📄 login.defs
字号:
MAIL_DIR /var/lib/# Delay in seconds before being allowed another attempt after a login failureFAIL_DELAY 3# Enable logging and display of /var/log/faillog login failure info.FAILLOG_ENAB yes# Enable display of unknown usernames when login failures are recorded.LOG_UNKFAIL_ENAB no# Enable logging of successful loginsLOG_OK_LOGINS no# Enable setting of ulimit, umask, and niceness from passwd gecos field.QUOTAS_ENAB yes# Enable "syslog" logging of su activity - in addition to sulog file logging.# SYSLOG_SG_ENAB does the same for newgrp and sg.SYSLOG_SU_ENAB yesSYSLOG_SG_ENAB yes# If defined, login failures will be logged here in a utmp format.# last, when invoked as lastb, will read /var/log/btmp, so...FTMP_FILE /tmp/btmp# for Linux/x86ENV_HZ HZ=100# For Linux/Alpha...#ENV_HZ HZ=1024## *REQUIRED* The default PATH settings, for superuser and normal users.## (they are minimal, add the rest in the shell startup files)ENV_SUPATH PATH=/sbin:/bin:/usr/sbin:/usr/binENV_PATH PATH=/usr/bin:/bin# Terminal permissions## TTYGROUP Login tty will be assigned this group ownership.# TTYPERM Login tty will be set to this permission.## If you have a "write" program which is "setgid" to a special group# which owns the terminals, define TTYGROUP to the group number and# TTYPERM to 0620. Otherwise leave TTYGROUP commented out and assign# TTYPERM to either 622 or 600.#TTYGROUP ttyTTYPERM 0600## Login configuration initializations:## ERASECHAR Terminal ERASE character ('\010' = backspace).# KILLCHAR Terminal KILL character ('\025' = CTRL/U).# UMASK Default "umask" value.# ULIMIT Default "ulimit" value.## The ERASECHAR and KILLCHAR are used only on System V machines.# The ULIMIT is used only if the system supports it.# (now it works with setrlimit too; ulimit is in 512-byte units)## Prefix these values with "0" to get octal, "0x" to get hexadecimal.#ERASECHAR 0177KILLCHAR 025UMASK 022#ULIMIT 2097152## Password aging controls:## PASS_MAX_DAYS Maximum number of days a password may be used.# PASS_MIN_DAYS Minimum number of days allowed between password changes.# PASS_WARN_AGE Number of days warning given before a password expires.#PASS_MAX_DAYS 99999PASS_MIN_DAYS 0PASS_WARN_AGE 7## Min/max values for automatic uid selection in useradd#UID_MIN 1000UID_MAX 60000## Min/max values for automatic gid selection in groupadd#GID_MIN 100GID_MAX 60000## Max number of login retries if password is bad. This will most likely be# overriden by PAM, since the default pam_unix module has it's own built# in of 3 retries However, this is a safe fallback in case you are using# and authentication module that does not enforce PAM_MAXTRIES.#LOGIN_RETRIES 5## Max time in seconds for login#LOGIN_TIMEOUT 60## Number of significant characters in the password for crypt().# Default is 8, don't change unless your crypt() is better.# If using MD5 in your PAM configuration, set this higher.#PASS_MAX_LEN 8## Require password before chfn/chsh can make any changes.#CHFN_AUTH yes## Which fields may be changed by regular users using chfn - use# any combination of letters "frwh" (full name, room number, work# phone, home phone). If not defined, no changes are allowed.# For backward compatibility, "yes" = "rwh" and "no" = "frwh".# CHFN_RESTRICT rwh## Password prompt (%s will be replaced by user name).## XXX - it doesn't work correctly yet, for now leave it commented out# to use the default which is just "Password: ".#LOGIN_STRING "%s's Password: "## Should login be allowed if we can't cd to the home directory?# Default in no.#DEFAULT_HOME yes## If defined, this command is run when removing a user.# It should remove any at/cron/print jobs etc. owned by# the user to be removed (passed as the first argument).##USERDEL_CMD /usr/sbin/userdel_local## If defined, either full pathname of a file containing device names or# a ":" delimited list of device names. No password is required to log in# as a non-root user on these devices.##NO_PASSWORD_CONSOLE tty1:tty2:tty3:tty4:tty5:tty6## When prompting for password without echo, getpass() can optionally# display a random number (in the range 1 to GETPASS_ASTERISKS) of '*'# characters for each character typed. This feature is designed to# confuse people looking over your shoulder when you enter a password :-).# Also, the new getpass() accepts both Backspace (8) and Delete (127)# keys to delete previous character (to cope with different terminal# types), Control-U to delete all characters, and beeps when there are# no more characters to delete, or too many characters entered.## Setting GETPASS_ASTERISKS to 1 results in more traditional behaviour -# exactly one '*' displayed for each character typed.## Setting GETPASS_ASTERISKS to 0 disables the '*' characters (Backspace,# Delete, Control-U and beep continue to work as described above).## Setting GETPASS_ASTERISKS to -1 reverts to the traditional getpass()# without any new features. This is the default.##GETPASS_ASTERISKS 1## Enable setting of the umask group bits to be the same as owner bits# (examples: 022 -> 002, 077 -> 007) for non-root users, if the uid is# the same as gid, and username is the same as the primary group name.## This also enables userdel to remove user groups if no members exist.#USERGROUPS_ENAB yes## Instead of the real user shell, the program specified by this parameter# will be launched, although its visible name (argv[0]) will be the shell's.# The program may do whatever it wants (logging, additional authentification,# banner, ...) before running the actual shell.## FAKE_SHELL /bin/fakeshell## Enable pam_close_session() calling. When using normal (pam_unix.so)# session handling modules, this is not needed. However with modules# (such as kerberos or other persistent session models), login and su# need to fork and wait for the shell to exit so that sessions can be# cleaned up.#CLOSE_SESSIONS no
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -