This is a discussion on Re: Account lockout support in Solaris 10 when authenticatingagainstKerberos - Kerberos ; Russ, Thanks for the help. That is th info I am looking for. Ming ----- Original Message ----- From: email@example.com To: firstname.lastname@example.org Sent: Mon Dec 10 20:45:49 2007 Subject: Re: Account lockout support in Solaris 10 when authenticating againstKerberos "Yu, ...
Thanks for the help.
That is th info I am looking for.
----- Original Message -----
Sent: Mon Dec 10 20:45:49 2007
Subject: Re: Account lockout support in Solaris 10 when authenticating againstKerberos
> But I am still not clear how to "lock out" account after n-times of
> failed login.
> Are you saying there is no way to do it in current version of MIT
Right, there's no way to do it at a Kerberos level. There are various
things that you can do within the service that's authenticating, but it
may require development on your part. (For example, if you're
authenticating the user via PAM, you could store the PAM failure count
somewhere and reject logins to that user once the failures reach a
particular threshold, something you could do without modifying anything
about how Kerberos works.)
Converting a failed authentication compromise into a denial of service
attack is generally a stupid idea, IMO. Far better to start rejecting
packets from a host that's apparently trying to do a dictionary attack.
Russ Allbery (email@example.com)
Kerberos mailing list Kerberos@mit.edu
Important Notice *************************************************
This e-mail may contain information that is confidential, privileged or otherwise protected from disclosure. If you are not an intended recipient of this e-mail, do not duplicate or redistribute it by any means. Please delete it and any attachments and notify the sender that you have received it in error. Unintended recipients are prohibited from taking action on the basis of information in this e-mail.E-mail messages may contain computer viruses or other defects, may not be accurately replicated on other systems, or may be intercepted, deleted or interfered with without the knowledge of the sender or the intended recipient. If you are not comfortable with the risks associated with e-mail messages, you may decide not to use e-mail to communicate with IPC. IPC reserves the right, to the extent and under circumstances permitted by applicable law, to retain, monitor and intercept e-mail messages to and from its systems.