c0f8840425
Change the default implementation of pam_setcred() again, previously customized to run the full "auth" PAM stack and only call pam_deny.so which is basically the SUSE default behavior without pam_warn.so. This is considered safer, especially on SLE where a regression was spotted by QA. OBS-URL: https://build.opensuse.org/package/show/Base:System/systemd?expand=0&rev=1217
24 lines
899 B
Plaintext
24 lines
899 B
Plaintext
# This file is part of systemd.
|
|
#
|
|
# Used by systemd --user instances.
|
|
|
|
# Override the default behavior of the "auth" PAM stack and don't throw a
|
|
# warning each time a user instance is started, which is the default behavior of
|
|
# the PAM stack when no auth is defined. Indeed PID1 calls pam_setcred() when
|
|
# the user instance is about to be started to allow some user services, such as
|
|
# gnome-terminal, to extend theirs credentials similar to the ones received by a
|
|
# user when he logs in (and the full PAM authentication stack is run). For some
|
|
# details, see:
|
|
#
|
|
# https://gitlab.gnome.org/GNOME/gdm/-/issues/393
|
|
# https://github.com/systemd/systemd/issues/11198
|
|
# https://bugzilla.suse.com/show_bug.cgi?id=1190515
|
|
#
|
|
auth required pam_deny.so
|
|
|
|
account include common-account
|
|
|
|
session required pam_selinux.so close
|
|
session required pam_selinux.so nottys open
|
|
session include common-session
|