]> code.ossystems Code Review - openembedded-core.git/commit
libpam: add a new 'nullok_secure' option support to pam_unix
authorMing Liu <ming.liu@windriver.com>
Thu, 18 Jul 2013 02:04:22 +0000 (10:04 +0800)
committerSaul Wold <sgw@linux.intel.com>
Mon, 22 Jul 2013 16:44:10 +0000 (09:44 -0700)
commit10cdd66fe800cffe3f2cbf5c95550b4f7902a311
tree2a035aae2a67b5478e55ea9ccec3913383aaa605
parent1ace2bdd8d6d950038fb6d9b83f6eceba276f588
libpam: add a new 'nullok_secure' option support to pam_unix

Debian patch to add a new 'nullok_secure' option to pam_unix, which
accepts users with null passwords only when the applicant is connected
from a tty listed in /etc/securetty.

The original pam_unix.so was configured with nullok_secure in
meta/recipes-extended/pam/libpam/pam.d/common-auth, but no such code
exists actually.

The patch set comes from:
http://patch-tracker.debian.org/patch/series/view/pam/1.1.3-7.1/054_pam_security_abstract_securetty_handling
http://patch-tracker.debian.org/patch/series/view/pam/1.1.3-7.1/055_pam_unix_nullok_secure

Signed-off-by: Ming Liu <ming.liu@windriver.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
meta/recipes-extended/pam/libpam/pam-security-abstract-securetty-handling.patch [new file with mode: 0644]
meta/recipes-extended/pam/libpam/pam-unix-nullok-secure.patch [new file with mode: 0644]
meta/recipes-extended/pam/libpam_1.1.6.bb