rhel5.3修改pam,三次密码错误锁定账户
2009-03-11 17:33
423 查看
[root@trs ~]# cat /etc/pam.d/system-auth
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth required pam_env.so
auth sufficient pam_unix.so nullok try_first_pass
auth requisite pam_succeed_if.so uid >= 500 quiet
auth required pam_deny.so
auth required /lib/security/pam_tally.so onerr=fail no_magic_root
account required pam_unix.so
account sufficient pam_succeed_if.so uid < 500 quiet
account required pam_permit.so
account required /lib/security/pam_tally.so deny=5 no_magic_root reset
password requisite pam_cracklib.so try_first_pass retry=3
password sufficient pam_unix.so md5 shadow nullok try_first_pass use_authtok
password required pam_deny.so
session optional pam_keyinit.so revoke
session required pam_limits.so
session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session required pam_unix.so
只需要增加
auth required /lib/security/pam_tally.so onerr=fail no_magic_root
account required /lib/security/pam_tally.so deny=5 no_magic_root reset
日志显示
Mar 11 17:29:14 trs sshd[3930]: pam_unix(sshd:session): session opened for user root by (uid=0)
Mar 11 17:31:36 trs sshd[3974]: PAM unable to dlopen(/lib/security/pam_tally.so)
Mar 11 17:31:36 trs sshd[3974]: PAM [error: /lib/security/pam_tally.so: wrong ELF class: ELFCLASS32]
Mar 11 17:31:36 trs sshd[3974]: PAM adding faulty module: /lib/security/pam_tally.so
Mar 11 17:31:41 trs sshd[3974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.16.1.100 user=tt
Mar 11 17:31:43 trs sshd[3974]: Failed password for tt from 172.16.1.100 port 1728 ssh2
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth required pam_env.so
auth sufficient pam_unix.so nullok try_first_pass
auth requisite pam_succeed_if.so uid >= 500 quiet
auth required pam_deny.so
auth required /lib/security/pam_tally.so onerr=fail no_magic_root
account required pam_unix.so
account sufficient pam_succeed_if.so uid < 500 quiet
account required pam_permit.so
account required /lib/security/pam_tally.so deny=5 no_magic_root reset
password requisite pam_cracklib.so try_first_pass retry=3
password sufficient pam_unix.so md5 shadow nullok try_first_pass use_authtok
password required pam_deny.so
session optional pam_keyinit.so revoke
session required pam_limits.so
session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session required pam_unix.so
只需要增加
auth required /lib/security/pam_tally.so onerr=fail no_magic_root
account required /lib/security/pam_tally.so deny=5 no_magic_root reset
日志显示
Mar 11 17:29:14 trs sshd[3930]: pam_unix(sshd:session): session opened for user root by (uid=0)
Mar 11 17:31:36 trs sshd[3974]: PAM unable to dlopen(/lib/security/pam_tally.so)
Mar 11 17:31:36 trs sshd[3974]: PAM [error: /lib/security/pam_tally.so: wrong ELF class: ELFCLASS32]
Mar 11 17:31:36 trs sshd[3974]: PAM adding faulty module: /lib/security/pam_tally.so
Mar 11 17:31:41 trs sshd[3974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.16.1.100 user=tt
Mar 11 17:31:43 trs sshd[3974]: Failed password for tt from 172.16.1.100 port 1728 ssh2
相关文章推荐
- rhel5.3修改pam,三次密码错误锁定账户
- java web 开发 如何实现 输入密码三次错误 后 锁定账户功能。
- tp框架(thinkPHP)实现三次登陆密码错误之后锁定账号功能示例
- 2、对scott账户锁定、解锁及修改密码
- 关于ArcGIS10.0版本的SDE密码修改,账户锁定,SDE服务启动又停止等问题的解决
- centos7设置输入密码三次错误锁定账号
- 在域环境中客户端三次输入密码错误锁定方法(原创)
- tp框架中三次登陆密码错误之后锁定
- python密码错误三次锁定(实例讲解)
- 登录错误多次密码锁定账户一定时间之数据库建表参考
- python小练习之登录程序,登录三次错误之后锁定账户
- oracle修改账户锁定和密码的命令
- FreeBSD修改root密码错误passwd: pam_chau(www.111cn.net)thtok(): error in service module from:http://www.111cn.net/sys/freebsd/66713.htm
- 登录错误多次密码锁定账户一定时间之数据库建表参考
- WinXP系统设置锁定无效登录当密码输入多次错误便会锁定账户
- 用pam解决用户输入三次错误密码后禁止登陆系统,2分钟后自动解禁用户
- 百度联盟账号多次密码输入错误,账户被锁定的解决办法
- oracle修改密码及账户锁定
- ORA-28000:账户被锁定(密码输入错误多次用户自动被锁定)
- Python用户名密码登录系统(MD5加密并存入文件,三次输入错误将被锁定)及对字符串进行凯撒密码加解密操作