summaryrefslogtreecommitdiff
path: root/debian/libpam-runtime.templates
blob: fa7a41e090d424a042b1c51d807a5734d0cbd75c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
Template: libpam-runtime/profiles
Type: multiselect
Choices: ${profiles}
Choices-C: ${profile_names}
_Description: PAM profiles to enable:
 Pluggable Authentication Modules (PAM) determine how authentication,
 authorization, and password changing are handled on the system, as well
 as allowing configuration of additional actions to take when starting
 user sessions.
 .
 Some PAM module packages provide profiles that can be used to
 automatically adjust the behavior of all PAM-using applications on the
 system.  Please indicate which of these behaviors you wish to enable.

Template: libpam-runtime/conflicts
Type: error
#flag:translate!:3
#flag:comment:2
# This paragraph is followed by a (currently) non-translatable list of
# PAM profile names.
_Description: Incompatible PAM profiles selected.
 The following PAM profiles cannot be used together:
 .
 ${conflicts}
 .
 Please select a different set of modules to enable.

Template: libpam-runtime/override
Type: boolean
Default: false
_Description: Override local changes to /etc/pam.d/common-*?
 One or more of the files /etc/pam.d/common-{auth,account,password,session}
 have been locally modified.  Please indicate whether these local changes
 should be overridden using the system-provided configuration.  If you
 decline this option, you will need to manage your system's
 authentication configuration by hand.

Template: libpam-runtime/no_profiles_chosen
Type: error
_Description: No PAM profiles have been selected.
 No PAM profiles have been selected for use on this system.  This would grant
 all users access without authenticating, and is not allowed.  Please select
 at least one PAM profile from the available list.

Template: libpam-runtime/you-had-no-auth
Type: note
_Description: Your system allows access with no password!
 When you configured PAM on this system, you elected to disable all
 PAM profiles.  As a result, any password will be accepted to gain
 access to the system; even incorrect passwords will gain
 access. Especially if this system can be accessed from the Internet,
 it is likely that malicious software has been installed and the
 system compromised.  Unless you are familiar with recovering from
 security failures, viruses, and malicious software you should
 re-install this system from scratch or obtain the services of a
 skilled system administrator.  For more information see
 http://www.debian.org/security/pam-auth
 .
 The PAM packaging has been improved and the automated PAM
 configuration tool no longer permits this configuration.  We
 apologize that previous versions of the PAM configuration did not
 detect and prevent this situation.