Examine individual changes

From Gentoo Wiki
Abuse Filter navigation (Home | Recent filter changes | Examine past edits | Abuse log)
Jump to:navigation Jump to:search

This page allows you to examine the variables generated by the Abuse Filter for an individual change, and test it against filters.

Variables generated for this change

VariableValue
Edit count of the user (user_editcount)
109
Name of the user account (user_name)
'Zlogene'
Age of the user account (user_age)
192821623
Page ID (page_id)
115726
Page namespace (page_namespace)
510
Page title (without namespace) (page_title)
'PAM'
Full page title (page_prefixedtitle)
'Project:PAM'
Action (action)
'edit'
Edit summary/reason (summary)
'Add myself'
Whether or not the edit is marked as minor (no longer in use) (minor_edit)
true
Old page wikitext, before the edit (old_wikitext)
'{{Project |Name=Pluggable Authentication Method maintenance |Description=Pluggable Authentication Method is the main authentication method supported by Gentoo; the PAM maintenance project maintain the related software. |Email=pam-bugs@gentoo.org |ParentProject=Project:Base |PropagatesMembers=No |Members={{Project Member |Developer=User:Robbat2 |Role=Member |IsLead=No }} }} Pluggable Authentication Method is the main authentication method supported by Gentoo; the PAM maintenance project maintain the related software. == What is PAM == PAM stands for ''Pluggable Authentication Modules'', and refers to a framework for wrapping various low-level authentication methods and facilities in a single, mostly standardized API, originally designed and implemented by Sun Microsystems and, as of today, common for Linux distributions and other Unix and Unix-like operating systems (FreeBSD, NetBSD, Solaris, Apple Mac OS X, IBM AIX, HP-UX, etc.). PAM is a very flexible framework, allowing a wide range of different setups to be implemented, without having to add extra support in all the software that needs authentication capabilities. For instance, it's possible to get Dovecot (an IMAP server) to authenticate transparently against MySQL, PostgreSQL, LDAP, or system users, without having to add any specific code for that to Dovecot itself (on the other hand, Dovecot '''does''' implement specific code to authenticate users against various SQL databases, but that is another story). The drawback of such a flexible framework is that the system is quite complex and fragile, as there are three or four different pieces of software that are involved in authentication. For this reason, there are applications that even when providing PAM authentication support, also provide (or even prefer) alternative solutions, like specific authentication code for various databases and file formats, or even their own plug-ins for different authentication methods. As I said, there are three or four different pieces of software involved in authentication using PAM: ''the application authenticating'' (like Dovecot in the previous example), the <code>libpam</code> library (from now on ''the PAM implementation'' ), ''the PAM module'' (that might or might not be distributed with the PAM implementation), and eventually ''a backend service'' like an SQL database, LDAP or some other library used by the module. You can probably already understand that when we talk about the PAM implementation, we refer about one implementation of the PAM framework, that is not unique. There are, indeed, multiple PAM implementations: other than the proprietary ones provided by various operating systems, there are at least two main Free Software implementations, '''Linux-PAM''' (not to be fooled by the name, as this was used by FreeBSD 4.0, and still is used by Apple Mac OS X) released under double GPL-2/BSD-3 license, and '''OpenPAM''', developed for NetBSD, but also used by FreeBSD since 5.0 and (for a while at least) by ALTlinux. Albeit the two implementations are mostly API compatible (Linux-PAM provides some extra utility functions in a <code>libpam_misc</code> library), and at least in part ABI compatible, there are other differences too: Linux-PAM provides a set of default PAM modules, while OpenPAM does not provide but the two main modules ({{Path|pam_permit}} and {{Path|pam_deny}}). For this reason, OpenPAM requires at a minimum an extra software component: the modules themselves. Beside the default set of modules (if provided), there are a few extra modules to add support for authentication against software like MySQL, PostgreSQL, LDAP, and similar. These modules are the main flexibility feature of PAM framework, as it is possible to create modules to authenticate in new ways without redesigning the whole authentication support in the applications (like for instance smartcard or USB token authentication), for local services at least. Most of the modules, then, don't take care of authentication by themselves, but rely on backend software, either being a backend service like a database or LDAP server, or a library (like BDB). This increase complexity once again, as a bug, a regression