Thank you for posting!
> Exactly what did you do? Maybe here something got screwed up, please tell us with as much detail as possible what you did.
Not a lot really. Just started the server. Worked around a AMP tutorial to re-familiarize myself with the basic setup before I stared working on other things. Not installing anything. Just added the requested iptables for the server access. I just recall that I shut down from the remote without exiting the user account on the system (since its headless, I don't usually login from the actual system, but this time I did).
>Is the /root directory present?
Yes.
>If so, what are the permissions?
550 /root <--------- that's right...?
700, 600, etc inside...
> Check disk space & that all partitions are properly mounted.
The system's fully operational. Its a RAID. If somethings not mounted all manner of flashing lights go off.
Post the pam configuration files concerning login - can't tell exactly which files right now, go for the names.[/QUOTE]
[xtian@mrwizard pam.d]$ cat password-auth
Code:
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth required pam_env.so
auth sufficient pam_unix.so nullok try_first_pass
auth requisite pam_succeed_if.so uid >= 500 quiet
auth required pam_deny.so
account required pam_unix.so
account sufficient pam_localuser.so
account sufficient pam_succeed_if.so uid < 500 quiet
account required pam_permit.so
password requisite pam_cracklib.so try_first_pass retry=3 type=
password sufficient pam_unix.so sha512 shadow nullok try_first_pass use_authtok
password required pam_deny.so
session optional pam_keyinit.so revoke
session required pam_limits.so
session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session required pam_unix.so
[xtian@mrwizard pam.d]$ cat system-auth
Code:
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth required pam_env.so
auth sufficient pam_fprintd.so
auth sufficient pam_unix.so nullok try_first_pass
auth requisite pam_succeed_if.so uid >= 500 debug
auth required pam_deny.so
account required pam_unix.so
account sufficient pam_localuser.so
account sufficient pam_succeed_if.so uid < 500 debug
account required pam_permit.so
password requisite pam_cracklib.so try_first_pass retry=3 type=
password sufficient pam_unix.so sha512 shadow nullok try_first_pass use_authtok
password required pam_deny.so
session optional pam_keyinit.so revoke
session required pam_limits.so
session [success=1 default=ignore] pam_succeed_if.so service in crond debug use_uid
session required pam_unix.so
CentOS installs a load of PAM modules...
Code:
[xtian@mrwizard pam.d]$ ls
atd cvs halt newrole remote smtp.postfix system-config-authentication vsftpd
authconfig eject kcheckpass other run_init sshd system-config-date wireshark
authconfig-gtk fingerprint-auth kdm passwd runuser ssh-keycat system-config-kdump xdm
authconfig-tui fingerprint-auth-ac kdm-np password-auth runuser-l su system-config-keyboard xserver
chfn gdm kppp password-auth-ac screen sudo system-config-language
chsh gdm-autologin kscreensaver polkit-1 setup sudo-i system-config-lvm
config-util gdm-fingerprint ksu poweroff smartcard-auth su-l system-config-network
crond gdm-password liveinst ppp smartcard-auth-ac system-auth system-config-network-cmd
cups gnome-screensaver login reboot smtp system-auth-ac system-config-users
I posted the one's that I've read about. If there's something else just ask.