Comment 2 for bug 1977876

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to config-files (master)

Reviewed: https://review.opendev.org/c/starlingx/config-files/+/845295
Committed: https://opendev.org/starlingx/config-files/commit/0adac8de84a01ad32aeec4244f3221fa7076a682
Submitter: "Zuul (22348)"
Branch: master

commit 0adac8de84a01ad32aeec4244f3221fa7076a682
Author: Andy Ning <email address hidden>
Date: Mon Jun 6 09:32:57 2022 -0400

    Debian lockout user after 5 consecutive failed login

    Current pam configuration allows user to login with correct
    password right after 5 consecutive failed attempts. This change
    updated pam configuration to ensure a lockout of the user for
    5 mins after the 5 failed login.

    Test Plan on Debian:
    PASS: OS user lockout for 5 mins after 5 failed login attempts on
          console.
    PASS: OS user lockout for 5 mins after 5 failed login attempts on
          ssh.
    PASS: ldap user lockout for 5 mins after 5 failed login attempts on
          console.
    PASS: ldap user lockout for 5 mins after 5 failed login attempts on
          ssh.

    Closes-Bug: 1977876
    Signed-off-by: Andy Ning <email address hidden>
    Change-Id: I46b0bae1f6fb902318768a777855b09c938e4221