Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Delete authconfig-task on rhel-systems #23

Merged
merged 1 commit into from
Jun 20, 2015
Merged

Conversation

rndmh3ro
Copy link
Member

The authconfig-task overrides changes we later do on files, so this
task is not necessary and causes some tasks to always change files

The authconfig-task overrides changes we later do on files, so this
task is not necessary and causes some tasks to always change files
chris-rock added a commit that referenced this pull request Jun 20, 2015
Delete authconfig-task on rhel-systems
@chris-rock chris-rock merged commit 10267eb into master Jun 20, 2015
@chris-rock chris-rock deleted the remove_authconfig branch June 20, 2015 09:01
rndmh3ro pushed a commit that referenced this pull request Jul 24, 2020
This change add the following:

- it checks wether selinux is in "Enforcing" mode
- when selinux is enforcing, it copies a new selinux-policy to the host
- this policy allows sshd to read the shadow-file directly, which is forbidden by selinux otherwise
- the policy is then compiled, a package is created and the policy is installed
- when selinux is enforcing, pam is used and the policy is not disabled, it gets removed,
  because its considered a security risk. see here: http://danwalsh.livejournal.com/12333.html
rndmh3ro pushed a commit that referenced this pull request Jul 24, 2020
Support for selinux and pam. fix #23
divialth pushed a commit to divialth/ansible-collection-hardening that referenced this pull request Aug 3, 2022
This change add the following:

- it checks wether selinux is in "Enforcing" mode
- when selinux is enforcing, it copies a new selinux-policy to the host
- this policy allows sshd to read the shadow-file directly, which is forbidden by selinux otherwise
- the policy is then compiled, a package is created and the policy is installed
- when selinux is enforcing, pam is used and the policy is not disabled, it gets removed,
  because its considered a security risk. see here: http://danwalsh.livejournal.com/12333.html
divialth pushed a commit to divialth/ansible-collection-hardening that referenced this pull request Aug 3, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants