I have built a linux image based on kernel 2.6.32.10. The image boots up fine & at the login prompt when I enter the login Id - the
system doesnt prompt for password - instead throws an error message "Login incorrect".
mygway login: admin
Login incorrect
login: root
Login incorrect
From all the search I did, I narrowed this down to be a pam configuration issue. Can someone please correct me where I am wrong (I am
suspecting system-auth):
I checked that the /etc/securetty has an entry "/dev/ttyS0" to allow root to logon via serial console - so I ruled out this file to
be a cause for that error.
Few files that I am not entirely sure are as below:
1) /etc/pam.d/login
sudo cat login
#%PAM-1.0
auth optional /lib/security/pam_securetty.so
auth required /lib/security/pam_stack.so service=system-auth
auth required /lib/security/pam_nologin.so
account optional /lib/security/pam_stack.so service=system-auth
password required /lib/security/pam_stack.so service=system-auth
session optional /lib/security/pam_stack.so service=system-auth
session optional /lib/security/pam_console.so
2) /etc/pam.d/other
$ sudo cat other
#%PAM-1.0
auth required pam_deny.so
auth required pam_warn.so
account required pam_deny.so
account required pam_warn.so
password required pam_deny.so
password required pam_warn.so
session required pam_deny.so
session required pam_warn.so
3) /etc/pam.d/passwd
[gwfs]$ sudo cat passwd
#%PAM-1.0
auth include system-auth
account include system-auth
password include system-auth
4) /etc/pam.d/runuser
[gwfs]sudo cat runuser
#%PAM-1.0
auth sufficient pam_rootok.so
session optional pam_keyinit.so revoke
session required pam_limits.so
session required pam_unix.so
5) /etc/pam.d/system-auth
sudo cat system-auth
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth required /lib/security/pam_env.so
auth sufficient /lib/security/pam_unix.so likeauth nullok
auth required /lib/security/pam_deny.so
account required /lib/security/pam_unix.so
password required /lib/security/pam_cracklib.so retry=3 type=
password sufficient /lib/security/pam_unix.so nullok use_authtok md5 shadow
password required /lib/security/pam_deny.so
session required /lib/security/pam_limits.so
session required /lib/security/pam_unix.so
There are few other files like runuser-l, sshd, su, su-l
Here is my /etc/shadow:
bin:*:12204:0:99999:7:::
daemon:*:12204:0:99999:7:::
adm:*:12204:0:99999:7:::
nobody:*:12204:0:99999:7:::
rpm:!!:12204:0:99999:7:::
ntp:!!:12204:0:99999:7:::
ident:!!:12204:0:99999:7:::
named:!!:12204:0:99999:7:::
admin:1$$FJ/PrZEx$0Jj4z565rjS35v5yIy14s/:14453::::::
root:$1$44rrX1z3$5F6hZhHjNkW38WbPYhHfm/:13794::::::
sshd:*:12079::::::
/etc/passwd:
admin::0:0:admin:/home/admin:/bin/bash
root:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/sbin:/sbin/nologin
adm:x:3:4:adm:/var/adm:/sbin/nologin
nobody:x:99:99:Nobody:/:/sbin/nologin
rpm:x:37:37::/var/lib/rpm:/bin/bash
ntp:x:38:38::/etc/ntp:/sbin/nologin
ident:x:98:98
ident user:/:/sbin/nologin
named:x:25:25:Named:/var/named:/bin/false
sshd:*:27:27:sshd privsep:/var/empty:/sbin/nologin
/Ramesh