spelling: overridden
This commit is contained in:
tests
chage
15_chage-I_no_shadow_entry
config
etc
16_chage-m_no_shadow_entry
config
etc
17_chage-M_no_shadow_entry
config
etc
18_chage-d_no_shadow_entry
config
etc
19_chage-W_no_shadow_entry
config
etc
20_chage-E_no_shadow_entry
config
etc
25_chage_interactive
config
etc
26_chage_interactive_date_0
config
etc
27_chage_interactive_date_-1
config
etc
28_chage_interactive_date_EPOCH
config
etc
29_chage_interactive_date_pre-EPOCH
config
etc
30_chage_interactive_date_pre-EPOCH2
config
etc
31_chage_interactive_date_invalid
config
etc
32_chage_interactive_date_invalid2
config
etc
33_chage_interactive-W_invalid1
config
etc
34_chage_interactive-W_invalid2
config
etc
35_chage_interactive-W-1
config
etc
36_chage_interactive-I_invalid1
config
etc
37_chage_interactive-I_invalid2
config
etc
38_chage_interactive-I-1
config
etc
39_chage_interactive-d-1
config
etc
chroot
chage
01_chage--root
config_chroot
etc
chgpasswd
01_chgpasswd--root
config_chroot
etc
chpasswd
chsh
01_chsh--root
config_chroot
etc
gpasswd
01_gpasswd--root
config_chroot
etc
groupadd
01_groupadd--root
config_chroot
etc
groupdel
01_groupdel--root
config_chroot
etc
groupmod
01_groupmod--root
config_chroot
etc
grpck
01_grpck--root
config_chroot
etc
grpconv
01_grpconv--root
config_chroot
etc
grpunconv
01_grpunconv--root
config_chroot
etc
lastlog
01_lastlog--root
config_chroot
etc
login
01_login_sublogin
pwck
01_pwck--root
config_chroot
etc
pwconv
01_pwconv--root
config_chroot
etc
pwunconv
01_pwunconv--root
config_chroot
etc
useradd
01_useradd--root
config_chroot
etc
02_useradd--root_login.defs
config_chroot
etc
03_useradd--root_useradd.default
config_chroot
etc
04_useradd--root_useradd-D
config_chroot
etc
05_useradd--root_useradd-D-e-g
config_chroot
etc
userdel
01_userdel--root
config_chroot
etc
usermod
01_usermod--root
config_chroot
etc
crypt
login.defs_DES-MD5_CRYPT_ENAB
config
etc
login.defs_DES
config
etc
login.defs_MD5
config
etc
login.defs_MD5_CRYPT_ENAB
config
etc
login.defs_SHA256-round-max
config
etc
login.defs_SHA256-round-min-max
config
etc
login.defs_SHA256-round-min
config
etc
login.defs_SHA256
config
etc
login.defs_SHA512
config
etc
login.defs_none
config
etc
failures
chage
01_chage_openRW_passwd_failure
config
etc
02_chage_openRO_passwd_failure
config
etc
03_chage_openRW_shadow_failure
config
etc
04_chage_openRO_shadow_failure
config
etc
05_chage_rename_shadow_failure
config
etc
06_chage_rename_passwd_failure
config
etc
chgpasswd
01_chgpasswd-e_open_group_failure
config
etc
02_chgpasswd-e_open_gshadow_failure
config
etc
03_chgpasswd-e_rename_group_failure
config
etc
04_chgpasswd-e_rename_gshadow_failure
config
etc
chpasswd-PAM
01_chpasswd-e_open_passwd_failure
config
etc
02_chpasswd-e_open_shadow_failure
config
etc
03_chpasswd-e_rename_passwd_failure
config
etc
04_chpasswd-e_rename_shadow_failure
config
etc
chsh
cppw
01_cppw_open_passwd_in_failure
config
etc
02_cppw_open_passwd_backup_failure
config
etc
03_cppw_rename_passwd_failure
config
etc
gpasswd
01_gpasswd_group_open_failure
config
etc
02_gpasswd_gshadow_open_failure
config
etc
03_gpasswd-a_group_open_failure
config
etc
04_gpasswd-d_group_open_failure
config
etc
05_gpasswd-r_group_open_failure
config
etc
06_gpasswd-R_gshadow_open_failure
config
etc
07_gpasswd-A_gshadow_open_failure
config
etc
08_gpasswd_group_openRO_failure
config
etc
09_gpasswd_gshadow_openRO_failure
config
etc
10_gpasswd_group_rename_failure
config
etc
11_gpasswd_gshadow_rename_failure
config
etc
groupadd
01_groupadd_gshadow_rename_failure
config
