Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Hi.I want to prevent brute force attacks(password guessing)
on my system.account lockout threshold should basically specify the number of invalid logon attempts (eg:5)and then the account should be locked out.
Can i get a more detailed explanation plz.what is it that you want me to check in hosts.deny.when i opened the file,i found nothing there.
sorry to say this but i feel my mail was not read completely.when we don't explain the problem in detail,u complain.i had not just one but two issues there.
I am running Slackware 10.2. There are entries for LOGIN_RETRIES (Max number of login retries if password is bad) /etc/login.defs. I am willing to bet it is in yours too.
Since Fedora uses PAM, you might want to google for "set max login retries,PAM".
Or you might want to read the man page for login.
Code:
User Commands login(1)
SLEEPTIME
If present, sets the number of seconds to wait
before the login failure message is printed to
the screen. This is for any login failure other
than PAM_ABORT. Another login attempt is
allowed, providing RETRIES has not been reached
or the PAM framework is returned PAM_MAXTRIES.
Default is 4 seconds. Minimum is 0 seconds. Max-
imum is 5 seconds.
RETRIES
Sets the number of retries for logging in (see
pam(3PAM)). The default is 5.
SYSLOG_FAILED_LOGINS
Used to determine how many failed login attempts
will be allowed by the system before a failed
login message is logged, using the syslog(3C)
LOG_NOTICE facility. For example, if the vari-
able is set to 0, login will log all failed
login attempt
Quote:
Originally Posted by moinpasha
Guys my question is still unanswered.will i be getting any help here???
Usually when someone does not take the time too google and then get pushy, I say screw then and ignor the thread. Just in case you have not noticed. Non of us get paid here. You do not have to pay to post threads here. So, you should be more respectful when posting here. Strait up, no one here owes you anything. Especially, doing your google research.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.