PAM and Device Ownership
In Community Enterprise Linux, the first user who logs in at the physical console of the machine can manipulate certain devices and perform certain tasks normally reserved for the root user. This is controlled by a PAM module called When a user logs in to a Community Enterprise Linux system, the The devices affected include, but are not limited to, sound cards, diskette drives, and CD-ROM drives.
This facility allows a local user to manipulate these devices without obtaining root access, thus simplifying common tasks for the console user.
You can modify the list of devices controlled by You can change the permissions of different devices than those listed in the above files, or override the specified defaults. Rather than modify the If the gdm, kdm, or xdm display manager configuration file has been altered to allow remote users to log in and the host is configured to run at runlevel 5, it is advisable to change the This prevents remote users from gaining access to devices and restricted applications on the machine.
If the gdm, kdm, or xdm display manager configuration file has been altered to allow remote users to log in and the host is configured to run at any multiple user runlevel other than 5, it is advisable to remove the The console user also has access to certain programs configured for use in the This directory contains configuration files which enable the console user to run certain applications in These configuration files have the same name as the applications that they set up.
One notable group of applications that the console user has access to are three programs that shut down or reboot the system:
Because these are PAM-aware applications, they call the Refer to "Installed Documentation" for more information.
pam_console.so
.
Device Ownership
pam_console.so
module is called by login
or the graphical login programs, gdm, kdm, and xdm. If this user is the first user to log in at the physical console - referred to as the console user - the module grants the user ownership of a variety of devices normally owned by root. The console user owns these devices until the last local session for that user ends. After this user has logged out, ownership of the devices reverts back to the root user.
pam_console.so
by editing the following files:
/etc/security/console.perms
/etc/security/console.perms.d/50-default.perms
50-default.perms
file, you should create a new file (for example,
) and enter the required modifications. The name of the new default file must begin with a number higher than 50 (for example, xx
-name.perms51-default.perms
). This will override the defaults in the 50-default.perms
file.
<console>
and <xconsole>
directives in the /etc/security/console.perms
to the following values:
<console>=tty[0-9][0-9]* vc/[0-9][0-9]* :0\.[0-9] :0
<xconsole>=:0\.[0-9] :0
<xconsole>
directive entirely and change the <console>
directive to the following value:
<console>=tty[0-9][0-9]* vc/[0-9][0-9]*
Application Access
/etc/security/console.apps/
directory.
/sbin
and /usr/sbin
.
/sbin/halt
/sbin/reboot
/sbin/poweroff
pam_console.so
module as a requirement for use.