etc
02_groupadd_group_rename_failure
config
etc
03_groupadd_gshadow_open_failure
config
etc
04_groupadd_group_open_failure
config
etc
groupdel
01_groupdel_gshadow_rename_failure
config
etc
02_groupdel_group_rename_failure
config
etc
03_groupdel_gshadow_open_failure
config
etc
04_groupdel_group_open_failure
config
etc
groupmod
01_groupmod_change_group_name_gshadow_rename_failure
config
etc
02_groupmod_change_gid_change_primary_group_passwd_rename_failure
config
etc
03_groupmod_change_group_name_group_rename_failure
config
etc
04_groupmod_group_open_failure
config
etc
05_groupmod_gshadow_open_failure
config
etc
06_groupmod_-g_no_gshadow_open_failure
config
etc
07_groupmod_passwd_open_failure
config
etc
08_groupmod_-g_same_gid_no_passwd_open_failure
config
etc
09_groupmod_-n_no_passwd_open_failure
config
etc
grpck
01_grpck_system_group_open_failure
config
etc
02_grpck_group_open_failure
config
etc
03_grpck_system_gshadow_open_failure
config
etc
04_grpck_gshadow_open_failure
config
etc
05_grpck_sort_group_rename_failure
config
etc
06_grpck_sort_gshadow_rename_failure
config
etc
grpconv
01_grpconv_open_group_failure
config
etc
02_grpconv_open_gshadow_failure
config
etc
03_grpconv_rename_group_failure
config
etc
04_grpconv_rename_gshadow_failure
config
etc
grpunconv
01_grpunconv_group_rename_failure
config
etc
02_grpunconv_open_group_failure
config
etc
03_grpunconv_open_gshadow_failure
config
etc
04_grpunconv_unlink_gshadow_failure
config
etc
newusers
01_newusers_open_passwd_failure
config
etc
02_newusers_open_shadow_failure
config
etc
03_newusers_open_group_failure
config
etc
04_newusers_open_gshadow_failure
config
etc
05_newusers_rename_passwd_failure
config
etc
06_newusers_rename_shadow_failure
config
etc
07_newusers_rename_group_failure
config
etc
08_newusers_rename_gshadow_failure
config
etc
09_newusers_rename_shadow_failure_PAM
config
etc
pwconv
01_pwconv_open_passwd_failure
config
etc
02_pwconv_open_shadow_failure
config
etc
03_pwconv_rename_passwd_failure
config
etc
04_pwconv_rename_shadow_failure
config
etc
pwunconv
01_pwunconv_passwd_rename_failure
config
etc
02_pwunconv_open_passwd_failure
config
etc
03_pwunconv_open_shadow_failure
config
etc
04_pwunconv_unlink_shadow_failure
config
etc
useradd
01_useradd_open_passwd_failure
config
etc
02_useradd_open_shadow_failure
config
etc
03_useradd_open_group_failure
config
etc
04_useradd_open_gshadow_failure
config
etc
05_useradd_rename_passwd_failure
config
etc
06_useradd_rename_shadow_failure
config
etc
07_useradd_rename_group_failure
config
etc
08_useradd_rename_gshadow_failure
config
etc
09_useradd_rename_defaults_failure
config
etc
10_useradd_rename_defaults_backup_failure
config
etc
12_useradd_open_subuid_failure
config
etc
13_useradd_open_subgid_failure
config
etc
14_username_rename_subuid_failure
config
etc
15_username_rename_subgid_failure
config
etc
userdel
01_userdel_gshadow_rename_failure
config
etc
02_userdel_group_rename_failure
config
etc
03_userdel_shadow_rename_failure
config
etc
04_userdel_passwd_rename_failure
config
etc
05_userdel_failure_remove_mailbox
config
etc
06_userdel_failure_remove_file_homedir
config
etc
07_userdel_failure_remove_homedir
config
etc
08_userdel_open_passwd_failure
config
etc
09_userdel_open_shadow_failure
config
etc
10_userdel_open_group_failure
config
etc
11_userdel_open_gshadow_failure
config
etc
12_userdel_open_subuid_failure
config
etc
13_userdel_open_subgid_failure
config
etc
14_userdel_rename_subuid_failure
config
etc
15_userdel_rename_subgid_failure
config
etc
usermod
