|
Server : Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 DAV/2 PHP/5.2.17 System : Linux localhost 2.6.18-419.el5 #1 SMP Fri Feb 24 22:47:42 UTC 2017 x86_64 User : nobody ( 99) PHP Version : 5.2.17 Disable Function : NONE Directory : /proc/21585/root/usr/share/doc/pam-0.99.6.2/html/ |
Upload File : |
<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>6.25. pam_securetty - limit root login to special devices</title><meta name="generator" content="DocBook XSL Stylesheets V1.69.1"><link rel="start" href="Linux-PAM_SAG.html" title="The Linux-PAM System Administrators' Guide"><link rel="up" href="sag-module-reference.html" title="Chapter 6. A reference guide for available modules"><link rel="prev" href="sag-pam_rootok.html" title="6.24. pam_rootok - gain only root access"><link rel="next" href="sag-pam_selinux.html" title="6.26. pam_selinux - set the default security context"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">6.25. pam_securetty - limit root login to special devices</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="sag-pam_rootok.html">Prev</a> </td><th width="60%" align="center">Chapter 6. A reference guide for available modules</th><td width="20%" align="right"> <a accesskey="n" href="sag-pam_selinux.html">Next</a></td></tr></table><hr></div><div class="section" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sag-pam_securetty"></a>6.25. pam_securetty - limit root login to special devices</h2></div></div></div><div class="cmdsynopsis"><p><code class="command">pam_securetty.so</code> [
debug
]</p></div><div class="section" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_securetty-description"></a>6.25.1. DESCRIPTION</h3></div></div></div><p>
pam_securetty is a PAM module that allows root logins only if the
user is logging in on a "secure" tty, as defined by the listing
in <code class="filename">/etc/securetty</code>. pam_securetty also checks
to make sure that <code class="filename">/etc/securetty</code> is a plain
file and not world writable.
</p><p>
This module has no effect on non-root users and requires that the
application fills in the <span class="emphasis"><em>PAM_TTY</em></span>
item correctly.
</p><p>
For canonical usage, should be listed as a
<span class="emphasis"><em>required</em></span> authentication method
before any <span class="emphasis"><em>sufficient</em></span>
authentication methods.
</p></div><div class="section" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_securetty-options"></a>6.25.2. OPTIONS</h3></div></div></div><div class="variablelist"><dl><dt><span class="term">
<code class="option">debug</code>
</span></dt><dd><p>
Print debug information.
</p></dd></dl></div></div><div class="section" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_securetty-services"></a>6.25.3. MODULE SERVICES PROVIDED</h3></div></div></div><p>
Only the <code class="option">auth</code> service is supported.
</p></div><div class="section" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_securetty-return_values"></a>6.25.4. RETURN VALUES</h3></div></div></div><div class="variablelist"><dl><dt><span class="term">PAM_SUCCESS</span></dt><dd><p>
The user is allowed to continue authentication.
Either the user is not root, or the root user is
trying to log in on an acceptable device.
</p></dd><dt><span class="term">PAM_AUTH_ERR</span></dt><dd><p>
Authentication is rejected. Either root is attempting to
log in via an unacceptable device, or the
<code class="filename">/etc/securetty</code> file is world writable or
not a normal file.
</p></dd><dt><span class="term">PAM_INCOMPLETE</span></dt><dd><p>
An application error occurred. pam_securetty was not able
to get information it required from the application that
called it.
</p></dd><dt><span class="term">PAM_SERVICE_ERR</span></dt><dd><p>
An error occurred while the module was determining the
user's name or tty, or the module could not open
<code class="filename">/etc/securetty</code>.
</p></dd><dt><span class="term">PAM_IGNORE</span></dt><dd><p>
The module could not find the user name in the
<code class="filename">/etc/passwd</code> file to verify whether
the user had a UID of 0. Therefore, the results of running
this module are ignored.
</p></dd></dl></div></div><div class="section" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_securetty-examples"></a>6.25.5. EXAMPLES</h3></div></div></div><p>
</p><pre class="programlisting">
auth required pam_securetty.so
auth required pam_unix.so
</pre></div><div class="section" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_securetty-author"></a>6.25.6. AUTHOR</h3></div></div></div><p>
pam_securetty was written by Elliot Lee <sopwith@cuc.edu>.
</p></div></div><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="sag-pam_rootok.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="sag-module-reference.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="sag-pam_selinux.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">6.24. pam_rootok - gain only root access </td><td width="20%" align="center"><a accesskey="h" href="Linux-PAM_SAG.html">Home</a></td><td width="40%" align="right" valign="top"> 6.26. pam_selinux - set the default security context</td></tr></table></div></body></html>