diff options
Diffstat (limited to 'loginutils')
-rw-r--r-- | loginutils/Config.in | 22 |
1 files changed, 18 insertions, 4 deletions
diff --git a/loginutils/Config.in b/loginutils/Config.in index 494ddbd..9b40871 100644 --- a/loginutils/Config.in +++ b/loginutils/Config.in @@ -55,7 +55,7 @@ config CONFIG_GETTY bool "getty" default n help - Please submit a patch to add help text for this item. + Getty lets you log in on a tty, it is normally invoked by init. config CONFIG_LOGIN bool "login" @@ -99,7 +99,7 @@ config CONFIG_VLOCK bool "vlock" default n help - Please submit a patch to add help text for this item. + Build the "vlock" applet, that allows you to lock (virtual) terminals. comment "Common options for adduser, deluser, login, su" depends on CONFIG_ADDUSER || CONFIG_DELUSER || CONFIG_LOGIN || CONFIG_SU @@ -109,14 +109,28 @@ config CONFIG_FEATURE_SHADOWPASSWDS default n depends on CONFIG_ADDUSER || CONFIG_DELUSER || CONFIG_LOGIN || CONFIG_SU help - Please submit a patch to add help text for this item. + Build support for shadow password in /etc/shadow. This file is only + only readable by root and thus the encrypted passwords are no longer + publicly readable. config CONFIG_USE_BB_SHADOW bool " Use busybox shadow password functions" default n depends on CONFIG_USE_BB_PWD_GRP && CONFIG_FEATURE_SHADOWPASSWDS help - Please submit a patch to add help text for this item. + If you leave this disabled, busybox will use the system's shadow + password handling functions. And if you are using the GNU C library + (glibc), you will then need to install the /etc/nsswitch.conf + configuration file and the required /lib/libnss_* libraries in + order for the shadow password functions to work. This generally + makes your embedded system quite a bit larger. + + Enabling this option will cause busybox to directly access the + system's /etc/shadow file when handling shadow passwords. This + makes your system smaller and I will get fewer emails asking about + how glibc NSS works). When this option is enabled, you will not be + able to use PAM to access shadow passwords from remote LDAP + password servers and whatnot. endmenu |