# vim /etc/zypp/zypp.conf
添加以下内容:
......
gpgcheck=0
# vim /etc/zypp/zypp.conf
添加以下内容:
......
gpgcheck=0
openSUSE & SLES 的 PAM 文件默认是一些软链接,指向另一个文件:
/etc/pam.d/common-account --> /etc/pam.d/common-account-pc
/etc/pam.d/common-auth --> /etc/pam.d/common-auth-pc
/etc/pam.d/common-password --> /etc/pam.d/common-password-pc
/etc/pam.d/common-session --> /etc/pam.d/common-session-pc
而当 openSUSE & SLES 升级 pam-config 软件包时可能会自动刷新以下文件:
/etc/pam.d/common-account-pc
/etc/pam.d/common-auth-pc
/etc/pam.d/common-password-pc
/etc/pam.d/common-session-pc
所以,如果 openSUSE & SLES 的 PAM 文件是一些单独的文件,不指向后缀以 -pc 结尾的文件的软链接,那么里面的内容就不会被自动刷新
# ll /etc/pam.d/common-account
# ll /etc/pam.d/common-auth
# ll /etc/pam.d/common-password
# ll /etc/pam.d/common-session
# rm /etc/pam.d/common-{account,auth,password,session}
# cp /etc/pam.d/common-account-pc /etc/pam.d/common-account
# cp /etc/pam.d/common-auth-pc /etc/pam.d/common-auth
# cp /etc/pam.d/common-password-pc /etc/pam.d/common-password
# cp /etc/pam.d/common-session-pc /etc/pam.d/common-session
# ll /etc/pam.d/common-account
# ll /etc/pam.d/common-auth
# ll /etc/pam.d/common-password
# ll /etc/pam.d/common-session
(步骤略)
https://www.suse.com/support/kb/doc/?id=000018934
# cat /etc/crypto-policies/back-ends/krb5.config
aes128-cts-hmac-sha256-128 aes256-cts-hmac-sha384-192
(补充:从这里的输出结果可以看出,目前使用的后台加密方式有 aes128-cts-hmac-sha256-128 aes256-cts-hmac-sha384-192)
# vi /etc/crypto-policies/back-ends/krb5.config
error: can't create transaction lock on /usr/lib/sysimage/rpm/.rpm.lock (Resource temporarily unavailable)
# rm -rf /var/lib/rpm/_db*
# rpm --rebuilddb
# zypper refresh
auditd 只能监控比它后启动的进程,恶意软件如果比它先启动则无法被其监控
在这一行里:
GRUB_CMDLINE_LINUX="......"
添加:
GRUB_CMDLINE_LINUX="...... audit=1"
# grub2-mkconfig -o /boot/grub2/grub.cfg
https://access.redhat.com/solutions/971883