From mboxrd@z Thu Jan 1 00:00:00 1970 From: Steve Grubb Subject: Re: auditing account lockouts Date: Mon, 10 Oct 2011 10:13:05 -0400 Message-ID: <201110101013.06113.sgrubb@redhat.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: linux-audit@redhat.com List-Id: linux-audit@redhat.com On Monday, October 10, 2011 09:54:00 AM Steve M. Zak wrote: > Hi, > > Through experimentation and per Red Hat tech support when the deny=x switch > is set in /etc/pam.d/login as below > > auth required pam_tally2.so deny=5 onerr=fail > > the lockout happens at 5 failed attempts, but the audit trail does not > record it until the next try. The man page says that the account lockout occurs when the tally _exceeds_ the deny parameter. To lockout on 5 failed attempts, use deny=4. -Steve