01_usermod_change_user_name_gshadow_rename_failure
config
etc
02_usermod_change_uid_passwd_rename_failure
config
etc
03_usermod_change_user_name_group_rename_failure
config
etc
04_usermod_change_user_name_gshadow_rename_no_failure
config
etc
05_usermod_change_uid_shadow_rename_failure
config
etc
06_usermod_change_user_name_open_passwd_failure
config
etc
07_usermod_change_user_name_open_shadow_failure
config
etc
08_usermod_change_user_name_open_group_failure
config
etc
09_usermod_change_user_name_open_gshadow_failure
config
etc
12_usermod_change_uid_passwd_unlock_passwd_failure
config
etc
13_usermod_-v_open_subuid_failure
config
etc
14_usermod_-V_open_subuid_failure
config
etc
15_usermod_-w_open_subgid_failure
config
etc
16_usermod_-W_open_subgid_failure
config
etc
17_usermod_-v_rename_subuid_failure
config
etc
18_usermod_-w_rename_subgid_failure
config
etc
grouptools
chgpasswd
01_chgpasswd_invalid_group
config
etc
02_chgpasswd_multiple_groups
config
etc
03_chgpasswd_no_gshadow_file
config
etc
04_chgpasswd_no_gshadow_entry
config
etc
05_chgpasswd_error_no_password
config
etc
gpasswd
19_gpasswd_change_passwd-root
config
etc
20_gpasswd_change_passwd-root-no_shadow_group
config
etc
21_gpasswd_change_passwd-root-no_gshadow_file
config
etc
22_gpasswd_change_passwd-myuser
config
etc
69_gpasswd_change_passwd_2_tries
config
etc
70_gpasswd_change_passwd_3_tries
config
etc
71_gpasswd_change_passwd_4_tries
config
etc
groupadd
01_groupadd_add_group
config
etc
02_groupadd_add_group_GID_MIN
config
etc
03_groupadd_add_group_-K_GID_MIN
config
etc
04_groupadd_set_password
config
etc
05_groupadd_set_GID
config
etc
06_groupadd_-f_add_existing_group
config
etc
07_groupadd_-f_add_existing_GID
config
etc
10_groupadd_-o_add_existing_GID
config
etc
17_groupadd_add_systemgroup
config
etc
18_groupadd_no_more_GID
config
etc
19_groupadd_-r_no_more_system_GID
config
etc
25_groupadd_no_gshadow
config
etc
groupdel
01_groupdel_delete_group
config
etc
02_groupdel_delete_group_no_gshadow_group
config
etc
03_groupdel_delete_group_no_gshadow_file
config
etc
04_groupdel_delete_group_error_busy_group
config
etc
05_groupdel_delete_group_error_unknown_group
config
etc
06_groupdel_delete_group_error_locked_group
config
etc
07_groupdel_delete_group_error_locked_gshadow
config
etc
08_groupdel_delete_group_error_no_group_parameter
config
etc
09_groupdel_delete_group_error_two_group_parameter
config
etc
10_groupdel_usage
config
etc
11_groupdel_invalid_option
config
etc
groupmems
54_groupmems_usage_invalid_option
config
etc
55_groupmems_usage-a-d
config
etc
56_groupmems_usage_extra_arg
config
etc
groupmod
01_groupmod_change_gid
config
etc
02_groupmod_change_gid_change_primary_group
config
etc
03_groupmod_change_gid_no_gshadow_group
config
etc
04_groupmod_change_gid_no_gshadow_file
config
etc
05_groupmod_change_gid_-o_override_used_GID
config
etc
06_groupmod_change_group_name
config
etc
07_groupmod_change_group_name_no_gshadow_group
config
etc
08_groupmod_change_group_name_no_gshadow_file
config
etc
09_groupmod_set_password
config
etc
10_groupmod_set_password_no_gshadow_group
config
etc
11_groupmod_set_password_no_gshadow_file
config
etc
12_groupmod_change_gid_error_unknown_group
config
etc
13_groupmod_change_gid_error_used_GID
config
etc
14_groupmod_change_group_name_error_used_name
config
etc
15_groupmod_change_group_name_error_invalid_name
config
etc
16_groupmod_change_group_name_no_changes
config
etc
17_groupmod_change_gid_error_locked_group
config
etc
18_groupmod_change_gid_no_error_locked_gshadow
config
etc
19_groupmod_change_gid_error_invalid_GID
