Your message dated Sat, 7 Mar 2015 17:06:58 +0100 with message-id <[email protected]> has caused the report #528015, regarding manpages: securetty(5) is not only used to restrict root login to be marked as having been forwarded to the upstream software author(s) [email protected]
(NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 528015: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=528015 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Debian Bug #528015 reported by "Nicolas FRANCOIS (Nekral)" <[email protected]> See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=528015 This patch is a modified version of the one proposed without specific part to Debian. Signed-off-by: Stéphane Aulery <[email protected]> --- man5/securetty.5 | 17 +++++++++++++---- 1 file changed, 13 insertions(+), 4 deletions(-) diff --git a/man5/securetty.5 b/man5/securetty.5 index 99f6c57..88f9fb6 100644 --- a/man5/securetty.5 +++ b/man5/securetty.5 @@ -29,17 +29,26 @@ securetty \- file which lists terminals from which root can log in .SH DESCRIPTION The file .I /etc/securetty -is used by (some versions of) -.BR login (1). -The file contains the device names of terminal lines +contains the names of terminals (one per line, without leading .IR /dev/ ) +which are considered secure for the transmission of certain authentication +tokens. +.P +It is used by (some versions of) +.BR login (1) +to restrict the terminals on which root is allowed to login. See .BR login.defs (5) if you use the shadow suite. +.P +On PAM enabled systems, it is used for the same purpose by +.BR pam_securetty (8) +to restrict the terminals on which empty passwords are accepted. .SH FILES .I /etc/securetty .SH SEE ALSO .BR login (1), -.BR login.defs (5) +.BR login.defs (5), +.BR pam_securetty (8) -- 2.1.4
--- End Message ---