or a file format change for such a service might break authentication for all the services configured to make use of it. This is for instance the case for BDB-based authentication: if the module changed the version of the library it links against, the old authentication database would be unusable. For further documentation about the maintenance of PAM packages, the handling of PAM-compatible packages in ebuilds, and the administration of PAM authentication, please refer to the resources offered by this project page. == Resources == Resources offered by the Gentoo PAM maintenance project include: * [[Project:PAM/Service files|Analysis of a PAM service configuration file]] * [[Project:PAM/Upgrade to 0.99|Linux-PAM 0.99 upgrade guide]] {{Migrated|originalauthors={{Dev|Flameeyes}}}}'
New page wikitext, after the edit (new_wikitext)
'{{Project |Name=Pluggable Authentication Method maintenance |Description=Pluggable Authentication Method is the main authentication method supported by Gentoo; the PAM maintenance project maintain the related software. |Email=pam-bugs@gentoo.org |ParentProject=Project:Base |PropagatesMembers=No |Members={{Project Member |Developer=User:Robbat2 |Role=Member |IsLead=No }}{{Project Member |Developer=User:Zlogene |Role=Member |IsLead=No }} }} Pluggable Authentication Method is the main authentication method supported by Gentoo; the PAM maintenance project maintain the related software. == What is PAM == PAM stands for ''Pluggable Authentication Modules'', and refers to a framework for wrapping various low-level authentication methods and facilities in a single, mostly standardized API, originally designed and implemented by Sun Microsystems and, as of today, common for Linux distributions and other Unix and Unix-like operating systems (FreeBSD, NetBSD, Solaris, Apple Mac OS X, IBM AIX, HP-UX, etc.). PAM is a very flexible framework, allowing a wide range of different setups to be implemented, without having to add extra support in all the software that needs authentication capabilities. For instance, it's possible to get Dovecot (an IMAP server) to authenticate transparently against MySQL, PostgreSQL, LDAP, or system users, without having to add any specific code for that to Dovecot itself (on the other hand, Dovecot '''does''' implement specific code to authenticate users against various SQL databases, but that is another story). The drawback of such a flexible framework is that the system is quite complex and fragile, as there are three or four different pieces of software that are involved in authentication. For this reason, there are applications that even when providing PAM authentication support, also provide (or even prefer) alternative solutions, like specific authentication code for various databases and file formats, or even their own plug-ins for different authentication methods. As I said, there are three or four different pieces of software involved in authentication using PAM: ''the application authenticating'' (like Dovecot in the previous example), the <code>libpam</code> library (from now on ''the PAM implementation'' ), ''the PAM module'' (that might or might not be distributed with the PAM implementation), and eventually ''a backend service'' like an SQL database, LDAP or some other library used by the module. You can probably already understand that when we talk about the PAM implementation, we refer about one implementation of the PAM framework, that is not unique. There are, indeed, multiple PAM implementations: other than the proprietary ones provided by various operating systems, there are at least two main Free Software implementations, '''Linux-PAM''' (not to be fooled by the name, as this was used by FreeBSD 4.0, and still is used by Apple Mac OS X) released under double GPL-2/BSD-3 license, and '''OpenPAM''', developed for NetBSD, but also used by FreeBSD since 5.0 and (for a while at least) by ALTlinux. Albeit the two implementations are mostly API compatible (Linux-PAM provides some extra utility functions in a <code>libpam_misc</code> library), and at least in part ABI compatible, there are other differences too: Linux-PAM provides a set of default PAM modules, while OpenPAM does not provide but the two main modules ({{Path|pam_permit}} and {{Path|pam_deny}}). For this reason, OpenPAM requires at a minimum an extra software component: the modules themselves. Beside the default set of modules (if provided), there are a few extra modules to add support for authentication against software like MySQL, PostgreSQL, LDAP, and similar. These modules are the main flexibility feature of PAM framework, as it is possible to create modules to authenticate in new ways without redesigning the whole authentication support in the applications (like for instance smartcard or USB token authentication), for local services at least. Most of the modules, then, don't take care of authentication by themselves, but rely on backend software, either being a backend service like a database or LDAP server, or a library (like