403Webshell
Server IP : 103.119.228.120  /  Your IP : 3.147.89.50
Web Server : Apache
System : Linux v8.techscape8.com 3.10.0-1160.119.1.el7.tuxcare.els2.x86_64 #1 SMP Mon Jul 15 12:09:18 UTC 2024 x86_64
User : nobody ( 99)
PHP Version : 5.6.40
Disable Function : shell_exec,symlink,system,exec,proc_get_status,proc_nice,proc_terminate,define_syslog_variables,syslog,openlog,closelog,escapeshellcmd,passthru,ocinum cols,ini_alter,leak,listen,chgrp,apache_note,apache_setenv,debugger_on,debugger_off,ftp_exec,dl,dll,myshellexec,proc_open,socket_bind,proc_close,escapeshellarg,parse_ini_filepopen,fpassthru,exec,passthru,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,popen,show_source,proc_nice,proc_terminate,proc_get_status,proc_close,pfsockopen,leak,apache_child_terminate,posix_kill,posix_mkfifo,posix_setpgid,posix_setsid,posix_setuid,dl,symlink,shell_exec,system,dl,passthru,escapeshellarg,escapeshellcmd,myshellexec,c99_buff_prepare,c99_sess_put,fpassthru,getdisfunc,fx29exec,fx29exec2,is_windows,disp_freespace,fx29sh_getupdate,fx29_buff_prepare,fx29_sess_put,fx29shexit,fx29fsearch,fx29ftpbrutecheck,fx29sh_tools,fx29sh_about,milw0rm,imagez,sh_name,myshellexec,checkproxyhost,dosyayicek,c99_buff_prepare,c99_sess_put,c99getsource,c99sh_getupdate,c99fsearch,c99shexit,view_perms,posix_getpwuid,posix_getgrgid,posix_kill,parse_perms,parsesort,view_perms_color,set_encoder_input,ls_setcheckboxall,ls_reverse_all,rsg_read,rsg_glob,selfURL,dispsecinfo,unix2DosTime,addFile,system,get_users,view_size,DirFiles,DirFilesWide,DirPrintHTMLHeaders,GetFilesTotal,GetTitles,GetTimeTotal,GetMatchesCount,GetFileMatchesCount,GetResultFiles,fs_copy_dir,fs_copy_obj,fs_move_dir,fs_move_obj,fs_rmdir,SearchText,getmicrotime
MySQL : ON |  cURL : ON |  WGET : ON |  Perl : ON |  Python : ON |  Sudo : ON |  Pkexec : ON
Directory :  /usr/share/doc/pam-1.1.8/txts/

Upload File :
current_dir [ Writeable] document_root [ Writeable]

 

Command :


[ Back ]     

Current File : /usr/share/doc/pam-1.1.8/txts/README.pam_stress
#
# This describes the behavior of this module with respect to the
# /etc/pam.conf file.
#
# writen by Andrew Morgan <morgan@parc.power.net>
#

This module recognizes the following arguments.

debug		put lots of information in syslog.
		*NOTE* this option writes passwords to syslog, so
		don't use anything sensitive when testing.

no_warn		don't give warnings about things (otherwise warnings are issued
		via the conversation function)

use_first_pass	don't prompt for a password, for pam_sm_authentication
		function just use item PAM_AUTHTOK.

try_first_pass	don't prompt for a password unless there has been no
		previous authentication token (item PAM_AUTHTOK is NULL)

rootok		This is intended for the pam_sm_chauthtok function and
		it instructs this function to permit root to change
		the user's password without entering the old password.

The following arguments are acted on by the module. They are intended
to make the module give the impression of failing as a fully
functioning module might.

expired 	an argument intended for the account and chauthtok module
		parts. It instructs the module to act as if the user's
		password has expired

fail_1		this instructs the module to make its first function fail.

fail_2		this instructs the module to make its second function (if there
		is one) fail.

		The function break up is indicated in the Module
		Developers' Guide. Listed here it is:

		service		function 1		function 2
		-------		----------		----------
		auth		pam_sm_authenticate	pam_sm_setcred
		password	pam_sm_chauthtok
		session		pam_sm_open_session	pam_sm_close_session
		account		pam_sm_acct_mgmt

prelim		for pam_sm_chauthtok, means fail on PAM_PRELIM_CHECK.

required	for pam_sm_chauthtok, means fail if the user hasn't already
		been authenticated by this module. (See stress_new_pwd data
		item below.)

#
# data strings that this module uses are the following:
#

data name		value(s)	Comments
---------		--------	--------
stress_new_pwd		yes		tells pam_sm_chauthtok that
					pam_sm_acct_mgmt says we need a new
					password

Youez - 2016 - github.com/yon3zu
LinuXploit