vodkadrinker
Technical User
I am looking to lock the user for 180 seconds if they get 3 failed logins.
My system-auth-config is as follows:-
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth required pam_env.so
auth required pam_tally.so no_magic_root
auth sufficient pam_unix.so nullok try_first_pass
auth sufficient pam_plesk.so try_first_pass
auth requisite pam_succeed_if.so uid >= 500 quiet
auth required pam_deny.so
account required pam_unix.so
account required pam_tally.so deny=3 magic_root lock_time=180
account sufficient pam_succeed_if.so uid < 500 quiet
account required pam_permit.so
password requisite pam_cracklib.so try_first_pass retry=3
password optional pam_plesk.so try_first_pass
password sufficient pam_unix.so md5 shadow nullok try_first_pass use_authtok
password required pam_deny.so
session optional pam_keyinit.so revoke
session required pam_limits.so
session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session required pam_unix.so
Please can someone point me in the right direction, I thought adding this line would do what I required:-
account required pam_tally.so deny=3 magic_root lock_time=180
My system-auth-config is as follows:-
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth required pam_env.so
auth required pam_tally.so no_magic_root
auth sufficient pam_unix.so nullok try_first_pass
auth sufficient pam_plesk.so try_first_pass
auth requisite pam_succeed_if.so uid >= 500 quiet
auth required pam_deny.so
account required pam_unix.so
account required pam_tally.so deny=3 magic_root lock_time=180
account sufficient pam_succeed_if.so uid < 500 quiet
account required pam_permit.so
password requisite pam_cracklib.so try_first_pass retry=3
password optional pam_plesk.so try_first_pass
password sufficient pam_unix.so md5 shadow nullok try_first_pass use_authtok
password required pam_deny.so
session optional pam_keyinit.so revoke
session required pam_limits.so
session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session required pam_unix.so
Please can someone point me in the right direction, I thought adding this line would do what I required:-
account required pam_tally.so deny=3 magic_root lock_time=180