From: Frank Brehm Date: Wed, 3 Jan 2018 05:28:51 +0000 (+0100) Subject: daily autocommit X-Git-Url: https://git.uhu-banane.de/?a=commitdiff_plain;h=b9829094549a2db9b63f004296dbb4f96a37da77;p=config%2Fsarah%2Fetc.git daily autocommit --- diff --git a/motd b/motd index 08e1577..395d7dc 100644 --- a/motd +++ b/motd @@ -6,8 +6,7 @@ Debian GNU/Linux 9.3 (stretch) |____/ \__,_|_| \__,_|_| |_| -Freude läßt sich nur ganz auskosten, wenn sich ein anderer mitfreut. - -- Mark Twain (eigl. Samuel Langhorne Clemens) +Hallo Titanic-Gucker! -Today is Boomtime, the 2nd day of Chaos in the YOLD 3184 +Today is Pungenday, the 3rd day of Chaos in the YOLD 3184 diff --git a/pam.d/common-session b/pam.d/common-session index 9d7324c..f47451a 100644 --- a/pam.d/common-session +++ b/pam.d/common-session @@ -13,14 +13,14 @@ # pam-auth-update(8) for details. # here are the per-package modules (the "Primary" block) -session [default=1] pam_permit.so +session [default=1] pam_permit.so debug # here's the fallback if no module succeeds -session requisite pam_deny.so +session requisite pam_deny.so debug # prime the stack with a positive return value if there isn't one already; # this avoids us returning an error just because nothing sets a success code # since the modules above will each just jump around -session required pam_permit.so +session required pam_permit.so debug # and here are more per-package modules (the "Additional" block) -session required pam_unix.so -session optional pam_systemd.so +session required pam_unix.so debug +session optional pam_systemd.so debug # end of pam-auth-update config diff --git a/pam.d/sshd b/pam.d/sshd index d70b384..9f53443 100644 --- a/pam.d/sshd +++ b/pam.d/sshd @@ -16,13 +16,13 @@ account required pam_nologin.so # SELinux needs to be the first session rule. This ensures that any # lingering context has been cleared. Without this it is possible that a # module could execute code in the wrong domain. -session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close +session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close debug # Set the loginuid process attribute. -session required pam_loginuid.so +session required pam_loginuid.so debug # Create a new session keyring. -session optional pam_keyinit.so force revoke +session optional pam_keyinit.so force revoke debug # Standard Un*x session setup and teardown. @include common-session @@ -34,22 +34,23 @@ session optional pam_motd.so motd=/run/motd.dynamic session optional pam_motd.so noupdate # Print the status of the user's mailbox upon successful login. -session optional pam_mail.so standard noenv # [1] +#session optional pam_mail.so standard noenv # [1] # Set up user limits from /etc/security/limits.conf. -session required pam_limits.so +session required pam_limits.so debug # Read environment variables from /etc/environment and # /etc/security/pam_env.conf. -session required pam_env.so # [1] +#session required pam_env.so # [1] debug +session required pam_env.so debug # In Debian 4.0 (etch), locale-related environment variables were moved to # /etc/default/locale, so read that as well. -session required pam_env.so user_readenv=1 envfile=/etc/default/locale +session required pam_env.so user_readenv=1 envfile=/etc/default/locale debug # SELinux needs to intervene at login time to ensure that the process starts # in the proper default security context. Only sessions which are intended # to run in the user's context should be run after this. -session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open +session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open debug # Standard Un*x password updating. @include common-password