Linux Pam Tutorial for Security

29/12/2020
Chưa phân loại
PAM stands for Pluggable Authentication Modules that provides dynamic authentication support for applications and services in a Linux Operating System. It is a security mechanism that enables protection through PAM instead of asking username and password. PAM is responsible for the authentication of the files being run. Every application consists of several configurable files, and each one consists of stack of several modules. These modules are then run from top to bottom and then the PAM generates the response whether it is pass or fail on the basis of the result.

PAM makes it a lot easier for administrators and developers as it does changes to the source code file on its own and requires minimal interaction. So, PAM can be also defined as a generalized Application Programming Interface for authentication related services. Instead of re writing the code it is modified on its own.

Pam Module Interfaces

Auth: It is the module that is responsible for authentication purposes; it verifies the password.
Account: After the user has authenticated with correct credentials, account section checks for account validity like expiry or time login constraints etc.
Password: It is only used to change the password.
Session: It manages the sessions, contains account of user activity, creation of mailboxes, creates user’s home directory etc.

Tutorial

  1. To check if your application uses LINUX-PAM or not use the following command in your terminal:

    $ ldd /bin/su

    As we can see in line 2 of the output there exists an lipbpam.so file which confirms the query.

  2. The configuration of LINUX- PAM is in the directory /etc/pam.d/. Open the terminal of your Linux Operating system and go to the pam directory by typing the command:
    $ cd /etc/pam.d/

    This is the directory that contains other services that supports PAM. One can


    check the content by running the command $ ls   inside the directory of pam as shown in the above screenshot.

    if you don’t find sshd as a service that supports PAM, you have to install the sshd server.

    SSH(or secure shell) is an encrypted networking tool designed to allow different type of computers/users to login securely to various computers remotely over a network. You need to install the openssh-server package which you can do by running the following command in your terminal.

    $sudo  apt-get   install openssh-server

    It will install all the files and then you can reenter the pam directory and check for the services and see sshd has been added.

  3. Then type the following command. VIM is a text editor that opens plain text documents for the user to see, and edit.
    $vim sshd

    If you want to exit the vim editor and are unable to do so press the Esc key and colon (:) at the same time that puts you in the insert mode. After the colon type q and press enter. Here q stands for quit.

    You can scroll down and see all the modules that were described earlier with terms like required, include, requisite etc. What are those?

    They are called as the PAM Control Flags. Let us get into their details before diving into much more concepts of PAM services.

PAM Control Flags

  1. Required: Must pass to result success. It is the necessity that one can’t do without.
  2. Requisite: Must pass otherwise no further modules are run.
  3. Sufficient: It is ignored if fails. If this module is passed no further flags will be checked.
  4. Optional: It is often ignored. It is only used when there is only one module in interface.
  5. Include: It fetches all the lines from the other files.

Now the general rule to write the main configuration is as follows service type control-flag module module-arguments

  1. SERVICE: This is the name of the application. Suppose the name of your application is NUCUTA.
  2. TYPE: This is the type of module used. Suppose here the module used is authentication module.
  3. CONTROL-FLAG: This is the type of control flag used, one among the five types as describe before.
  4. MODULE: The absolute filename or the relative pathname of the PAM.
  5. MODULE-ARGUMENTS: It is the separate list of tokens to control module behavior.

Suppose you want to disable root user access to any kind of system via SSH, you need to restrict access to sshd service. Moreover, the login services are to be controlled access.

There are several modules that restrict the access and gives privileges but we can use the module /lib/security/pam_listfile.so which is extremely flexible and has many functionalities and privileges.

  1. Open and edit the file/application in the vim editor for the target service by entering into the /etc/pam.d/ directory first.

The following rule is to be added in both the files:

auth required pam_listfile.soonerr=succeed item=user sense=deny file=/etc/ssh/deniedusers

Where auth is the authentication module, required is the control flag, the pam_listfile.so module gives the deny privileges to the files, onerr=succeed is the module argument, item=user is another module argument that specifies file listings and the contents it must be checked for, sense=deny is another module argument that will if item is found in a file and file=/etc/ssh/deniedusers that specifies a type of file that only contains one item per line.

  1. Next create another file /etc/ssh/deniedusers and add root as the name in it. It can be done by following the command:
    $sudo vim /etc/ssh/deniedusers
  1. Then save the changes after adding root name to it and close the file.
  2. Use the chmod commond to change the access mode of the file. The syntax for the chmod command is
 chmod   [reference][operator][mode]  file

Here the references are used to specify a list of letters that indicates whom to give permission.

For example, here you can write the command:

$sudo   chmod   600  /etc/ssh/deniedusers

This works the simple way. You specify the users that are denied access to your file in the /etc/ssh/deniedusers file and set access mode for the file using the chmod command. From now on while trying to access the file due to this rule PAM will deny all the users listed in the /etc/ssh/deniedusers  file any access to the file.

Conclusion

PAM provides dynamic authentication support for applications and services in a Linux Operating System. This guide states a number of flags that can be used to determine the outcome of the result of a module. It’s convenient, and reliable. for users than the traditional password, and username authentication mechanism, and thus PAM is often used in many secured systems.

ONET IDC thành lập vào năm 2012, là công ty chuyên nghiệp tại Việt Nam trong lĩnh vực cung cấp dịch vụ Hosting, VPS, máy chủ vật lý, dịch vụ Firewall Anti DDoS, SSL… Với 10 năm xây dựng và phát triển, ứng dụng nhiều công nghệ hiện đại, ONET IDC đã giúp hàng ngàn khách hàng tin tưởng lựa chọn, mang lại sự ổn định tuyệt đối cho website của khách hàng để thúc đẩy việc kinh doanh đạt được hiệu quả và thành công.
Bài viết liên quan

Setup Pacman Mirrors on Arch Linux

In this article I will show you how to setup Pacman mirrors on Arch Linux. Let’s get started. What is an Arch Linux Mirror? Like...
28/12/2020

Tmux vs. Screen tool comparison

A Terminal multiplexer is a program that can be used to multiplex login sessions inside the Terminal. This allows users...
29/12/2020

Best Linux Projects for Newbies

Some people enjoy learning from books, and others like to gain knowledge and experience by working on interesting projects....
29/12/2020
Bài Viết

Bài Viết Mới Cập Nhật

Tìm Hiểu Về Thuê Proxy US – Lợi Ích và Cách Sử Dụng Hiệu Quả
11/12/2024

Mua Proxy V6 Nuôi Facebook Spam Hiệu Quả Tại Onetcomvn
03/06/2024

Hướng dẫn cách sử dụng ProxyDroid để duyệt web ẩn danh
03/06/2024

Mua proxy Onet uy tín tại Onet.com.vn
03/06/2024

Thuê mua IPv4 giá rẻ, tốc độ nhanh, uy tín #1
28/05/2024