summaryrefslogtreecommitdiff
path: root/debian/openssh-server.ssh.pam
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2005-06-17 12:44:30 +0000
committerColin Watson <cjwatson@debian.org>2005-06-17 12:44:30 +0000
commit4c2d1c67cea075107aadaa6d81fe456687c69e67 (patch)
tree4f31813c8306491c908948bd75254912385ed651 /debian/openssh-server.ssh.pam
parentbed4bb0fe9380912ecb90e5f918bce8825ec0a38 (diff)
Manoj Srivastava:
- Added SELinux capability, and turned it on be default. Added restorecon calls in preinst and postinst (should not matter if the machine is not SELinux aware). By and large, the changes made should have no effect unless the rules file calls --with-selinux; and even then there should be no performance hit for machines not actively running SELinux. - Modified the preinst and postinst to call restorecon to set the security context for the generated public key files. - Added a comment to /etc/pam.d/ssh to indicate that an SELinux system may want to also include pam_selinux.so.
Diffstat (limited to 'debian/openssh-server.ssh.pam')
-rw-r--r--debian/openssh-server.ssh.pam3
1 files changed, 3 insertions, 0 deletions
diff --git a/debian/openssh-server.ssh.pam b/debian/openssh-server.ssh.pam
index 1332a267e..ce33b9347 100644
--- a/debian/openssh-server.ssh.pam
+++ b/debian/openssh-server.ssh.pam
@@ -22,5 +22,8 @@ session optional pam_mail.so standard noenv # [1]
22# Set up user limits from /etc/security/limits.conf. 22# Set up user limits from /etc/security/limits.conf.
23session required pam_limits.so 23session required pam_limits.so
24 24
25# Set up SELinux capabilities (need modified pam)
26# session required pam_selinux.so multiple
27
25# Standard Un*x password updating. 28# Standard Un*x password updating.
26@include common-password 29@include common-password