Bug 712908 - pam_tally2.so failures not resetting
Summary: pam_tally2.so failures not resetting
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: pam
Version: 6.1
Hardware: x86_64
OS: Linux
unspecified
medium
Target Milestone: rc
: ---
Assignee: Tomas Mraz
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-06-13 14:54 UTC by smcbrien
Modified: 2011-06-13 17:02 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-06-13 17:02:57 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description smcbrien 2011-06-13 14:54:25 UTC
Description of problem:
pam_tally2.so failures are not resetting upon successful login


Version-Release number of selected component (if applicable):
1.1.1-8.el6

How reproducible:
Always

Steps to Reproduce:
1.Here's my system-auth:
auth        required      pam_env.so
auth        required      pam_tally2.so onerr=fail deny=10 unlock_time=900
auth        sufficient    pam_fprintd.so
auth        sufficient    pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        required      pam_deny.so

account     required      pam_unix.so
account     required      pam_tally2.so
account     sufficient    pam_localuser.so
account     sufficient    pam_succeed_if.so uid < 500 quiet
account     required      pam_permit.so

2. Purposely borking logins causes pam_tally2.so to increase the failed login attempts
[root@somehost ~]# pam_tally2 -u smcbrien
Login           Failures Latest failure     From
smcbrien            6    06/13/11 10:25:46  /dev/pts/1

3. However after a successful login I expect to see the count return to a 0 since I have pam_tally2.so listed in the 'account' rules.  But no.

[root@somehost ~]# pam_tally2 -u smcbrien
Login           Failures Latest failure     From
smcbrien            6    06/13/11 10:25:46  /dev/pts/1

  
Actual results:
Unsuccessful logins are never cleaned upon a successful login.


Expected results:
A successful login should wipe out any failed login attempts, assuming the user is under the deny=limit set in the auth rule

Additional info:

Comment 2 Tomas Mraz 2011-06-13 15:14:54 UTC
I cannot reproduce this behavior, it resets the tally count normally on my testing install.

What kind of login do you try? The text console login or gdm, or ?

Comment 3 smcbrien 2011-06-13 16:26:01 UTC
I'm using ssh to login. I see my problem.  In RHEL6, sshd does not use system-auth, it uses password-auth, which doesn't have my pam_tally2.so rules in it.

False alarm.

Any reason to move away from system-auth?

-Scott

Comment 4 Tomas Mraz 2011-06-13 17:02:57 UTC
system-auth integrates modules that are usable on local system only - such as the pam_fprintd in your configuration or pam_pkcs11 for smartcards. SSHD cannot use these modules. See also man system-auth-ac.


Note You need to log in before you can comment on or make changes to this bug.