1
0
forked from pool/util-linux

Accepting request 281410 from Base:System

1

OBS-URL: https://build.opensuse.org/request/show/281410
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/util-linux?expand=0&rev=196
This commit is contained in:
Dominique Leuenberger 2015-01-30 05:00:58 +00:00 committed by Git OBS Bridge
parent 3da04ee48a
commit 5a74f9155b
7 changed files with 33 additions and 4 deletions

View File

@ -1,6 +1,5 @@
#%PAM-1.0
auth requisite pam_nologin.so
auth [user_unknown=ignore success=ok ignore=ignore auth_err=die default=bad] pam_securetty.so
auth include common-auth
account include common-account
password include common-password

View File

@ -1,3 +1,13 @@
-------------------------------------------------------------------
Sat Jan 10 02:24:25 UTC 2015 - jengelh@inai.de
- Remove pam_securetty.so from /etc/pam.d/login. By definition,
local logins are always secure. Remote logins actually use
/etc/pam.d/remote by way of `/bin/login -h` (such as rlogind).
This solves the problem that root logins are erroneously rejected
when using kmscon(8) or `machinectl login`, because they use
ptys.
-------------------------------------------------------------------
Tue Nov 11 10:57:12 UTC 2014 - schwab@suse.de

View File

@ -1,7 +1,7 @@
#
# spec file for package python-libmount
#
# Copyright (c) 2014 SUSE LINUX Products GmbH, Nuernberg, Germany.
# Copyright (c) 2015 SUSE LINUX Products GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed

View File

@ -1,3 +1,13 @@
-------------------------------------------------------------------
Sat Jan 10 02:24:25 UTC 2015 - jengelh@inai.de
- Remove pam_securetty.so from /etc/pam.d/login. By definition,
local logins are always secure. Remote logins actually use
/etc/pam.d/remote by way of `/bin/login -h` (such as rlogind).
This solves the problem that root logins are erroneously rejected
when using kmscon(8) or `machinectl login`, because they use
ptys.
-------------------------------------------------------------------
Tue Nov 11 10:57:12 UTC 2014 - schwab@suse.de

View File

@ -1,7 +1,7 @@
#
# spec file for package util-linux-systemd
#
# Copyright (c) 2014 SUSE LINUX Products GmbH, Nuernberg, Germany.
# Copyright (c) 2015 SUSE LINUX Products GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed

View File

@ -1,3 +1,13 @@
-------------------------------------------------------------------
Sat Jan 10 02:24:25 UTC 2015 - jengelh@inai.de
- Remove pam_securetty.so from /etc/pam.d/login. By definition,
local logins are always secure. Remote logins actually use
/etc/pam.d/remote by way of `/bin/login -h` (such as rlogind).
This solves the problem that root logins are erroneously rejected
when using kmscon(8) or `machinectl login`, because they use
ptys.
-------------------------------------------------------------------
Tue Nov 11 10:57:12 UTC 2014 - schwab@suse.de

View File

@ -1,7 +1,7 @@
#
# spec file for package util-linux
#
# Copyright (c) 2014 SUSE LINUX Products GmbH, Nuernberg, Germany.
# Copyright (c) 2015 SUSE LINUX Products GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed