404

[ Avaa Bypassed ]




Upload:

Command:

botdev@18.222.209.142: ~ $
#
# /etc/pam.d/common-account - authorization settings common to all services
#
# This file is included from other service-specific PAM config files,
# and should contain a list of the authorization modules that define
# the central access policy for use on the system.  The default is to
# only deny service to users whose accounts are expired in /etc/shadow.
#
# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
# To take advantage of this, it is recommended that you configure any
# local modules either before or after the default block, and use
# pam-auth-update to manage selection of other modules.  See
# pam-auth-update(8) for details.
#

# here are the per-package modules (the "Primary" block)
$account_primary
# here's the fallback if no module succeeds
account	requisite			pam_deny.so
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump around
account	required			pam_permit.so
# and here are more per-package modules (the "Additional" block)
$account_additional
# end of pam-auth-update config

Filemanager

Name Type Size Permission Actions
common-account File 1.15 KB 0644
common-account.md5sums File 107 B 0644
common-auth File 1.17 KB 0644
common-auth.md5sums File 159 B 0644
common-password File 1.38 KB 0644
common-password.md5sums File 357 B 0644
common-session File 1.38 KB 0644
common-session-noninteractive File 1.39 KB 0644
common-session-noninteractive.md5sums File 46 B 0644
common-session.md5sums File 174 B 0644