diff --git a/Bundler/pam.xml b/Bundler/pam.xml index 7cc5927..975a46a 100644 --- a/Bundler/pam.xml +++ b/Bundler/pam.xml @@ -6,7 +6,7 @@ - + diff --git a/Python/etc/pam.d/common-password b/Python/etc/pam.d/common-password index ce0c232..c333fea 100644 --- a/Python/etc/pam.d/common-password +++ b/Python/etc/pam.d/common-password @@ -41,23 +41,18 @@ pam-auth-update(8) for details. @# uncomment the next two in order to use this. @# (Replaces the `OBSCURE_CHECKS_ENAB', `CRACKLIB_DICTPATH') -if not has('wheezy'): - if has('ldap'): - print "password sufficient %s ignore_unknown_user md5 try_first_pass" % pam_module - print "password required pam_unix.so nullok obscure min=4 max=8 md5 try_first_pass" - +@# here are the per-package modules (the "Primary" block) +if has('ldap'): + @password requisite pam_cracklib.so retry=3 minlen=9 dcredit=-1 ucredit=-1 lcredit=-1 ocredit=1 reject_username gecoscheck enforce_for_root difok=0 + @password [success=2 default=ignore] pam_unix.so nullok obscure sha512 min=4 max=8 md5 try_first_pass + print "password [success=1 default=ignore] %s minimum_uid=1000 ignore_unkown_user md5 try_first_pass" % pam_module else: - @# here are the per-package modules (the "Primary" block) - if has('ldap'): - @password [success=2 default=ignore] pam_unix.so nullok obscure sha512 min=4 max=8 md5 try_first_pass - print "password [success=1 default=ignore] %s minimum_uid=1000 ignore_unkown_user md5 try_first_pass" % pam_module - else: - @password [success=1 default=ignore] pam_unix.so nullok obscure sha512 min=4 max=8 md5 try_first_pass - @# here's the fallback if no module succeeds - @password requisite pam_deny.so - @# prime the stack with a positive return value if there isn't one already; - @# this avoids us returning an error just because nothing sets a success code - @# since the modules above will each just jump around - @password required pam_permit.so - @# and here are more per-package modules (the "Additional" block) - @# end of pam-auth-update config + @password [success=1 default=ignore] pam_unix.so nullok obscure sha512 min=4 max=8 md5 try_first_pass +@# here's the fallback if no module succeeds +@password requisite pam_deny.so +@# prime the stack with a positive return value if there isn't one already; +@# this avoids us returning an error just because nothing sets a success code +@# since the modules above will each just jump around +@password required pam_permit.so +@# and here are more per-package modules (the "Additional" block) +@# end of pam-auth-update config