commit 0adac8de84a01ad32aeec4244f3221fa7076a682
Author: Andy Ning <email address hidden>
Date: Mon Jun 6 09:32:57 2022 -0400
Debian lockout user after 5 consecutive failed login
Current pam configuration allows user to login with correct
password right after 5 consecutive failed attempts. This change
updated pam configuration to ensure a lockout of the user for
5 mins after the 5 failed login.
Test Plan on Debian:
PASS: OS user lockout for 5 mins after 5 failed login attempts on
console.
PASS: OS user lockout for 5 mins after 5 failed login attempts on
ssh.
PASS: ldap user lockout for 5 mins after 5 failed login attempts on
console.
PASS: ldap user lockout for 5 mins after 5 failed login attempts on
ssh.
Closes-Bug: 1977876
Signed-off-by: Andy Ning <email address hidden>
Change-Id: I46b0bae1f6fb902318768a777855b09c938e4221
Reviewed: https:/ /review. opendev. org/c/starlingx /config- files/+ /845295 /opendev. org/starlingx/ config- files/commit/ 0adac8de84a01ad 32aeec4244f3221 fa7076a682
Committed: https:/
Submitter: "Zuul (22348)"
Branch: master
commit 0adac8de84a01ad 32aeec4244f3221 fa7076a682
Author: Andy Ning <email address hidden>
Date: Mon Jun 6 09:32:57 2022 -0400
Debian lockout user after 5 consecutive failed login
Current pam configuration allows user to login with correct
password right after 5 consecutive failed attempts. This change
updated pam configuration to ensure a lockout of the user for
5 mins after the 5 failed login.
Test Plan on Debian:
PASS: OS user lockout for 5 mins after 5 failed login attempts on
console.
PASS: OS user lockout for 5 mins after 5 failed login attempts on
ssh.
PASS: ldap user lockout for 5 mins after 5 failed login attempts on
console.
PASS: ldap user lockout for 5 mins after 5 failed login attempts on
ssh.
Closes-Bug: 1977876 2318768a777855b 09c938e4221
Signed-off-by: Andy Ning <email address hidden>
Change-Id: I46b0bae1f6fb90