faillock.conf.5 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171
  1. '\" t
  2. .\" Title: faillock.conf
  3. .\" Author: [see the "AUTHOR" section]
  4. .\" Generator: DocBook XSL Stylesheets v1.79.1 <http://docbook.sf.net/>
  5. .\" Date: 09/03/2021
  6. .\" Manual: Linux-PAM Manual
  7. .\" Source: Linux-PAM Manual
  8. .\" Language: English
  9. .\"
  10. .TH "FAILLOCK\&.CONF" "5" "09/03/2021" "Linux-PAM Manual" "Linux\-PAM Manual"
  11. .\" -----------------------------------------------------------------
  12. .\" * Define some portability stuff
  13. .\" -----------------------------------------------------------------
  14. .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  15. .\" http://bugs.debian.org/507673
  16. .\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html
  17. .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  18. .ie \n(.g .ds Aq \(aq
  19. .el .ds Aq '
  20. .\" -----------------------------------------------------------------
  21. .\" * set default formatting
  22. .\" -----------------------------------------------------------------
  23. .\" disable hyphenation
  24. .nh
  25. .\" disable justification (adjust text to left margin only)
  26. .ad l
  27. .\" -----------------------------------------------------------------
  28. .\" * MAIN CONTENT STARTS HERE *
  29. .\" -----------------------------------------------------------------
  30. .SH "NAME"
  31. faillock.conf \- pam_faillock configuration file
  32. .SH "DESCRIPTION"
  33. .PP
  34. \fBfaillock\&.conf\fR
  35. provides a way to configure the default settings for locking the user after multiple failed authentication attempts\&. This file is read by the
  36. \fIpam_faillock\fR
  37. module and is the preferred method over configuring
  38. \fIpam_faillock\fR
  39. directly\&.
  40. .PP
  41. The file has a very simple
  42. \fIname = value\fR
  43. format with possible comments starting with
  44. \fI#\fR
  45. character\&. The whitespace at the beginning of line, end of line, and around the
  46. \fI=\fR
  47. sign is ignored\&.
  48. .SH "OPTIONS"
  49. .PP
  50. \fBdir=\fR\fB\fI/path/to/tally\-directory\fR\fR
  51. .RS 4
  52. The directory where the user files with the failure records are kept\&. The default is
  53. /var/run/faillock\&.
  54. .RE
  55. .PP
  56. \fBaudit\fR
  57. .RS 4
  58. Will log the user name into the system log if the user is not found\&.
  59. .RE
  60. .PP
  61. \fBsilent\fR
  62. .RS 4
  63. Don\*(Aqt print informative messages to the user\&. Please note that when this option is not used there will be difference in the authentication behavior for users which exist on the system and non\-existing users\&.
  64. .RE
  65. .PP
  66. \fBno_log_info\fR
  67. .RS 4
  68. Don\*(Aqt log informative messages via
  69. \fBsyslog\fR(3)\&.
  70. .RE
  71. .PP
  72. \fBlocal_users_only\fR
  73. .RS 4
  74. Only track failed user authentications attempts for local users in /etc/passwd and ignore centralized (AD, IdM, LDAP, etc\&.) users\&. The
  75. \fBfaillock\fR(8)
  76. command will also no longer track user failed authentication attempts\&. Enabling this option will prevent a double\-lockout scenario where a user is locked out locally and in the centralized mechanism\&.
  77. .RE
  78. .PP
  79. \fBnodelay\fR
  80. .RS 4
  81. Don\*(Aqt enforce a delay after authentication failures\&.
  82. .RE
  83. .PP
  84. \fBdeny=\fR\fB\fIn\fR\fR
  85. .RS 4
  86. Deny access if the number of consecutive authentication failures for this user during the recent interval exceeds
  87. \fIn\fR\&. The default is 3\&.
  88. .RE
  89. .PP
  90. \fBfail_interval=\fR\fB\fIn\fR\fR
  91. .RS 4
  92. The length of the interval during which the consecutive authentication failures must happen for the user account lock out is
  93. \fIn\fR
  94. seconds\&. The default is 900 (15 minutes)\&.
  95. .RE
  96. .PP
  97. \fBunlock_time=\fR\fB\fIn\fR\fR
  98. .RS 4
  99. The access will be re\-enabled after
  100. \fIn\fR
  101. seconds after the lock out\&. The value 0 has the same meaning as value
  102. \fInever\fR
  103. \- the access will not be re\-enabled without resetting the faillock entries by the
  104. \fBfaillock\fR(8)
  105. command\&. The default is 600 (10 minutes)\&.
  106. .sp
  107. Note that the default directory that
  108. \fIpam_faillock\fR
  109. uses is usually cleared on system boot so the access will be also re\-enabled after system reboot\&. If that is undesirable a different tally directory must be set with the
  110. \fBdir\fR
  111. option\&.
  112. .sp
  113. Also note that it is usually undesirable to permanently lock out users as they can become easily a target of denial of service attack unless the usernames are random and kept secret to potential attackers\&.
  114. .RE
  115. .PP
  116. \fBeven_deny_root\fR
  117. .RS 4
  118. Root account can become locked as well as regular accounts\&.
  119. .RE
  120. .PP
  121. \fBroot_unlock_time=\fR\fB\fIn\fR\fR
  122. .RS 4
  123. This option implies
  124. \fBeven_deny_root\fR
  125. option\&. Allow access after
  126. \fIn\fR
  127. seconds to root account after the account is locked\&. In case the option is not specified the value is the same as of the
  128. \fBunlock_time\fR
  129. option\&.
  130. .RE
  131. .PP
  132. \fBadmin_group=\fR\fB\fIname\fR\fR
  133. .RS 4
  134. If a group name is specified with this option, members of the group will be handled by this module the same as the root account (the options
  135. \fBeven_deny_root\fR
  136. and
  137. \fBroot_unlock_time\fR
  138. will apply to them\&. By default the option is not set\&.
  139. .RE
  140. .SH "EXAMPLES"
  141. .PP
  142. /etc/security/faillock\&.conf file example:
  143. .sp
  144. .if n \{\
  145. .RS 4
  146. .\}
  147. .nf
  148. deny=4
  149. unlock_time=1200
  150. silent
  151. .fi
  152. .if n \{\
  153. .RE
  154. .\}
  155. .SH "FILES"
  156. .PP
  157. /etc/security/faillock\&.conf
  158. .RS 4
  159. the config file for custom options
  160. .RE
  161. .SH "SEE ALSO"
  162. .PP
  163. \fBfaillock\fR(8),
  164. \fBpam_faillock\fR(8),
  165. \fBpam.conf\fR(5),
  166. \fBpam.d\fR(5),
  167. \fBpam\fR(8)
  168. .SH "AUTHOR"
  169. .PP
  170. pam_faillock was written by Tomas Mraz\&. The support for faillock\&.conf was written by Brian Ward\&.