|____/ \__,_|_| \__,_|_| |_|
-Freude läßt sich nur ganz auskosten, wenn sich ein anderer mitfreut.
- -- Mark Twain (eigl. Samuel Langhorne Clemens)
+Hallo Titanic-Gucker!
-Today is Boomtime, the 2nd day of Chaos in the YOLD 3184
+Today is Pungenday, the 3rd day of Chaos in the YOLD 3184
# pam-auth-update(8) for details.
# here are the per-package modules (the "Primary" block)
-session [default=1] pam_permit.so
+session [default=1] pam_permit.so debug
# here's the fallback if no module succeeds
-session requisite pam_deny.so
+session requisite pam_deny.so debug
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump around
-session required pam_permit.so
+session required pam_permit.so debug
# and here are more per-package modules (the "Additional" block)
-session required pam_unix.so
-session optional pam_systemd.so
+session required pam_unix.so debug
+session optional pam_systemd.so debug
# end of pam-auth-update config
# SELinux needs to be the first session rule. This ensures that any
# lingering context has been cleared. Without this it is possible that a
# module could execute code in the wrong domain.
-session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close
+session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close debug
# Set the loginuid process attribute.
-session required pam_loginuid.so
+session required pam_loginuid.so debug
# Create a new session keyring.
-session optional pam_keyinit.so force revoke
+session optional pam_keyinit.so force revoke debug
# Standard Un*x session setup and teardown.
@include common-session
session optional pam_motd.so noupdate
# Print the status of the user's mailbox upon successful login.
-session optional pam_mail.so standard noenv # [1]
+#session optional pam_mail.so standard noenv # [1]
# Set up user limits from /etc/security/limits.conf.
-session required pam_limits.so
+session required pam_limits.so debug
# Read environment variables from /etc/environment and
# /etc/security/pam_env.conf.
-session required pam_env.so # [1]
+#session required pam_env.so # [1] debug
+session required pam_env.so debug
# In Debian 4.0 (etch), locale-related environment variables were moved to
# /etc/default/locale, so read that as well.
-session required pam_env.so user_readenv=1 envfile=/etc/default/locale
+session required pam_env.so user_readenv=1 envfile=/etc/default/locale debug
# SELinux needs to intervene at login time to ensure that the process starts
# in the proper default security context. Only sessions which are intended
# to run in the user's context should be run after this.
-session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open
+session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open debug
# Standard Un*x password updating.
@include common-password