Comment 2 for bug 1977553

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to config-files (master)

Reviewed: https://review.opendev.org/c/starlingx/config-files/+/845163
Committed: https://opendev.org/starlingx/config-files/commit/d31ed71ae0a43d4824dcf892fd00d28a45a5d6ca
Submitter: "Zuul (22348)"
Branch: master

commit d31ed71ae0a43d4824dcf892fd00d28a45a5d6ca
Author: Andy Ning <email address hidden>
Date: Fri Jun 3 13:28:00 2022 -0400

    CentOS lockout user after 5 consecutive failed login

    Current pam configuration allows user to login with correct
    password right after 5 consecutive failed attempts. This change
    updated pam configuration to ensure a lockout of the user for
    5 mins after the 5 failed login.

    Test Plan on CentOS:
    PASS: OS user lockout for 5 mins after 5 failed login attempts on
          console.
    PASS: OS user lockout for 5 mins after 5 failed login attempts on
          ssh.
    PASS: ldap user lockout for 5 mins after 5 failed login attempts on
          console.
    PASS: ldap user lockout for 5 mins after 5 failed login attempts on
          ssh.

    Closes-Bug: 1977553
    Signed-off-by: Andy Ning <email address hidden>
    Change-Id: I186b0a1c45035cb1c6059262d8c8c2ae87670dbd