http://www.hackerschool.org/HS_Boards/zboard.php?id=Free_Lectures&no=843 [º¹»ç]
¸®´ª½º¿¡¼ su ¸í·É¾î »ç¿ëÀ» ƯÁ¤»ç¿ëÀÚ¿¡°Ô¸¸...
ù ¹ø°, /etc/group ÆÄÀÏ¿¡¼ wheel ±×·ì¿¡ su ¸í·É¾î¸¦ »ç¿ëÇÒ »ç¿ëÀÚ¸¦ Ãß°¡
¿¹)
[root@kebia_1 ]# cat /etc/group
root:x:0:root
bin:x:1:root,bin,daemon
daemon:x:2:root,bin,daemon
sys:x:3:root,bin,adm
adm:x:4:root,adm,daemon
tty:x:5:
disk:x:6:root
lp:x:7:daemon,lp
mem:x:8:
kmem:x:9:
wheel:x:10:root,sspark
µÎ ¹ø°, /etc/pam.d/su ÆÄÀÏ¿¡ ¾Æ·¡ÀÇ »¡°£»öÀ¸·Î Ç¥½ÃµÈ µÎÁÙÀ» ¼³Á¤
[root@kebia_1 ]# cat /etc/pam.d/su
#%PAM-1.0
auth sufficient /lib/security/pam_rootok.so
auth required /lib/security/pam_wheel.so debug group=wheel
# Uncomment the following line to implicitly trust users in the "wheel" group.
#auth sufficient /lib/security/pam_wheel.so trust use_uid
# Uncomment the following line to require a user to be in the "wheel" group.
#auth required /lib/security/pam_wheel.so use_uid
auth required /lib/security/pam_stack.so service=system-auth
account required /lib/security/pam_stack.so service=system-auth
password required /lib/security/pam_stack.so service=system-auth
session required /lib/security/pam_stack.so service=system-auth
session optional /lib/security/pam_xauth.so
|
Hit : 8422 Date : 2007/08/28 10:51
|