403Webshell
Server IP : 68.178.202.69  /  Your IP : 216.73.216.122
Web Server : Apache
System : Linux 69.202.178.68.host.secureserver.net 3.10.0-1160.139.1.el7.tuxcare.els2.x86_64 #1 SMP Mon Nov 3 13:30:41 UTC 2025 x86_64
User : ikioworld ( 1005)
PHP Version : 7.4.33
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /usr/share/doc/pam-1.1.8/txts/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /usr/share/doc/pam-1.1.8/txts/README.pam_nologin
pam_nologin — Prevent non-root users from login

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

DESCRIPTION

pam_nologin is a PAM module that prevents users from logging into the system
when /var/run/nologin or /etc/nologin exists. The contents of the file are
displayed to the user. The pam_nologin module has no effect on the root user's
ability to log in.

OPTIONS

file=/path/nologin

    Use this file instead the default /var/run/nologin or /etc/nologin.

successok

    Return PAM_SUCCESS if no file exists, the default is PAM_IGNORE.

EXAMPLES

The suggested usage for /etc/pam.d/login is:

auth  required  pam_nologin.so


NOTES

In order to make this module effective, all login methods should be secured by
it. It should be used as a required method listed before any sufficient methods
in order to get standard Unix nologin semantics. Note, the use of successok
module argument causes the module to return PAM_SUCCESS and as such would break
such a configuration - failing sufficient modules would lead to a successful
login because the nologin module succeeded.

AUTHOR

pam_nologin was written by Michael K. Johnson <johnsonm@redhat.com>.


Youez - 2016 - github.com/yon3zu
LinuXploit