-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
configure faillock #3
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let's take this design over to the RTOS team and see if we can mainline it into the pam-faillock IPK, so that our only action in the script is to install that package.
I've encountered an issue with this. If I enable faillock exactly as done in this PR on top of the base system image, then it breaks niauth. In particular, you can no longer ssh into the target using niauth credentials. I don't know exactly why it breaks. How should I proceed?
|
I'm not fond of this option. We do have tests that install all packages in the core feed. That shouldn't cause the system to break. |
Repeating what we discussed at standup. I'm not surprised that faillock apparently doesn't work with niauth. I doubt it was ever tested to work or that customers use it. I don't see any reason to invest any time in making them compatible. If we're being prudent, it is worthwhile to run a quick test where you install the pam_faillock module into the PAM rules, using only the default configuration that a user would get from upstream. If that fails, then I think we have a very strong argument for marking this module as 'RCONFLICTS' with ni-auth and moving on with our lives. The configuration tool will install this after de-installing |
ca5a25f
to
fddd735
Compare
Signed-off-by: Alex Hearn <[email protected]>
fddd735
to
410c97e
Compare
Summary of Changes
add steps to configure-nilrt-snac that will install the faillock PAM plugin
Justification
pam-plugin-faillock will lock accounts after several failed attempts at authentication within a set time period.
Testing
I ran the script.
relevant output from configure-nilrt-snac:
I tested that accounts are locked after 3 failed tries by adding a user and then attempting to log in with an incorrect password 4 times.
Procedure