Merge pull request #52488 from flokli/pam_account_unix_required
security.pam: make pam_unix.so required, not sufficient
This commit is contained in:
commit
9c86e8faf5
@ -318,6 +318,22 @@
|
|||||||
case.
|
case.
|
||||||
</para>
|
</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
<listitem>
|
||||||
|
<para>
|
||||||
|
The <literal>pam_unix</literal> account module is now loaded with its
|
||||||
|
control field set to <literal>required</literal> instead of
|
||||||
|
<literal>sufficient</literal>, so that later pam account modules that
|
||||||
|
might do more extensive checks are being executed.
|
||||||
|
Previously, the whole account module verification was exited prematurely
|
||||||
|
in case a nss module provided the account name to
|
||||||
|
<literal>pam_unix</literal>.
|
||||||
|
The LDAP and SSSD NixOS modules already add their NSS modules when
|
||||||
|
enabled. In case your setup breaks due to some later pam account module
|
||||||
|
previosuly shadowed, or failing NSS lookups, please file a bug. You can
|
||||||
|
get back the old behaviour by manually setting
|
||||||
|
<literal><![CDATA[security.pam.services.<name?>.text]]></literal>.
|
||||||
|
</para>
|
||||||
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
|
@ -269,7 +269,7 @@ let
|
|||||||
text = mkDefault
|
text = mkDefault
|
||||||
(''
|
(''
|
||||||
# Account management.
|
# Account management.
|
||||||
account ${if cfg.sssdStrictAccess then "required" else "sufficient"} pam_unix.so
|
account required pam_unix.so
|
||||||
${optionalString use_ldap
|
${optionalString use_ldap
|
||||||
"account sufficient ${pam_ldap}/lib/security/pam_ldap.so"}
|
"account sufficient ${pam_ldap}/lib/security/pam_ldap.so"}
|
||||||
${optionalString (config.services.sssd.enable && cfg.sssdStrictAccess==false)
|
${optionalString (config.services.sssd.enable && cfg.sssdStrictAccess==false)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user