Lock user accounts after 50 rather than 100 failed login attempts.

https://forums.whonix.org/t/how-strong-do-linux-user-account-passwords-have-to-be-when-using-full-disk-encryption-fde-too/7698/19
This commit is contained in:
Patrick Schleizer 2019-11-25 01:39:53 -05:00
parent 6277db1383
commit aa5451c8cd
No known key found for this signature in database
GPG Key ID: CB8D50BB77BB3C48
3 changed files with 4 additions and 4 deletions

2
debian/control vendored
View File

@ -151,7 +151,7 @@ Description: enhances misc security settings
* Abort login for users with locked passwords.
/usr/lib/security-misc/pam-abort-on-locked-password
.
* Lock user accounts after 100 failed login attempts using pam_tally2.
* Lock user accounts after 50 failed login attempts using pam_tally2.
/usr/share/pam-configs/tally2-security-misc
.
* Logging into the root account from a virtual, serial, whatnot console is

View File

@ -54,7 +54,7 @@ fi
deny_line="$(cat /etc/pam.d/common-auth | grep deny=)"
## Example:
#auth requisite pam_tally2.so even_deny_root deny=100 onerr=fail audit debug
#auth requisite pam_tally2.so even_deny_root deny=50 onerr=fail audit debug
for word in $deny_line ; do
if echo "$word" | grep -q "deny=" ; then

View File

@ -1,10 +1,10 @@
Name: lock accounts after 100 failed authentication attempts (by package security-misc)
Name: lock accounts after 50 failed authentication attempts (by package security-misc)
Default: yes
Priority: 260
Auth-Type: Primary
Auth:
optional pam_exec.so debug stdout seteuid /usr/lib/security-misc/pam_tally2-info
requisite pam_tally2.so even_deny_root deny=100 onerr=fail audit debug
requisite pam_tally2.so even_deny_root deny=50 onerr=fail audit debug
Account-Type: Primary
Account:
requisite pam_tally2.so debug