> That's the short version of the question. The long version is...
to get a pointer to it. Wish I'd thought of that earlier.
In any case, thanks for reading all of this
In any case, thanks for reading all of this
That's the short version of the question. The long version is...
I'm brand new (2 weeks and still going) Linux user. My
educational project of the week is to try to construct a boot
disk recovery disk so if I*up next weeks project (compiling
tape support into the kernel) I might be able to recover.
I have installed Redhat 1.2, and am trying to use Yard (which is neat
utility by the way) to construct my first boot recovery disk.
I've gotten to the point where I can build and boot from a two
disk recovery set. But I can't logon to the resulting system. Any
attempt to do so starts complaining that /etc/pam.conf does not exist.
Including that file on the recover disk starts complaining about files
in /lib/security. Now I've looked at all of these files, and tried
experimenting with seeing if I can logon to my main system when certain
files do or do not exist. It is obvious that this is some kind of
security system with encrypted databases stored on /lib/security.
The security of this system is substantially enhanced by virtue of
there not appearing to be any man pages it. But I'm the sysadmin on
this system and I need to know what it is doing and how to use it.
For now I'll try putting the who set of files on my recovery disk. But
would be really nice to find some documentation on just how I can use
(or not use) this particular feature.
Thanx for any help
-Ken Corbin
> Uhmmmm. Never mind, I found it. Had to pull up RedHat's support page
> to get a pointer to it. Wish I'd thought of that earlier.
> In any case, thanks for reading all of this
Dan Morrison ran into some problems using Yard with Redhat's pam and
security. I put together a web page from his message. It might save you
some time.
Good luck,
-Tom
1. PAM (/etc/pam.conf).....Is It Needed?
I do not have much experience with PAM, but in conversations with
others relating to our Solaris servers (versions 2.6 thru 9), I'm under
the impression that we are not using it.
In a recent audit of some of our files, we were cited with having some
servers "less secure" than others simply by virtue of the entries
within /etc/pam.conf. They do seem to differ, especially when
comparing the 2.6 servers with more current versions (7 thru 9).
My questions become: "IF we are not using PAM, I would presume that we
do not have a need to access the /etc/pam.conf file. That being said,
do we even need it (i.e. can it be removed without serious
ramifications)? How would one go about determining IF it is "actually"
being used?
Thanks.
2. Sound Card Set-up --- Sound Blaster AWE32, under RedHat 4.1
4. How to setup the linux to obtain its ip at startup from bootp/DHCP
5. in.ftpd: open_pam_conf: stat(/etc/pam.conf) failed
8. : linux-2.5.33uc0 (MMU-less support)
9. Looking for sample /etc/named.conf and etc/resolv.conf and /etc/hosts
10. /etc/inetd.conf, /etc/xinetd.conf
11. /etc/inetd.conf and /etc/xinetd.conf
12. /etc/host.conf and /etc/nsswitch.conf
13. PAM/RedHat: pop3 /etc/pam.d config