Bug 328281
Summary: | Pam_tally audit option is defective | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 5 | Reporter: | Isaac W. <ibwilsonvt92> |
Component: | pam | Assignee: | Tomas Mraz <tmraz> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | low | ||
Version: | 5.0 | ||
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | RHBA-2008-0336 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2008-05-21 17:27:11 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Isaac W.
2007-10-11 19:58:38 UTC
Yes, audit option erroneously activates the even_deny_root option. With same version of PAM pam-0.99.6.2-3.14.el5 I have different comportment. I use following lines in my system-auth : auth sufficient /lib64/security/pam_unix.so try_first_pass likeauth md5 shadow auth required /lib64/security/pam_tally.so onerr=fail deny=3 auth required /lib64/security/pam_deny.so account required /lib64/security/pam_tally.so account sufficient /lib64/security/pam_unix.so account required /lib64/security/pam_deny.so Failled account increase counter like this : [root@home /tmp]# faillog -a Login Failures Maximum Latest On toto 5 0 10/18/07 13:30:23 +0000 pts/1 [root@home /tmp]# pam_tally User toto (500) has 5 But I can still logging in ! do su ... Same problem as in following email : http://www.redhat.com/archives/rhelv5-list/2007-July/msg00224.html I also tried option audit with pam_tally but it didn't lock out any account !! Can you confirm this BUG ? Remark : on RHEL4.2 pam_tally function correctly. (In reply to comment #2) > With same version of PAM pam-0.99.6.2-3.14.el5 I have different comportment. > > I use following lines in my system-auth : > auth sufficient /lib64/security/pam_unix.so try_first_pass likeauth > md5 shadow > auth required /lib64/security/pam_tally.so onerr=fail deny=3 > auth required /lib64/security/pam_deny.so > > account required /lib64/security/pam_tally.so > account sufficient /lib64/security/pam_unix.so > account required /lib64/security/pam_deny.so This is bad configuration. pam_tally must be placed before pam_unix in the auth section. Also it is completely unnecessary to put full path to module into the config file. Effectively, it was a stupid mistake due to "sufficient" in control field. Thank you. This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release. An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2008-0336.html |