summary refs log tree commit diff
path: root/modules/security
diff options
context:
space:
mode:
authorEelco Dolstra <eelco.dolstra@logicblox.com>2010-06-02 19:59:44 +0000
committerEelco Dolstra <eelco.dolstra@logicblox.com>2010-06-02 19:59:44 +0000
commit876954d15d541716a95da690d1e9332e818ca613 (patch)
tree7eae8f094bbe534e6ba4149dda832ff1247a80f1 /modules/security
parent8b308272dfc52c6465895ea104407bb32f10efd2 (diff)
downloadnixpkgs-876954d15d541716a95da690d1e9332e818ca613.tar
nixpkgs-876954d15d541716a95da690d1e9332e818ca613.tar.gz
nixpkgs-876954d15d541716a95da690d1e9332e818ca613.tar.bz2
nixpkgs-876954d15d541716a95da690d1e9332e818ca613.tar.lz
nixpkgs-876954d15d541716a95da690d1e9332e818ca613.tar.xz
nixpkgs-876954d15d541716a95da690d1e9332e818ca613.tar.zst
nixpkgs-876954d15d541716a95da690d1e9332e818ca613.zip
* Use pam_unix (from the PAM package) instead of pam_unix2. All the
  functionality we needed from pam_unix2 (more secure hashes, and,
  uh...) has been merged into pam_unix.

svn path=/nixos/trunk/; revision=22106
Diffstat (limited to 'modules/security')
-rw-r--r--modules/security/pam.nix14
1 files changed, 7 insertions, 7 deletions
diff --git a/modules/security/pam.nix b/modules/security/pam.nix
index 0ee7595a5e1..f92c0e106db 100644
--- a/modules/security/pam.nix
+++ b/modules/security/pam.nix
@@ -7,7 +7,7 @@ with pkgs.lib;
 
 let
 
-  inherit (pkgs) pam_unix2 pam_usb pam_ldap;
+  inherit (pkgs) pam_usb pam_ldap;
 
   otherService = pkgs.writeText "other.pam"
     ''
@@ -47,7 +47,7 @@ let
       # set (i.e., have an empty password field in /etc/passwd or
       # /etc/group).  This does not enable logging into disabled
       # accounts (i.e., that have the password field set to `!').
-      # Note that regardless of what the pam_unix2 documentation says,
+      # Note that regardless of what the pam_unix documentation says,
       # accounts with hashed empty passwords are always allowed to log
       # in.
       allowNullPassword ? false
@@ -63,7 +63,7 @@ let
           # Account management.
           ${optionalString config.users.ldap.enable
               "account optional ${pam_ldap}/lib/security/pam_ldap.so"}
-          account required ${pam_unix2}/lib/security/pam_unix2.so
+          account required pam_unix.so
 
           # Authentication management.
           ${optionalString rootOK
@@ -72,21 +72,21 @@ let
               "auth sufficient ${pam_usb}/lib/security/pam_usb.so"}
           ${optionalString config.users.ldap.enable
               "auth sufficient ${pam_ldap}/lib/security/pam_ldap.so"}
-          auth sufficient ${pam_unix2}/lib/security/pam_unix2.so ${
+          auth sufficient pam_unix.so ${
             optionalString allowNullPassword "nullok"}
           auth required   pam_deny.so
 
           # Password management.
           ${optionalString config.users.ldap.enable
               "password sufficient ${pam_ldap}/lib/security/pam_ldap.so"}
-          password requisite ${pam_unix2}/lib/security/pam_unix2.so nullok
+          password requisite pam_unix.so nullok sha512
           ${optionalString config.services.samba.syncPasswordsByPam
               "password optional ${pkgs.samba}/lib/security/pam_smbpass.so nullok use_authtok try_first_pass"}
 
           # Session management.
           ${optionalString config.users.ldap.enable
               "session optional ${pam_ldap}/lib/security/pam_ldap.so"}
-          session required ${pam_unix2}/lib/security/pam_unix2.so
+          session required pam_unix.so
           ${optionalString ownDevices
               "session optional ${pkgs.consolekit}/lib/security/pam_ck_connector.so"}
           ${optionalString forwardXAuth
@@ -183,7 +183,7 @@ in
   
     environment.systemPackages =
       # Include the PAM modules in the system path mostly for the manpages.
-      [ pkgs.pam pam_unix2 ]
+      [ pkgs.pam ]
       ++ optional config.users.ldap.enable pam_ldap;
 
     environment.etc =