diff options
| author | Donatas Abraitis <donatas@opensourcerouting.org> | 2024-01-16 21:14:30 +0200 |
|---|---|---|
| committer | Donatas Abraitis <donatas@opensourcerouting.org> | 2024-01-28 19:50:06 +0200 |
| commit | e68c4f053905de7bc965667d57c330d080441cad (patch) | |
| tree | c819132d7c39400d8d899246a1b596f13727aaaa | |
| parent | 4d92badcde7573b97d2acc2228d0ca5fe7168e1e (diff) | |
packaging: Just permit anything if PAM is enabled
With a current pam_rootok.so, it works only with `root` account. If the user
is under `frrvty`, `frr` group, it gets the error:
```
% groups | grep -o -E "frrvty|frr"
frrvty
frr
% vtysh -c 'end'
vtysh_pam: Failed in account validation: Permission denied(6)
```
Checking the logs:
```
vtysh[23930]: pam_rootok(frr:account): root check failed
```
Signed-off-by: Donatas Abraitis <donatas@opensourcerouting.org>
| -rw-r--r-- | debian/frr.pam | 2 | ||||
| -rw-r--r-- | redhat/frr.pam | 4 |
2 files changed, 3 insertions, 3 deletions
diff --git a/debian/frr.pam b/debian/frr.pam index 737b88953b..1077243a12 100644 --- a/debian/frr.pam +++ b/debian/frr.pam @@ -1,4 +1,4 @@ # Any user may call vtysh but only those belonging to the group frrvty can # actually connect to the socket and use the program. auth sufficient pam_permit.so -account sufficient pam_rootok.so +account sufficient pam_permit.so diff --git a/redhat/frr.pam b/redhat/frr.pam index 17a62f1999..a574c5e575 100644 --- a/redhat/frr.pam +++ b/redhat/frr.pam @@ -4,8 +4,8 @@ ##### if running frr as root: # Only allow root (and possibly wheel) to use this because enable access # is unrestricted. -auth sufficient pam_rootok.so -account sufficient pam_rootok.so +auth sufficient pam_permit.so +account sufficient pam_permit.so # Uncomment the following line to implicitly trust users in the "wheel" group. #auth sufficient pam_wheel.so trust use_uid |