config
etc
20_groupmod_change_gid_error_negative_GID
config
etc
21_groupmod_change_gid_error_no_group
config
etc
22_groupmod_change_gid_and_group_name
config
etc
23_groupmod_change_gid_and_group_name_and_password
config
etc
24_groupmod_change_gid_and_name_error_locked_gshadow
config
etc
25_groupmod_change_gid_change_primary_group_error_locked_passwd
config
etc
26_groupmod_change_group_name_no_error_locked_passwd
config
etc
27_groupmod_change_gid_error_GID_4294967295
config
etc
29_groupmod_-g_same_gid_new_name
config
etc
30_groupmod_-g_same_gid_same_name
config
etc
31_groupmod_-g_same_gid
config
etc
33_groupmod_set_password_no_gshadow_file_with_group_pwd_x
config
etc
34_groupmod_set_password_group_without_shadow_pwd
config
etc
35_groupmod_set_password_group_without_shadow_pwd_no_gshadow_group
config
etc
36_groupmod_set_password_group_with_shadow_pwd_no_gshadow_group
config
etc
37_groupmod_invalid_option
config
etc
login
01_login_prompt
config
etc
02_login_user
config
etc
03_login_check_tty
config
etc
newusers
25_create_user_error_no_remaining_UID
config
etc
26_create_user_error_no_remaining_GID
config
etc
split_groups
01_useradd_split_group
config
etc
02_useradd_no_split_group
config
etc
03_useradd_split_group_already_split
config
etc
04_useradd_split_group_already_full
config
etc
05_useradd_split_group_already_split_passwd_differ
config
etc
06_useradd_split_group_already_split_GID_differ
config
etc
07_useradd_split_group_already_split_user_in_both_lines
config
etc
08_useradd_no_split_group_already_split
config
etc
09_groupdel_split_group_already_split
config
etc
10_groupdel_no_split_group_already_split
config
etc
su
04
config
etc
05
config
etc
06
config
etc
07
config
etc
08
config
etc
09
config
etc
10_su_sulog_success
config
etc
11_su_sulog_failure
config
etc
12_su_child_failure
config
etc
13_su_child_success
config
etc
subids
12_useradd_invalid_subuid_configuration1
config
etc
13_useradd_invalid_subuid_configuration2
config
etc
14_useradd_invalid_subuid_configuration3
config
etc
15_useradd_invalid_subgid_configuration1
config
etc
16_useradd_invalid_subgid_configuration2
config
etc
17_useradd_invalid_subgid_configuration3
config
etc
18_useradd_min=max
config
etc
usertools
chpasswd
01_chpasswd_invalid_user
config
etc
02_chpasswd_multiple_users
config
etc
03_chpasswd_no_shadow_file
config
etc
04_chpasswd_no_shadow_entry
config
etc
05_chpasswd_error_no_password
config
etc
userdel
05_userdel_no_USERGROUPS_ENAB
config
etc
06_userdel_no_usergroup
config
etc
07_userdel_usergroup_not_primary
config
etc
08_userdel_usergroup_with_other_members
config
etc
09_userdel_usergroup_no_other_members_in_gshadow
config
etc
usermod
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -176,7 +176,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
2
tests/failures/groupmod/01_groupmod_change_group_name_gshadow_rename_failure/config/etc/login.defs
2
tests/failures/groupmod/01_groupmod_change_group_name_gshadow_rename_failure/config/etc/login.defs
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
@@ -185,7 +185,7 @@ GID_MAX 60000
|
||||
|
||||
#
|
||||
# Max number of login retries if password is bad. This will most likely be
|
||||
# overriden by PAM, since the default pam_unix module has it's own built
|
||||
# overridden by PAM, since the default pam_unix module has it's own built
|
||||
# in of 3 retries. However, this is a safe fallback in case you are using
|
||||
# an authentication module that does not enforce PAM_MAXTRIES.
|
||||
#
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user