[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.20
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
share
/
doc
/
pam
/
txts
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📄 README.pam_access
5,253 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_chroot
1,510 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_console
1,925 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_cracklib
9,757 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_debug
1,995 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_deny
1,035 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_echo
1,100 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_env
3,627 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_exec
2,230 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_faildelay
827 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_faillock
6,062 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_filter
3,102 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_ftp
1,699 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_group
2,175 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_issue
1,356 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_keyinit
2,245 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_lastlog
2,597 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_limits
2,421 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_listfile
3,626 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_localuser
1,167 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_loginuid
1,117 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_mail
2,009 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_mkhomedir
1,361 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_motd
2,588 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_namespace
11,543 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_nologin
1,348 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_permit
907 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_postgresok
346 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_pwhistory
2,243 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_rhosts
1,882 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_rootok
1,086 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_securetty
1,342 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_selinux
2,909 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_sepermit
1,648 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_shells
653 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_stress
2,060 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_succeed_if
2,864 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_time
1,301 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_timestamp
1,616 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_tty_audit
2,779 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_umask
1,631 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_unix
7,265 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_userdb
2,973 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_usertype
1,200 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_warn
1,224 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_wheel
1,968 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_xauth
3,695 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: README.pam_listfile
pam_listfile — deny or allow services based on an arbitrary file ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ DESCRIPTION pam_listfile is a PAM module which provides a way to deny or allow services based on an arbitrary file. The module gets the item of the type specified -- user specifies the username, PAM_USER; tty specifies the name of the terminal over which the request has been made, PAM_TTY; rhost specifies the name of the remote host (if any) from which the request was made, PAM_RHOST; and ruser specifies the name of the remote user (if available) who made the request, PAM_RUSER -- and looks for an instance of that item in the file=filename. filename contains one line per item listed. If the item is found, then if sense=allow, PAM_SUCCESS is returned, causing the authorization request to succeed; else if sense=deny, PAM_AUTH_ERR is returned, causing the authorization request to fail. If an error is encountered (for instance, if filename does not exist, or a poorly-constructed argument is encountered), then if onerr=succeed, PAM_SUCCESS is returned, otherwise if onerr=fail, PAM_AUTH_ERR or PAM_SERVICE_ERR (as appropriate) will be returned. An additional argument, apply=, can be used to restrict the application of the above to a specific user (apply=username) or a given group (apply=@groupname). This added restriction is only meaningful when used with the tty, rhost and shell items. Besides this last one, all arguments should be specified; do not count on any default behavior. No credentials are awarded by this module. OPTIONS item=[tty|user|rhost|ruser|group|shell] What is listed in the file and should be checked for. sense=[allow|deny] Action to take if found in file, if the item is NOT found in the file, then the opposite action is requested. file=/path/filename File containing one item per line. The file needs to be a plain file and not world writable. onerr=[succeed|fail] What to do if something weird happens like being unable to open the file. apply=[user|@group] Restrict the user class for which the restriction apply. Note that with item=[user|ruser|group] this does not make sense, but for item=[tty|rhost| shell] it have a meaning. quiet Do not treat service refusals or missing list files as errors that need to be logged. EXAMPLES Classic 'ftpusers' authentication can be implemented with this entry in /etc/ pam.d/ftpd: # # deny ftp-access to users listed in the /etc/ftpusers file # auth required pam_listfile.so \ onerr=succeed item=user sense=deny file=/etc/ftpusers Note, users listed in /etc/ftpusers file are (counterintuitively) not allowed access to the ftp service. To allow login access only for certain users, you can use a /etc/pam.d/login entry like this: # # permit login to users listed in /etc/loginusers # auth required pam_listfile.so \ onerr=fail item=user sense=allow file=/etc/loginusers For this example to work, all users who are allowed to use the login service should be listed in the file /etc/loginusers. Unless you are explicitly trying to lock out root, make sure that when you do this, you leave a way for root to log in, either by listing root in /etc/loginusers, or by listing a user who is able to su to the root account. AUTHOR pam_listfile was written by Michael K. Johnson <johnsonm@redhat.com> and Elliot Lee <sopwith@cuc.edu>.