From 7f3caba522f4d24764f29d83aa2de9198bb7f01c Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Fri, 24 May 2024 06:52:22 +0200 Subject: Adding upstream version 6.8. Signed-off-by: Daniel Baumann --- man5/securetty.5 | 35 ----------------------------------- 1 file changed, 35 deletions(-) delete mode 100644 man5/securetty.5 (limited to 'man5/securetty.5') diff --git a/man5/securetty.5 b/man5/securetty.5 deleted file mode 100644 index d1ffbaa..0000000 --- a/man5/securetty.5 +++ /dev/null @@ -1,35 +0,0 @@ -.\" Copyright (c) 1993 Michael Haardt (michael@moria.de), -.\" Fri Apr 2 11:32:09 MET DST 1993 -.\" -.\" SPDX-License-Identifier: GPL-2.0-or-later -.\" -.\" Modified Sun Jul 25 11:06:27 1993 by Rik Faith (faith@cs.unc.edu) -.TH securetty 5 2023-10-31 "Linux man-pages 6.7" -.SH NAME -securetty \- list of terminals on which root is allowed to login -.SH DESCRIPTION -The file -.I /etc/securetty -contains the names of terminals -(one per line, without leading -.IR /dev/ ) -which are considered secure for the transmission of certain authentication -tokens. -.P -It is used by (some versions of) -.BR login (1) -to restrict the terminals -on which root is allowed to login. -See -.BR login.defs (5) -if you use the shadow suite. -.P -On PAM enabled systems, it is used for the same purpose by -.BR pam_securetty (8) -to restrict the terminals on which empty passwords are accepted. -.SH FILES -.I /etc/securetty -.SH SEE ALSO -.BR login (1), -.BR login.defs (5), -.BR pam_securetty (8) -- cgit v1.2.3