Bug 659075
Summary: | pam_tally2 is not capable of control authorization | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 5 | Reporter: | John Bassford <john.bassford> |
Component: | pam | Assignee: | Tomas Mraz <tmraz> |
Status: | CLOSED NOTABUG | QA Contact: | BaseOS QE Security Team <qe-baseos-security> |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | 5.5 | ||
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | i386 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2010-12-01 21:12:46 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
John Bassford
2010-12-01 20:53:59 UTC
oops, the first portion should read. ... (ie: the pam_tally2 options of deny/unlock_time etc.. are not avialable in the account section of pam.) my apologies for the confusion. I'm sorry but this is on purpose. If the user's passwords are being attacked with some brute-forcing attempts, it does not break security of his public/private key pairs. So there is no reason why his public key sshd authentication should be blocked. |