to lower value than 6.
 | 
			
		||||
# minlen = 8
 | 
			
		||||
#
 | 
			
		||||
# The maximum credit for having digits in the new password. If less than 0
 | 
			
		||||
# it is the minimum number of digits in the new password.
 | 
			
		||||
# dcredit = 0
 | 
			
		||||
#
 | 
			
		||||
# The maximum credit for having uppercase characters in the new password.
 | 
			
		||||
# If less than 0 it is the minimum number of uppercase characters in the new
 | 
			
		||||
# password.
 | 
			
		||||
# ucredit = 0
 | 
			
		||||
#
 | 
			
		||||
# The maximum credit for having lowercase characters in the new password.
 | 
			
		||||
# If less than 0 it is the minimum number of lowercase characters in the new
 | 
			
		||||
# password.
 | 
			
		||||
# lcredit = 0
 | 
			
		||||
#
 | 
			
		||||
# The maximum credit for having other characters in the new password.
 | 
			
		||||
# If less than 0 it is the minimum number of other characters in the new
 | 
			
		||||
# password.
 | 
			
		||||
# ocredit = 0
 | 
			
		||||
#
 | 
			
		||||
# The minimum number of required classes of characters for the new
 | 
			
		||||
# password (digits, uppercase, lowercase, others).
 | 
			
		||||
# minclass = 0
 | 
			
		||||
#
 | 
			
		||||
# The maximum number of allowed consecutive same characters in the new password.
 | 
			
		||||
# The check is disabled if the value is 0.
 | 
			
		||||
# maxrepeat = 0
 | 
			
		||||
#
 | 
			
		||||
# The maximum number of allowed consecutive characters of the same class in the
 | 
			
		||||
# new password.
 | 
			
		||||
# The check is disabled if the value is 0.
 | 
			
		||||
# maxclassrepeat = 0
 | 
			
		||||
#
 | 
			
		||||
# Whether to check for the words from the passwd entry GECOS string of the user.
 | 
			
		||||
# The check is enabled if the value is not 0.
 | 
			
		||||
# gecoscheck = 0
 | 
			
		||||
#
 | 
			
		||||
# Path to the cracklib dictionaries. Default is to use the cracklib default.
 | 
			
		||||
# dictpath =
 | 
			
		||||
							
								
								
									
										11
									
								
								etc_org/security/sepermit.conf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										11
									
								
								etc_org/security/sepermit.conf
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,11 @@
 | 
			
		||||
# /etc/security/sepermit.conf
 | 
			
		||||
#
 | 
			
		||||
# Each line contains either:
 | 
			
		||||
#        - an user name
 | 
			
		||||
#        - a group name, with @group syntax
 | 
			
		||||
#        - a SELinux user name, with %seuser syntax
 | 
			
		||||
# Each line can contain optional arguments separated by :
 | 
			
		||||
# The possible arguments are:
 | 
			
		||||
#        - exclusive - only single login session will
 | 
			
		||||
#          be allowed for the user and the user's processes
 | 
			
		||||
#          will be killed on logout
 | 
			
		||||
							
								
								
									
										65
									
								
								etc_org/security/time.conf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										65
									
								
								etc_org/security/time.conf
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,65 @@
 | 
			
		||||
# this is an example configuration file for the pam_time module. Its syntax
 | 
			
		||||
# was initially based heavily on that of the shadow package (shadow-960129).
 | 
			
		||||
#
 | 
			
		||||
# the syntax of the lines is as follows:
 | 
			
		||||
#
 | 
			
		||||
#       services;ttys;users;times
 | 
			
		||||
#
 | 
			
		||||
# white space is ignored and lines maybe extended with '\\n' (escaped
 | 
			
		||||
# newlines). As should be clear from reading these comments,
 | 
			
		||||
# text following a '#' is ignored to the end of the line.
 | 
			
		||||
#
 | 
			
		||||
# the combination of individual users/terminals etc is a logic list
 | 
			
		||||
# namely individual tokens that are optionally prefixed with '!' (logical
 | 
			
		||||
# not) and separated with '&' (logical and) and '|' (logical or).
 | 
			
		||||
#
 | 
			
		||||
# services
 | 
			
		||||
#	is a logic list of PAM service names that the rule applies to.
 | 
			
		||||
#
 | 
			
		||||
# ttys
 | 
			
		||||
#	is a logic list of terminal names that this rule applies to.
 | 
			
		||||
#
 | 
			
		||||
# users
 | 
			
		||||
#	is a logic list of users or a netgroup of users to whom this
 | 
			
		||||
#	rule applies.
 | 
			
		||||
#
 | 
			
		||||
# NB. For these items the simple wildcard '*' may be used only once.
 | 
			
		||||
#
 | 
			
		||||
# times
 | 
			
		||||
#	the format here is a logic list of day/time-range
 | 
			
		||||
#	entries the days are specified by a sequence of two character
 | 
			
		||||
#	entries, MoTuSa for example is Monday Tuesday and Saturday. Note
 | 
			
		||||
#	that repeated days are unset MoMo = no day, and MoWk = all weekdays
 | 
			
		||||
#	bar Monday. The two character combinations accepted are
 | 
			
		||||
#
 | 
			
		||||
#		Mo Tu We Th Fr Sa Su Wk Wd Al
 | 
			
		||||
#
 | 
			
		||||
#	the last two being week-end days and all 7 days of the week
 | 
			
		||||
#	respectively. As a final example, AlFr means all days except Friday.
 | 
			
		||||
#
 | 
			
		||||
#	each day/time-range can be prefixed with a '!' to indicate "anything
 | 
			
		||||
#	but"
 | 
			
		||||
#
 | 
			
		||||
#	The time-range part is two 24-hour times HHMM separated by a hyphen
 | 
			
		||||
#	indicating the start and finish time (if the finish time is smaller
 | 
			
		||||
#	than the start time it is deemed to apply on the following day).
 | 
			
		||||
#
 | 
			
		||||
# for a rule to be active, ALL of service+ttys+users must be satisfied
 | 
			
		||||
# by the applying process.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Here is a simple example: running blank on tty* (any ttyXXX device),
 | 
			
		||||
# the users 'you' and 'me' are denied service all of the time
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
#blank;tty* & !ttyp*;you|me;!Al0000-2400
 | 
			
		||||
 | 
			
		||||
# Another silly example, user 'root' is denied xsh access
 | 
			
		||||
# from pseudo terminals at the weekend and on mondays.
 | 
			
		||||
 | 
			
		||||
#xsh;ttyp*;root;!WdMo0000-2400
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# End of example file.
 | 
			
		||||
#
 | 
			
		||||
		Reference in New Issue
	
	Block a user