|author||Sam Hartman <firstname.lastname@example.org>||2009-07-28 10:41:03 -0400|
|committer||Steve Langasek <email@example.com>||2019-01-08 19:41:59 -0800|
Straw man template for the note indicating system compromise.
Currently this is not tied into the debconf machinery
Diffstat (limited to 'debian/libpam-runtime.templates')
1 files changed, 19 insertions, 0 deletions
diff --git a/debian/libpam-runtime.templates b/debian/libpam-runtime.templates
index 1195d9e5..ca49858d 100644
@@ -41,3 +41,22 @@ _Description: No PAM profiles have been selected.
No PAM profiles have been selected for use on this system. This would grant
all users access without authenticating, and is not allowed. Please select
at least one PAM profile from the available list.
+_Description: Your system allows access with no password!
+ When you configured PAM on this system, you elected to disable all
+ PAM profiles. As a result, any password will be accepted to gain
+ access to the system; even incorrect passwords will gain
+ access. Especially if this system can be accessed from the Internet,
+ it is likely that malicious software has been installed and the
+ system compromised. Unless you are familiar with recovering from
+ security failures, viruses, and malicious software you should
+ re-install this system from scratch or obtain the services of a
+ skilled system administrator. For more information see
+ The PAM packaging has been improved and the automated PAM
+ configuration tool no longer permits this configuration. We
+ apologize that previous versions of the PAM configuration did not
+ detect and prevent this situation.