29Ekim Açık Kaynak açılış Akademik Bilişim 2012 Akademik Bilişim 2012 Uşak akgül all Alt+Ctrl+Delete altlinux Anatolya installer apache apache2 arm AtlantiS autoindex backup bağlantı ban banana bash bash script belediye betik bind9 boot bootloader bootparametre böl burg cache canlicdrom cdrom centos CHKUSER chrome clone clonezilla CloneZilla ile Remote Disk Clone işlemi cron crontab çöp dd denizaltı denizaltı kablo Desteği destek Dil Disk disk eklemek disket dizin şifreleme django djb dkim dns DNS sistemi docker Domain download drbl dvd e-posta eğitim eklenti EniXma eposta eQmail esxi ev ev almak fail2ban fake fakemail feed feedbro ffmpeg find Firefox format fortran free FreeBSD freenas ftp full backup Gazze Genel Gentoo Getgnu.org gezegen git github gitweb Gmail gnupg Gökşin Akdeniz görev Görsel gpg grub grub2 günlük Güvenlik Hacker harddisk hizmet hosting id_rsa imap index indimail indir internet ipv4 ipv6 iso israil İşletim Sistemi kablo KAMP kernel kernellogo kesin çözüm key klonlamak komut konsol koruma lampp. httpd lilo link linux liste listeci listmanager live livecd LKD loader login logo LVM mail mail hosting Mail-in-a-Box mailcow mailman mailserver mandriva-tr.org matrax Mint mirror mlmmj modül MTA multisite mustafa akgül Mustafa Akgül Özgür Yazılım Yaz Kampı. Abant İzzet Baysal Üniversitesi Müteahhit mx MySQL netinternet Netqmail network nfs nginx ngrok not.py online radyo opendkim openssl önyükleme özgür yazılım panel pano pardus parola paste patch paylaşım pdf perl pfsense pfsense full backup phpmyadmin pi plan Planet planetplanet plesk pop3 poste.io postfix postfixadmin proje proxy putty python qmail qmailtoaster randmap Ras webserver Raspberry pi Raspberry Pi raspi rawdisk recovery remote repository resim resimler robots.txt 401 rss rsync rsyncd rsyncd etiketi s/qmail Saldırı Samba screen script sendonly smtp server senronizasyon server servis shell sistem Slackarm slackware Slackware slackware-live slackware.org.tr slackware arşiv httrack truva linux hatıralar slacky.eu SMF SMF türkçe karakter problemi smtp sosyal ağ spam spf sql backup sqlite sqlite3 sqlite3 to wordpress ssh ssh_key ssh-key SSL ssl sertifika subversion sudo sunucu svn swap swapfile syslinux system system images şifreleme takasfile Tatil Tavuk Teneke Kebabı Tenekede Tavuk theme thunderbird TightVNC tmux Tokat Kebabı tokat kebabı sobası etiketi Trash Trash-cli Truva Linux truvalinux Turkcell tuxweet Türkçe türkiye ubuntu unban UNIX uzak varnish veri Virtualbox vmware Vodafone vps Vsftp vsftpd Wampp web web robot Web server web Sunucu webp webserver webserver Akıllı Tahta wget whitelist WINN Windows wordpress Wordpress wordpress multisite www xampp Xnest yansı yansılama yansılamak yapıştır yazmak Yedekleme Yemek zulüm

Ubuntu Server Login Hatası Çözümü

ubuntu-logoGeçenlerde login izni vermeyen bir ubuntu server ile karşılaştım.

Sunucu konsoldan veya uzak ssh ile erişme izin vermiyordu.



 

 

pam-d-2016-11-02-00-01-29

Çözüm üreten arkadaşa buradan saygılarımı sunuyorum.
diff -u pam.d/gdm pam.d.new/gdm
--- pam.d/gdm 2007-04-10 23:43:51.000000000 +0300
+++ pam.d.new/gdm 2016-10-29 15:09:06.000000000 +0300
@@ -1,8 +1,6 @@
#%PAM-1.0
auth requisite pam_nologin.so
auth required pam_env.so
-@include common-auth
@include common-account
-session required pam_limits.so
@include common-session
@include common-password
diff -u pam.d/login pam.d.new/login
--- pam.d/login 2014-10-01 19:05:18.000000000 +0300
+++ pam.d.new/login 2016-10-29 17:31:44.000000000 +0300
@@ -31,7 +31,7 @@
session required pam_env.so readenv=1 envfile=/etc/default/locale

# Standard Un*x authentication.
-@include common-auth
+###@include common-auth

# This allows certain extra groups to be granted to a user
# based on things like time of day, tty, service, and user.
@@ -73,9 +73,9 @@
session optional pam_mail.so standard

# Standard Un*x account and session
-@include common-account
-@include common-session
-@include common-password
+###@include common-account
+###@include common-session
+###@include common-password

# SELinux needs to intervene at login time to ensure that the process
# starts in the proper default security context. Only sessions which are
diff -u pam.d/ssh pam.d.new/ssh
--- pam.d/ssh 2014-10-01 17:51:40.000000000 +0300
+++ pam.d.new/ssh 2016-10-29 17:25:02.000000000 +0300
@@ -2,26 +2,26 @@

# Read environment variables from /etc/environment and
# /etc/security/pam_env.conf.
-auth required pam_env.so # [1]
+###auth include common-password
# In Debian 4.0 (etch), locale-related environment variables were moved to
# /etc/default/locale, so read that as well.
-auth required pam_env.so envfile=/etc/default/locale
+###auth required pam_env.so # [1]

# Standard Un*x authentication.
-auth include common-auth
+###auth required pam_env.so envfile=/etc/default/locale

# Disallow non-root logins when /etc/nologin exists.
-account required pam_nologin.so
+###account required pam_nologin.so

# Uncomment and edit /etc/security/access.conf if you need to set complex
# access limits that are hard to express in sshd_config.
# account required pam_access.so

# Standard Un*x authorization.
-auth include common-account
+###auth include common-auth

# Standard Un*x session setup and teardown.
-auth include common-session
+###auth include common-account

# Print the message of the day upon successful login.
session optional pam_motd.so # [1]
@@ -36,4 +36,4 @@
# session required pam_selinux.so multiple

# Standard Un*x password updating.
-auth include common-password
+auth include common-session

 

 

Yorum Gönder

[blogger][facebook][disqus][spotim]

Author Name

İletişim Formu

Ad

E-posta *

Mesaj *

Blogger tarafından desteklenmektedir.