sys-auth/pambase
PAM base configuration files
-
pambase-999999999caps debug elogind gnome-keyring homed minimal mktemp +nullok pam_krb5 pam_ssh +passwdqc pwhistory pwquality securetty selinux sha512 sssd systemd +yescrypt
View
Download
Browse License: MIT Overlay: gentoo -
pambase-20251104-r1~alpha ~amd64 ~arm ~arm64 ~hppa ~loong ~m68k ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86caps debug elogind gnome-keyring homed minimal mktemp +nullok pam_krb5 pam_ssh +passwdqc pwhistory pwquality securetty selinux sha512 sssd systemd +yescrypt
View
Download
Browse License: MIT Overlay: gentoo -
pambase-20251104~alpha amd64 arm arm64 ~hppa ~loong ~m68k ~mips ppc ppc64 ~riscv ~s390 ~sparc x86caps debug elogind gnome-keyring homed minimal mktemp +nullok pam_krb5 pam_ssh +passwdqc pwhistory pwquality securetty selinux +sha512 sssd systemd yescrypt
View
Download
Browse License: MIT Overlay: gentoo -
pambase-20251013~alpha amd64 arm arm64 ~hppa ~loong ~m68k ~mips ppc ppc64 ~riscv ~s390 ~sparc x86caps debug elogind gnome-keyring homed minimal mktemp +nullok pam_krb5 pam_ssh +passwdqc pwhistory pwquality securetty selinux +sha512 sssd systemd yescrypt
View
Download
Browse License: MIT Overlay: gentoo -
pambase-20250906~alpha amd64 arm arm64 ~hppa ~loong ~m68k ~mips ppc ppc64 ~riscv ~s390 ~sparc x86caps debug elogind gnome-keyring homed minimal mktemp +nullok pam_krb5 pam_ssh +passwdqc pwhistory pwquality securetty selinux +sha512 sssd systemd yescrypt
View
Download
Browse License: MIT Overlay: gentoo -
pambase-20250826~alpha amd64 arm arm64 ~hppa ~loong ~m68k ~mips ppc ppc64 ~riscv ~s390 ~sparc x86caps debug elogind gnome-keyring homed minimal mktemp +nullok pam_krb5 pam_ssh +passwdqc pwhistory pwquality securetty selinux +sha512 sssd systemd yescrypt
View
Download
Browse License: MIT Overlay: gentoo
USE Flags
caps
Global: Use Linux capabilities library to control privilege
debug
Global: Enable extra debug codepaths, like asserts and extra output. If you want to get meaningful backtraces see http://www.gentoo.org/proj/en/qa/backtraces.xml
Local: Enable debug information logging on syslog(3) for all the modules supporting this in the system authentication and system login stacks.
elogind
* This flag is undocumented *
gnome-keyring
Global: Enable support for storing passwords via gnome-keyring
Local: Enable pam_gnome_keyring module on system login stack. This enables proper Gnome Keyring access to logins, whether they are done with the login shell, a Desktop Manager or a remote login systems such as SSH.
homed
* This flag is undocumented *
minimal
Global: Install a very minimal build (disables, for example, plugins, fonts, most drivers, non-critical features)
mktemp
Global: Enable pam_mktemp module on system auth stack for session handling. This module creates a private temporary directory for the user, and sets TMP and TMPDIR accordingly.
Local: Enable pam_mktemp module on system auth stack for session handling. This module creates a private temporary directory for the user, and sets TMP and TMPDIR accordingly.
+nullok
* This flag is undocumented *
pam_krb5
* This flag is undocumented *
pam_ssh
* This flag is undocumented *
+passwdqc
* This flag is undocumented *
pwhistory
* This flag is undocumented *
pwquality
* This flag is undocumented *
securetty
* This flag is undocumented *
selinux
Global: !!internal use only!! Security Enhanced Linux support, this must be set by the selinux profile or breakage will occur
sha512
Global: Switch Linux-PAM's pam_unix module to use sha512 for passwords hashes rather than MD5. This option requires >=sys-libs/pam-1.0.1 built against >=sys-libs/glibc-2.7, if it's built against an earlier version, it will silently be ignored, and MD5 hashes will be used. All the passwords changed after this USE flag is enabled will be saved to the shadow file hashed using SHA512 function. The password previously saved will be left untouched. Please note that while SHA512-hashed passwords will still be recognised if the USE flag is removed, the shadow file will not be compatible with systems using an earlier glibc version.
Local: Switch Linux-PAM's pam_unix module to use sha512 for passwords hashes rather than MD5. This option requires >=sys-libs/pam-1.0.1 built against >=sys-libs/glibc-2.7, if it's built against an earlier version, it will silently be ignored, and MD5 hashes will be used. All the passwords changed after this USE flag is enabled will be saved to the shadow file hashed using SHA512 function. The password previously saved will be left untouched. Please note that while SHA512-hashed passwords will still be recognised if the USE flag is removed, the shadow file will not be compatible with systems using an earlier glibc version.
sssd
* This flag is undocumented *
systemd
* This flag is undocumented *
+yescrypt
* This flag is undocumented *
+sha512
* This flag is undocumented *
yescrypt
* This flag is undocumented *

