93639b1c76
* Initial optional bcrypt support. * Make build/install of 'su' optional. * Fix for vipw not resuming correctly when suspended * Sync password field descriptions in manpages * Check for valid shell argument in useradd * Allow translation of new strings through POTFILES.in * Migrate to itstool for translations * Migrate to new SELinux api * Support --enable-vendordir * pwck: Only check homedir if set and not a system user * Support nonstandard usernames * sget{pw,gr}ent: check for data at EOL * Add YYY-MM-DD support in chage * Fix failing chmod calls for suidubins * Fix --sbindir and --bindir for binary installations * Fix LASTLOG_UID_MAX in login.defs * Fix configure error with dash - Remove because upstreamed: * libeconf.patch * shadow-usermod-variable.patch - Rebase: * shadow-login_defs-unused-by-pam.patch * chkname-regex.patch * shadow-util-linux.patch * shadow-login_defs-comments.patch - Add shadow-4.8-selinux-include.patch See https://github.com/shadow-maint/shadow/pull/200 OBS-URL: https://build.opensuse.org/package/show/Base:System/shadow?expand=0&rev=81
89 lines
2.8 KiB
Diff
89 lines
2.8 KiB
Diff
Improve comments in login.defs.
|
|
|
|
Index: etc/login.defs
|
|
===================================================================
|
|
--- etc/login.defs.orig
|
|
+++ etc/login.defs
|
|
@@ -3,8 +3,6 @@
|
|
# Some variables are used by login(1), su(1) and runuser(1) from util-linux
|
|
# package as well pam pam_unix(8) from pam package.
|
|
#
|
|
-# $Id$
|
|
-#
|
|
|
|
#
|
|
# Delay in seconds before being allowed another attempt after a login failure
|
|
@@ -47,6 +45,15 @@ CONSOLE /etc/securetty
|
|
#CONSOLE console:tty01:tty02:tty03:tty04
|
|
|
|
#
|
|
+# Limit the highest user ID number for which the lastlog entries should
|
|
+# be updated.
|
|
+#
|
|
+# No LASTLOG_UID_MAX means that there is no user ID limit for writing
|
|
+# lastlog entries.
|
|
+#
|
|
+#LASTLOG_UID_MAX
|
|
+
|
|
+#
|
|
# If defined, all su(1) activity is logged to this file.
|
|
#
|
|
#SULOG_FILE /var/log/sulog
|
|
@@ -94,11 +101,14 @@ ENV_PATH /bin:/usr/bin
|
|
ENV_ROOTPATH /sbin:/bin:/usr/sbin:/usr/bin
|
|
#ENV_SUPATH /sbin:/bin:/usr/sbin:/usr/bin
|
|
|
|
-# If this variable is set to "yes", su will always set path. every su
|
|
-# call will overwrite the PATH variable.
|
|
+# If this variable is set to "yes" (default is "no"), su will always set
|
|
+# path. every su call will overwrite the PATH variable.
|
|
#
|
|
# Per default, only "su -" will set a new PATH.
|
|
#
|
|
+# The recommended value is "yes". The default "no" behavior could have
|
|
+# a security implication in applications that use commands without path.
|
|
+#
|
|
ALWAYS_SET_PATH no
|
|
|
|
#
|
|
@@ -138,6 +148,11 @@ PASS_WARN_AGE 7
|
|
#
|
|
# Min/max values for automatic uid selection in useradd(8)
|
|
#
|
|
+# SYS_UID_MIN to SYS_UID_MAX inclusive is the range for
|
|
+# UIDs for dynamically allocated administrative and system accounts.
|
|
+# UID_MIN to UID_MAX inclusive is the range of UIDs of dynamically
|
|
+# allocated user accounts.
|
|
+#
|
|
UID_MIN 1000
|
|
UID_MAX 60000
|
|
# System accounts
|
|
@@ -151,6 +166,11 @@ SUB_UID_COUNT 65536
|
|
#
|
|
# Min/max values for automatic gid selection in groupadd(8)
|
|
#
|
|
+# SYS_GID_MIN to SYS_GID_MAX inclusive is the range for
|
|
+# GIDs for dynamically allocated administrative and system groups.
|
|
+# GID_MIN to GID_MAX inclusive is the range of GIDs of dynamically
|
|
+# allocated groups.
|
|
+#
|
|
GID_MIN 1000
|
|
GID_MAX 60000
|
|
# System accounts
|
|
@@ -180,7 +200,6 @@ LOGIN_TIMEOUT 60
|
|
CHFN_RESTRICT rwh
|
|
|
|
#
|
|
-# Only works if compiled with MD5_CRYPT defined:
|
|
# If set to "yes", new passwords will be encrypted using the MD5-based
|
|
# algorithm compatible with the one used by recent releases of FreeBSD.
|
|
# It supports passwords of unlimited length and longer salt strings.
|
|
@@ -195,7 +214,6 @@ CHFN_RESTRICT rwh
|
|
#MD5_CRYPT_ENAB no
|
|
|
|
#
|
|
-# Only works if compiled with ENCRYPTMETHOD_SELECT defined:
|
|
# If set to MD5, MD5-based algorithm will be used for encrypting password
|
|
# If set to SHA256, SHA256-based algorithm will be used for encrypting password
|
|
# If set to SHA512, SHA512-based algorithm will be used for encrypting password
|