BDB). This increase complexity once again, as a bug, a regression or a file format change for such a service might break authentication for all the services configured to make use of it. This is for instance the case for BDB-based authentication: if the module changed the version of the library it links against, the old authentication database would be unusable. For further documentation about the maintenance of PAM packages, the handling of PAM-compatible packages in ebuilds, and the administration of PAM authentication, please refer to the resources offered by this project page. == Resources == Resources offered by the Gentoo PAM maintenance project include: * [[Project:PAM/Service files|Analysis of a PAM service configuration file]] * [[Project:PAM/Upgrade to 0.99|Linux-PAM 0.99 upgrade guide]] {{Migrated|originalauthors={{Dev|Flameeyes}}}}'
Unified diff of changes made by edit (edit_diff)
'@@ -8,6 +8,10 @@ |Developer=User:Robbat2 |Role=Member |IsLead=No +}}{{Project Member +|Developer=User:Zlogene +|Role=Member +|IsLead=No }} }} Pluggable Authentication Method is the main authentication method supported by Gentoo; the PAM maintenance project maintain the related software. '
Old page size (old_size)
5015
Lines added in edit (added_lines)
[ 0 => '}}{{Project Member', 1 => '|Developer=User:Zlogene', 2 => '|Role=Member', 3 => '|IsLead=No' ]
Lines removed in edit (removed_lines)
[]
New page text, stripped of any markup (new_text)
' Pluggable Authentication Method maintenance Description Pluggable Authentication Method is the main authentication method supported by Gentoo; the PAM maintenance project maintain the related software. Project email pam-bugs@gentoo.org Lead(s) none No lead election date set Member(s) Robin Johnson (robbat2)Member Subproject(s)(and inherited member(s)) (none) Parent Project Gentoo Base System Project listing Pluggable Authentication Method is the main authentication method supported by Gentoo; the PAM maintenance project maintain the related software. What is PAM[edit] PAM stands for Pluggable Authentication Modules, and refers to a framework for wrapping various low-level authentication methods and facilities in a single, mostly standardized API, originally designed and implemented by Sun Microsystems and, as of today, common for Linux distributions and other Unix and Unix-like operating systems (FreeBSD, NetBSD, Solaris, Apple Mac OS X, IBM AIX, HP-UX, etc.). PAM is a very flexible framework, allowing a wide range of different setups to be implemented, without having to add extra support in all the software that needs authentication capabilities. For instance, it's possible to get Dovecot (an IMAP server) to authenticate transparently against MySQL, PostgreSQL, LDAP, or system users, without having to add any specific code for that to Dovecot itself (on the other hand, Dovecot does implement specific code to authenticate users against various SQL databases, but that is another story). The drawback of such a flexible framework is that the system is quite complex and fragile, as there are three or four different pieces of software that are involved in authentication. For this reason, there are applications that even when providing PAM authentication support, also provide (or even prefer) alternative solutions, like specific authentication code for various databases and file formats, or even their own plug-ins for different authentication methods. As I said, there are three or four different pieces of software involved in authentication using PAM: the application authenticating (like Dovecot in the previous example), the libpam library (from now on the PAM implementation ), the PAM module (that might or might not be distributed with the PAM implementation), and eventually a backend service like an SQL database, LDAP or some other library used by the module. You can probably already understand that when we talk about the PAM implementation, we refer about one implementation of the PAM framework, that is not unique. There are, indeed, multiple PAM implementations: other than the proprietary ones provided by various operating systems, there are at least two main Free Software implementations, Linux-PAM (not to be fooled by the name, as this was used by FreeBSD 4.0, and still is used by Apple Mac OS X) released under double GPL-2/BSD-3 license, and OpenPAM, developed for NetBSD, but also used by FreeBSD since 5.0 and (for a while at least) by ALTlinux. Albeit the two implementations are mostly API compatible (Linux-PAM provides some extra utility functions in a libpam_misc library), and at least in part ABI compatible, there are other differences too: Linux-PAM provides a set of default PAM modules, while OpenPAM does not provide but the two main modules (pam_permit and pam_deny). For this reason, OpenPAM requires at a minimum an extra software component: the modules themselves. Beside the default set of modules (if provided), there are a few extra modules to add support for authentication against software like