Re: pam_tally with sshd: ssh password-based failures not tally'd

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 2005-01-06 at 16:25 +1100, George Hansper wrote:
> Hi,
> 
> I've been looking at pam_tally as a means of discouraging "brute force"
> ssh attacks. I have noticed, like Adam Monsen in a previous e-mail:
> 
>     http://www.redhat.com/archives/pam-list/2004-October/msg00047.html
> 
> that once the maximum password failures has been exceeded,
> SSH/PAM still give a clear indication of when you've cracked the right password.
> 
> If you give a bad password, you get a 2-second delay and a new prompt:
> 
>     dummy@localhost's password:
>     Permission denied, please try again.
>     dummy@localhost's password:
> 
> If you get it right, you get the message:
> 
>     dummy@localhost's password:
>     Read from remote host localhost: Connection reset by peer
>     Connection to localhost closed.
...
> Is there some configuration change I can make to pam/ssh which will
> fail a "locked" account in a consistant manner, regardless of whether
> or not the password is right?
> 
> Or is this already the subject of a bug-report/enhancement-request?

Yes, this is a long known bug. I'm just working on improving the module
so it will not have this problem.

-- 
Tomas Mraz <tmraz@xxxxxxxxxx>

_______________________________________________

Pam-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/pam-list

[Index of Archives]     [Fedora Users]     [Kernel]     [Red Hat Install]     [Linux for the blind]     [Gimp]

  Powered by Linux