You are not logged in.
Afternoon everyone,
I've recently finished setting up a new arch install after rebuilding my machine and I want to lock out users after 3 login attempts. I've done this before with Arch following this guide. However with the updates to PAM and the new config files I don't know how to make this happen anymore.
I found a thread that has a copy of a config file that might help me accomplish the user lockout but it is for Red Hat and I don't want to have any errors / extraneous entries in my pam config file.
my current /etc/pam.d/login file looks like this
#%PAM-1.0
auth required pam_securetty.so
auth requisite pam_nologin.so
auth include system-local-login
account include system-local-login
session include system-local-login
What should I add to lock out users after 3 login attempts?
Edit: Issue fixed by amending
/etc/pam.d/system-login
not
/etc/pam.d/login
Last edited by Anders H (2012-07-24 03:16:00)
Offline
Thanks I made the changes.
/etc/pam.d/system-login looks like this now
#%PAM-1.0
#auth required pam_tally.so onerr=succeed file=/var/log/faillog
auth required pam_shells.so
auth requisite pam_nologin.so
auth include system-auth
auth required pam_tally.so deny=2 unlock_time=600 onerr=succeed file=/var/log/faillog
account required pam_access.so
account required pam_nologin.so
account include system-auth
password include system-auth
session optional pam_loginuid.so
session required pam_env.so
session include system-auth
session optional pam_motd.so motd=/etc/motd
session optional pam_mail.so dir=/var/spool/mail standard
-session optional pam_ck_connector.so nox11
-session optional pam_systemd.so
Thanks I'll mark this as solved.
Can someone amend the wiki?
Offline
Hello!
It looks to me like it doesn't work with user "root".
Am I right or did I miss a fact?
If it doesn't work for "root", it seems useless to me to do that configuration.
Best regards
Andre
Offline