MySQL, PostgreSQL, LDAP, and similar. These modules are the main flexibility feature of PAM framework, as it is possible to create modules to authenticate in new ways without redesigning the whole authentication support in the applications (like for instance smartcard or USB token authentication), for local services at least. Most of the modules, then, don't take care of authentication by themselves, but rely on backend software, either being a backend service like a database or LDAP server, or a library (like BDB). This increase complexity once again, as a bug, a regression or a file format change for such a service might break authentication for all the services configured to make use of it. This is for instance the case for BDB-based authentication: if the module changed the version of the library it links against, the old authentication database would be unusable. For further documentation about the maintenance of PAM packages, the handling of PAM-compatible packages in ebuilds, and the administration of PAM authentication, please refer to the resources offered by this project page. Resources[edit] Resources offered by the Gentoo PAM maintenance project include: Analysis of a PAM service configuration file Linux-PAM 0.99 upgrade guide This page is based on a document formerly found on our main website gentoo.org. The following people contributed to the original document: Diego Elio Pettenò (Flameeyes)They are listed here because wiki history does not allow for any external attribution. If you edit the wiki article, please do not add yourself here; your contributions are recorded on each article's associated history page. '
Parsed HTML source of the new revision (new_html)
'<table class="table table-condensed" style="width: 30em; font-size: 95%; border: 1px solid #ddd; background-color: #f9f9f9; color: black; margin-bottom: 0.5em; margin-left: 1em; padding: 0.2em; float: right; clear: right; text-align:left;"> <tr> <th style="text-align: center; background-color:#3E355A; color: white;" colspan="2"><big>Pluggable Authentication Method maintenance</big> </th></tr> <tr valign="top"> <th> Description </th> <td style="text-align: justify;"> Pluggable Authentication Method is the main authentication method supported by Gentoo; the PAM maintenance project maintain the related software. </td></tr> <tr> <th> <span title="Mails to member(s) listed below.">Project email</span> </th> <td> <a rel="nofollow" class="external text" href="mailto:pam-bugs@gentoo.org">pam-bugs@gentoo.org</a> </td></tr> <tr valign="top"> <th> Lead(s) </th> <td> none <br />No lead election date set </td></tr> <tr valign="top"> <th> Member(s) </th> <td> <ul><li><a href="/wiki/User:Robbat2" title="User:Robbat2">Robin Johnson</a> (robbat2)<br /><i>Member</i></li></ul> </td></tr> <tr valign="top"> <th> Subproject(s)<br /><small style="font-weight: normal;">(and inherited member(s))</small> </th> <td> (none) </td></tr> <tr> <th> Parent Project </th> <td> <a href="/wiki/Project:Base" title="Project:Base">Gentoo Base System</a> </td></tr> <tr> <td colspan="2" style="border-top: 1px solid #ddd; font-size: smaller; text-align: center;"><a href="/wiki/Project:Gentoo" title="Project:Gentoo">Project listing</a> </td></tr></table> <p>Pluggable Authentication Method is the main authentication method supported by Gentoo; the PAM maintenance project maintain the related software. </p> <h2><span class="mw-headline" id="What_is_PAM">What is PAM</span><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/index.php?title=Project:PAM&amp;action=edit&amp;section=1" title="Edit section: What is PAM">edit</a><span class="mw-editsection-bracket">]</span></span></h2> <p>PAM stands for <i>Pluggable Authentication Modules</i>, and refers to a framework for wrapping various low-level authentication methods and facilities in a single, mostly standardized API, originally designed and implemented by Sun Microsystems and, as of today, common for Linux distributions and other Unix and Unix-like operating systems (FreeBSD, NetBSD, Solaris, Apple Mac OS X, IBM AIX, HP-UX, etc.). </p><p>PAM is a very flexible framework, allowing a wide range of different setups to be implemented, without having to add extra support in all the software that needs authentication capabilities. For instance, it's possible to get Dovecot (an IMAP server) to authenticate transparently against MySQL, PostgreSQL, LDAP, or system users, without having to add any specific code for that to Dovecot itself (on the other hand, Dovecot <b>does</b> implement specific code to authenticate users against various SQL databases, but that is another story). </p><p>The drawback of such a flexible framework is that the system is quite complex and fragile, as there are three or four different pieces of software that are involved in authentication. For this reason, there are applications that even when providing PAM authentication support, also provide (or even prefer) alternative solutions, like specific authentication code for various databases and file formats, or even