I'd call that a bug that you should reoprt to the pam_tally author - this
case, you should file a bugzilla report with Red Hat since they distribute
the routine as part of the pam package.  A security policy implemented
correctly should not allow a user to gather information about correct or
incorrect passwords or usernames during a lockout phase.

    .../Ed

Ed Wilts
Mounds View, MN, USA
mailto:[EMAIL PROTECTED]
----- Original Message -----
From: "Andreas Hansson" <[EMAIL PROTECTED]>
> > A much better solution is that which is implemented by default in VMS -
> lock
> > the account for a random period of time - usually around 5 minutes - but
> > don't lock it permanently.  When the account is locked, accept all
> passwords,
> > even the correct one, and return a standard user authorization
failiure -
> the
> > same message, no matter if the account is locked, has an incorrect
> username,
> > or an incorrect password.  I do not know how this can be in Linux today,
> if at
> > all.
>
> I'm using pam_tally which lets you specify that accounts will be locked,
but
> the problem is that when an account is locked, the wrong password will
cause
> a delay of a second or two before the error is printed while the right
> password will cause no delay before printing the error. Thus you can
> brute-force the password while the account is locked and then use it after
> the account unlocks itself.
>
> Andreas





_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to