Sunucu konsoldan veya uzak ssh ile erişme izin vermiyordu.
Çözüm üreten arkadaşa buradan saygılarımı sunuyorum.
diff -u pam.d/gdm pam.d.new/gdm
--- pam.d/gdm 2007-04-10 23:43:51.000000000 +0300
+++ pam.d.new/gdm 2016-10-29 15:09:06.000000000 +0300
@@ -1,8 +1,6 @@
#%PAM-1.0
auth requisite pam_nologin.so
auth required pam_env.so
-@include common-auth
@include common-account
-session required pam_limits.so
@include common-session
@include common-password
diff -u pam.d/login pam.d.new/login
--- pam.d/login 2014-10-01 19:05:18.000000000 +0300
+++ pam.d.new/login 2016-10-29 17:31:44.000000000 +0300
@@ -31,7 +31,7 @@
session required pam_env.so readenv=1 envfile=/etc/default/locale
# Standard Un*x authentication.
-@include common-auth
+###@include common-auth
# This allows certain extra groups to be granted to a user
# based on things like time of day, tty, service, and user.
@@ -73,9 +73,9 @@
session optional pam_mail.so standard
# Standard Un*x account and session
-@include common-account
-@include common-session
-@include common-password
+###@include common-account
+###@include common-session
+###@include common-password
# SELinux needs to intervene at login time to ensure that the process
# starts in the proper default security context. Only sessions which are
diff -u pam.d/ssh pam.d.new/ssh
--- pam.d/ssh 2014-10-01 17:51:40.000000000 +0300
+++ pam.d.new/ssh 2016-10-29 17:25:02.000000000 +0300
@@ -2,26 +2,26 @@
# Read environment variables from /etc/environment and
# /etc/security/pam_env.conf.
-auth required pam_env.so # [1]
+###auth include common-password
# In Debian 4.0 (etch), locale-related environment variables were moved to
# /etc/default/locale, so read that as well.
-auth required pam_env.so envfile=/etc/default/locale
+###auth required pam_env.so # [1]
# Standard Un*x authentication.
-auth include common-auth
+###auth required pam_env.so envfile=/etc/default/locale
# Disallow non-root logins when /etc/nologin exists.
-account required pam_nologin.so
+###account required pam_nologin.so
# Uncomment and edit /etc/security/access.conf if you need to set complex
# access limits that are hard to express in sshd_config.
# account required pam_access.so
# Standard Un*x authorization.
-auth include common-account
+###auth include common-auth
# Standard Un*x session setup and teardown.
-auth include common-session
+###auth include common-account
# Print the message of the day upon successful login.
session optional pam_motd.so # [1]
@@ -36,4 +36,4 @@
# session required pam_selinux.so multiple
# Standard Un*x password updating.
-auth include common-password
+auth include common-session
Yorum Gönder