their own plug-ins for different authentication methods. </p><p>As I said, there are three or four different pieces of software involved in authentication using PAM: <i>the application authenticating</i> (like Dovecot in the previous example), the <code>libpam</code> library (from now on <i>the PAM implementation</i> ), <i>the PAM module</i> (that might or might not be distributed with the PAM implementation), and eventually <i>a backend service</i> like an SQL database, LDAP or some other library used by the module. </p><p>You can probably already understand that when we talk about the PAM implementation, we refer about one implementation of the PAM framework, that is not unique. There are, indeed, multiple PAM implementations: other than the proprietary ones provided by various operating systems, there are at least two main Free Software implementations, <b>Linux-PAM</b> (not to be fooled by the name, as this was used by FreeBSD 4.0, and still is used by Apple Mac OS X) released under double GPL-2/BSD-3 license, and <b>OpenPAM</b>, developed for NetBSD, but also used by FreeBSD since 5.0 and (for a while at least) by ALTlinux. </p><p>Albeit the two implementations are mostly API compatible (Linux-PAM provides some extra utility functions in a <code>libpam_misc</code> library), and at least in part ABI compatible, there are other differences too: Linux-PAM provides a set of default PAM modules, while OpenPAM does not provide but the two main modules (<span style="font-family: monospace; font-size: 95%">pam_permit</span> and <span style="font-family: monospace; font-size: 95%">pam_deny</span>). For this reason, OpenPAM requires at a minimum an extra software component: the modules themselves. </p><p>Beside the default set of modules (if provided), there are a few extra modules to add support for authentication against software like MySQL, PostgreSQL, LDAP, and similar. These modules are the main flexibility feature of PAM framework, as it is possible to create modules to authenticate in new ways without redesigning the whole authentication support in the applications (like for instance smartcard or USB token authentication), for local services at least. </p><p>Most of the modules, then, don't take care of authentication by themselves, but rely on backend software, either being a backend service like a database or LDAP server, or a library (like BDB). This increase complexity once again, as a bug, a regression or a file format change for such a service might break authentication for all the services configured to make use of it. This is for instance the case for BDB-based authentication: if the module changed the version of the library it links against, the old authentication database would be unusable. </p><p>For further documentation about the maintenance of PAM packages, the handling of PAM-compatible packages in ebuilds, and the administration of PAM authentication, please refer to the resources offered by this project page. </p> <h2><span class="mw-headline" id="Resources">Resources</span><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/index.php?title=Project:PAM&amp;action=edit&amp;section=2" title="Edit section: Resources">edit</a><span class="mw-editsection-bracket">]</span></span></h2> <p>Resources offered by the Gentoo PAM maintenance project include: </p> <ul><li> <a href="/wiki/Project:PAM/Service_files" title="Project:PAM/Service files">Analysis of a PAM service configuration file</a></li> <li> <a href="/wiki/Project:PAM/Upgrade_to_0.99" title="Project:PAM/Upgrade to 0.99">Linux-PAM 0.99 upgrade guide</a></li></ul> <hr /><small>This page is based on a document formerly found on our main website <a rel="nofollow" class="external text" href="https://www.gentoo.org/">gentoo.org</a>. <br />The following people contributed to the original document: <b><a href="/wiki/User:Flameeyes" title="User:Flameeyes">Diego Elio Pettenò (Flameeyes)</a></b><br /><span style="color: #555;">They are listed here because wiki history does not allow for any external attribution. If you edit the wiki article, please do <b>not</b> add yourself here; your contributions are recorded on each article's associated history page.</span></small> <!-- NewPP limit report Cached time: 20180930143601 Cache expiry: 86400 Dynamic content: false CPU time usage: 0.112 seconds Real time usage: 0.128 seconds Preprocessor visited node count: 209/1000000 Preprocessor generated node count: 1158/1000000 Post‐expand include size: 2766/2097152 bytes Template argument size: 504/2097152 bytes Highest expansion depth: 7/40 Expensive parser function count: 0/100 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 88.269 1 - -total 74.28% 65.569 1 - Template:Project 21.01% 18.541 1 - Template:Migrated 20.04% 17.690 1 - Template:ProjectMemberLine 17.71% 15.633 1 - Template:Dev 9.16% 8.083 1 - Template:ProjectMemberLineNickname 7.43% 6.557 2 - Template:Project_Member 3.73% 3.289 2 - Template:Path 3.08% 2.718 1 - Template:Dev/internal --> '
Unix timestamp of change (timestamp)
1538318161