1.\" Copyright (c) 2001 Mark R V Murray 2.\" All rights reserved. 3.\" Copyright (c) 2001 Networks Associates Technology, Inc. 4.\" All rights reserved. 5.\" 6.\" Portions of this software were developed for the FreeBSD Project by 7.\" ThinkSec AS and NAI Labs, the Security Research Division of Network 8.\" Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 9.\" ("CBOSS"), as part of the DARPA CHATS research program. 10.\" 11.\" Redistribution and use in source and binary forms, with or without 12.\" modification, are permitted provided that the following conditions 13.\" are met: 14.\" 1. Redistributions of source code must retain the above copyright 15.\" notice, this list of conditions and the following disclaimer. 16.\" 2. Redistributions in binary form must reproduce the above copyright 17.\" notice, this list of conditions and the following disclaimer in the 18.\" documentation and/or other materials provided with the distribution. 19.\" 3. The name of the author may not be used to endorse or promote 20.\" products derived from this software without specific prior written 21.\" permission. 22.\" 23.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 24.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 27.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33.\" SUCH DAMAGE. 34.\" 35.Dd December 5, 2001 36.Dt PAM_RHOSTS 8 37.Os 38.Sh NAME 39.Nm pam_rhosts 40.Nd Rhosts PAM module 41.Sh SYNOPSIS 42.Op Ar service-name 43.Ar module-type 44.Ar control-flag 45.Pa pam_rhosts 46.Op Ar options 47.Sh DESCRIPTION 48The rhosts authentication service module for PAM, 49.Nm 50provides functionality for only one PAM category: 51authentication. 52In terms of the 53.Ar module-type 54parameter, this is the 55.Dq Li auth 56feature. 57.Ss Rhosts Authentication Module 58The Rhosts authentication component 59.Pq Fn pam_sm_authenticate , 60returns success if and only if the target user's UID is not 0 and the 61remote host and user are listed in 62.Pa /etc/hosts.equiv 63or in the target user's 64.Pa ~/.rhosts . 65.Pp 66The following options may be passed to the authentication module: 67.Bl -tag -width ".Cm allow_root" 68.It Cm debug 69.Xr syslog 3 70debugging information at 71.Dv LOG_DEBUG 72level. 73.It Cm no_warn 74suppress warning messages to the user. 75These messages include reasons why the user's authentication attempt 76was declined. 77.It Cm allow_root 78do not automatically fail if the target user's UID is 0. 79.El 80.Sh SEE ALSO 81.Xr pam 3 , 82.Xr hosts.equiv 5 , 83.Xr pam.conf 5 84.Sh AUTHORS 85The 86.Nm 87module and this manual page were developed for the 88.Fx 89Project by 90ThinkSec AS and NAI Labs, the Security Research Division of Network 91Associates, Inc.\& under DARPA/SPAWAR contract N66001-01-C-8035 92.Pq Dq CBOSS , 93as part of the DARPA CHATS research program. 94