Zum Inhalt wechseln
Zum sekundären Inhalt wechseln

Tutorials from tor.eu

None of us is as smart as all of us. Eric Schmidt, 2009

Tutorials from tor.eu

Hauptmenü

  • Home
  • Networking
  • Programmierung
  • Server
  • Sonstige
  • Linux
  • Windows 7
  • Impressum

Schlagwort-Archive: Log

Ubuntu how to faillog

Veröffentlicht am 4. Juni 2013 von admin

Quelle: http://blog.bodhizazen.net/linux/ubuntu-how-to-faillog/

I cam across an interesting command – faillog

With faillog you can lock a user’s account after x number of failed log in attempts.

HOWEVER – it is not so straight forward – see man pam_tally

In order to enable this option you need to edit a few of the pam configuration files located in /etc/pam.d

What makes this confusing, as with sudo, THE ORDER OF RULES IS CRITICAL.

So, we can not just add a few lines at the bottom of the file, we need to add them in order

In particular, using any editor, open /etc/pam.d/common-auth and add the line AT THE TOP OF THE FILE:

auth required pam_tally.so per_user magic_root onerr=fail

Use the silent option if you do not want pam_tally to give error messages.

auth required pam_tally.so per_user magic_root onerr=fail silent

You may set the number of failed log in attempts and lock out time by either adding additional options to the above line or using faillog

sudo faillog -m 3

To unlock an account use

faillog -u login_name -r

Or set a time with the fail log command, the -l option sets the lock time.

faillog -m 3 -l 3600

Using faillog with ssh

Now to use this with ssh we need to also edit both /etc/pam.d/sshd and /etc/ssh/sshd_config

First, using any editor, open /etc/pam.d/sshd

Look for the line “@include common-auth” , we need to add auth required pam_tally.so per_user onerr=fail

auth required pam_tally.so per_user onerr=fail
@include common-auth

By adding this line before include common-auth we over ride the “magic_root” setting in common-auth.

Once a user is logged in, we need the magic_root option so that failed sudo attempts do not lock us out of root access. But because sshd runs as root, we need to over ride this option in /etc/pam.d/sshd – clear as mud ?

If it does not make sense, read the man pages, open a shell, and log in as root (so you do not loose root access), and test these options, see what happens when as your admin user you try sudo -i and ssh localhost.

Next, using any editor, open /etc/ssh/sshd_config

Change the “ChallengeResponseAuthentication no” to yes (in Ubuntu UsePAM yes was default).

ChallengeResponseAuthentication yes
UsePAM yes

If the pam_tally module locks your account, you will still be able to log in with ssh keys.

So it may be a good idea to make sure you have a working set of ssh keys before you enable this option 😉

Veröffentlicht unter Linux | Verschlagwortet mit Linux, Log, login atempts

Kategorien

  • Allgemein
  • DNSSEC
  • Linux
  • Networking
    • CCNA
  • Private
  • Programmierung
    • CMD
    • Oracle Datenbank
      • DDL
      • DML
    • Powershell
      • VLC Desktop Stream
  • Server
  • Sonstige
  • Windows 7
    • Office
      • Excel Makros

Neueste Beiträge

  • Corona Free Multiplayer Games
  • How to Download JW Player Videos on Chrome
  • NEXTCLOUD MIT SNAP AUF DEINEM LINUX SERVER INSTALLIEREN – UBUNTU
  • Solving Age of Empires II (AOE 2) Multiplayer Problems
  • Creating a multi hop SSH tunnel by chaining SSH commands and using a jump host

Schlagwörter

  • Apache
  • Backup
  • bash
  • Cisco
  • decrypt
  • developer
  • disable
  • easyTag
  • editiren
  • etherpad
  • Excel
  • fehlermeldung
  • firefox
  • forschungswerkstatt
  • host key
  • Intro
  • ipv6
  • java
  • Laravel
  • Linux
  • Log
  • Makro
  • manipulate
  • mp3
  • Musik
  • mysql
  • NAS
  • Oracle
  • password
  • PDF
  • php
  • port forwarding
  • python
  • regex
  • requests
  • selenium
  • sendmail
  • signal desktop
  • sql
  • Squid
  • ssh
  • sublime
  • Subprocess
  • USB
  • wget
Stolz präsentiert von WordPress