KGRKJGETMRETU895U-589TY5MIGM5JGB5SDFESFREWTGR54TY
Server : Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 DAV/2 PHP/5.2.17
System : Linux localhost 2.6.18-419.el5 #1 SMP Fri Feb 24 22:47:42 UTC 2017 x86_64
User : nobody ( 99)
PHP Version : 5.2.17
Disable Function : NONE
Directory :  /proc/21573/root/usr/share/doc/pam-0.99.6.2/txts/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //proc/21573/root/usr/share/doc/pam-0.99.6.2/txts/README.pam_unix
pam_unix comes as one module pam_unix.so.

The following links are left for compatibility with old versions:
pam_unix_auth:		authentication module providing
			pam_authenticate() and pam_setcred() hooks
pam_unix_sess:		session module, providing session logging
pam_unix_acct:		account management, providing shadow account
			managment features, password aging etc..
pam_unix_passwd:	password updating facilities providing
			cracklib password strength checking facilities.

The following options are recognized:
	debug		-	log more debugging info
	audit		-	a little more extreme than debug
	use_first_pass	-	don't prompt the user for passwords
				take them from PAM_ items instead
	try_first_pass	-	don't prompt the user for the passwords
				unless PAM_(OLD)AUTHTOK is unset
	use_authtok	-	like try_first_pass, but * fail * if the new
				PAM_AUTHTOK has not been previously set.
				(intended for stacking password modules only)
	not_set_pass	-	don't set the PAM_ items with the passwords
				used by this module.
	shadow		-	try to maintian a shadow based system.
	md5		-	when a user changes their password next,
				encrypt it with the md5 algorithm.
	sha256		-	when a user changes their password next,
				encrypt it with the sha256 algorithm.
	sha512		-	when a user changes their password next,
				encrypt it with the sha512 algorithm.
	bigcrypt	-	when a user changes their password next,
				excrypt it with the DEC C2 - algorithm(0).
	nodelay		-	used to prevent failed authentication
				resulting in a delay of about 1 second.
	nis		-	use NIS RPC for setting new password
	remember=X	-	remember X old passwords, they are kept in
				/etc/security/opasswd in MD5 crypted form
	rounds=X	-	number of rounds for the sha256 and sha512
				password hashes
	broken_shadow	-	ignore errors reading shadow information for
				users in the account management module

	invalid arguments are logged to syslog.

Anon7 - 2021