Lock user accounts after 50 rather than 100 failed login attempts.

https://forums.whonix.org/t/how-strong-do-linux-user-account-passwords-have-to-be-when-using-full-disk-encryption-fde-too/7698/19
This commit is contained in:
Patrick Schleizer 2019-11-25 01:39:53 -05:00
parent 6277db1383
commit aa5451c8cd
No known key found for this signature in database
GPG key ID: CB8D50BB77BB3C48
3 changed files with 4 additions and 4 deletions

View file

@ -54,7 +54,7 @@ fi
deny_line="$(cat /etc/pam.d/common-auth | grep deny=)"
## Example:
#auth requisite pam_tally2.so even_deny_root deny=100 onerr=fail audit debug
#auth requisite pam_tally2.so even_deny_root deny=50 onerr=fail audit debug
for word in $deny_line ; do
if echo "$word" | grep -q "deny=" ; then