From 216429de6e9b75e09e6e927bcbcef293137ee8a9 Mon Sep 17 00:00:00 2001 From: iquzart Date: Tue, 17 Nov 2020 16:08:32 +0400 Subject: [PATCH] clean up --- files/etc/pam.d/password-auth | 26 -------------------------- files/etc/pam.d/system-auth | 26 -------------------------- 2 files changed, 52 deletions(-) delete mode 100644 files/etc/pam.d/password-auth delete mode 100644 files/etc/pam.d/system-auth diff --git a/files/etc/pam.d/password-auth b/files/etc/pam.d/password-auth deleted file mode 100644 index a3bf1a6..0000000 --- a/files/etc/pam.d/password-auth +++ /dev/null @@ -1,26 +0,0 @@ -#%PAM-1.0 -# This file is auto-generated. -# User changes will be destroyed the next time authconfig is run. -auth required pam_env.so -auth required pam_faillock.so preauth audit deny=5 unlock_time=900 -auth sufficient pam_unix.so nullok try_first_pass -auth [default=die] pam_faillock.so authfail audit deny=5 unlock_time=900 -auth sufficient pam_faillock.so authsucc audit deny=5 unlock_time=900 -auth requisite pam_succeed_if.so uid >= 1000 quiet -auth required pam_deny.so - -account required pam_faillock.so -account required pam_unix.so -account sufficient pam_localuser.so -account sufficient pam_succeed_if.so uid < 1000 quiet -account required pam_permit.so - -password requisite pam_pwquality.so try_first_pass local_users_only retry=5 authtok_type= -password sufficient pam_unix.so sha512 shadow nullok try_first_pass use_authtok remember=6 -password required pam_deny.so - -session optional pam_keyinit.so revoke -session required pam_limits.so --session optional pam_systemd.so -session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid -session required pam_unix.so diff --git a/files/etc/pam.d/system-auth b/files/etc/pam.d/system-auth deleted file mode 100644 index a3bf1a6..0000000 --- a/files/etc/pam.d/system-auth +++ /dev/null @@ -1,26 +0,0 @@ -#%PAM-1.0 -# This file is auto-generated. -# User changes will be destroyed the next time authconfig is run. -auth required pam_env.so -auth required pam_faillock.so preauth audit deny=5 unlock_time=900 -auth sufficient pam_unix.so nullok try_first_pass -auth [default=die] pam_faillock.so authfail audit deny=5 unlock_time=900 -auth sufficient pam_faillock.so authsucc audit deny=5 unlock_time=900 -auth requisite pam_succeed_if.so uid >= 1000 quiet -auth required pam_deny.so - -account required pam_faillock.so -account required pam_unix.so -account sufficient pam_localuser.so -account sufficient pam_succeed_if.so uid < 1000 quiet -account required pam_permit.so - -password requisite pam_pwquality.so try_first_pass local_users_only retry=5 authtok_type= -password sufficient pam_unix.so sha512 shadow nullok try_first_pass use_authtok remember=6 -password required pam_deny.so - -session optional pam_keyinit.so revoke -session required pam_limits.so --session optional pam_systemd.so -session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid -session required pam_unix.so