Displaying 20 results from an estimated 6000 matches similar to: "limiting authentication failures"
2011 Sep 19
6
64.31.19.48 attempt to break into my computer
>From my secure log:
Sep 19 01:16:44 lin12 dovecot-auth: pam_unix(dovecot:auth): check pass; user unknown
Sep 19 01:16:44 lin12 dovecot-auth: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser= rhost=::ffff:64.31.19.48
Sep 19 01:16:44 lin12 dovecot-auth: pam_succeed_if(dovecot:auth): error retrieving information about user aaron
Sep 19 01:16:45 lin12
2011 Apr 29
1
Can somebody explay the here down message lines from server Centos 5.6
**Unmatched Entries**
gdm[5342]: pam_succeed_if(gdm:auth): error retrieving information about user
gdm[5342]: pam_succeed_if(gdm:auth): error retrieving information about user
gdm[5342]: pam_succeed_if(gdm:auth): error retrieving information about user
9 gdm[5342]: pam_succeed_if(gdm:auth): error retrieving information about
user gdm[5342]: pam_succeed_if(gdm:auth): error retrieving
2019 Sep 25
1
Spam Blocking by filtering on username / id
Hi,
Sorry for the delay in replying. Been having a few mail problems ironically! Gmail smtp server stopped working!
On 23/09/2019 4:13 PM, Bernd Petrovitsch via dovecot wrote:
> It's not directly a solution within dovecot but "fail2ban" exists.
Yes, I have fail2ban, but that bans based on IP address. And most mail password attacks these days are distributed, and although
2013 May 19
4
security breach - ftp?
Hi,
I'm running Plesk 11.0.9 on a Centos 5.5.
A website on that box got hacked last week and malicious code got inserted
into some html/php files. So I went to find out what happened...
I found no back doors by using rkhunter or manually searching for
suspicious files in /tmp, etc. No activity at all in the php logs at the
time of the attack. I also analysed of course the system logs
2017 Feb 13
0
pam_tally2 after unlock time
Hi All,
I prepared a Centos 6.8 Minimal server, as part of hardening i added PAM
rules under system-auth and password-auth to lock the user account for 30
minutes after 3 failed login attempts.
############system-auth###############
auth required pam_tally2.so deny=3 unlock_time=1800
auth required pam_env.so
auth sufficient pam_unix.so
auth requisite
2010 Aug 23
1
Dovecot attack
It seems there was some kind of attack against dovecot on my server
(CentOS-5.5) with a hundred or so logwatch entries like:
=========================================
**Unmatched Entries**
dovecot-auth: pam_succeed_if(dovecot:auth):
error retrieving information about user admin
dovecot-auth: pam_succeed_if(dovecot:auth):
error retrieving information about user webmaster
2015 May 11
0
ldap host attribute is ignored
Hmmm...., i have made now a complete new install but the problem
persists: ldap authentication works, but the host attribute is ignored.
I have installed CentOS7 64bit with KDE.
I did not do any 'yum update' or install of extra packages so far.
these pam and ldap packages are installed:
openldap-devel-2.4.39-6.el7.x86_64
openssh-ldap-6.6.1p1-11.el7.x86_64
openldap-2.4.39-6.el7.x86_64
2008 Feb 20
0
samba, PAM and active directory
Hi,
I want that users can log on (SSH and console) a
Debian box can do it through Active Directory. I still
want that root user can log on (SSH and console) so I
created a wheel group for that.
I can log on successfully with all AD and root
users. However, I'd like to limit the AD users to the
technology domain group.
I've googled a lot:
2015 May 11
0
ldap host attribute is ignored
I am still not understanding why your using MD5? Is it because everyone in InfoSec declared that everyone finally went from md5 to sha512 or what?
-----Original Message-----
From: centos-bounces at centos.org [mailto:centos-bounces at centos.org] On Behalf Of Ulrich Hiller
Sent: Monday, May 11, 2015 1:40 PM
To: CentOS mailing list
Subject: Re: [CentOS] ldap host attribute is ignored
one more
2015 May 11
2
ldap host attribute is ignored
one more thing: firewalld service and selinux are deactivated.
On 05/11/2015 07:06 PM, Ulrich Hiller wrote:
> Hmmm...., i have made now a complete new install but the problem
> persists: ldap authentication works, but the host attribute is ignored.
>
> I have installed CentOS7 64bit with KDE.
> I did not do any 'yum update' or install of extra packages so far.
>
>
2015 Nov 04
0
ssh authentication with AD
Ok, do the following.
Remove all you modifications from pam so its back to original.
apt-get install krb5-ssh
restart ssh, try again.
Still not working?
Now try correct pam.
Type : pam-auth-update
Select kerberos winbind and unix ( and keep other defaults as is )
Type id username
You see a correct shell and correct and existing homedir?
Not, you missed the setting in windows, or set
2010 Feb 16
2
pam_mount
Hi all,
I am a bit confused about the usage of pam_mount.
Here is my /etc/pam.d/system-auth:
auth required pam_env.so
auth required pam_mount.so
auth sufficient pam_unix.so nullok try_first_pass
auth requisite pam_succeed_if.so uid >= 500 quiet
auth sufficient pam_krb5.so use_first_pass
auth required pam_deny.so
account
2012 May 31
1
Tangential Issue: idmap backend = ad and Active Directory 2008R2
Tried single quotes on Domain Admins in the pam.d file as well as a backslash on the space with no effect. I've found several references that just say "no spaces in group names." Is there really no way to do this?
Also, most references I find to using these lines in pam.d say that "sufficient" should work, but I'm finding that users in the named group can then log in
2015 May 09
0
ldap host attribute is ignored
On May 8, 2015, at 11:14 AM, Ulrich Hiller <hiller at mpia-hd.mpg.de> wrote:
>
> /etc/pam.d/system-auth:
> -----------------------
> #%PAM-1.0
> # This file is auto-generated.
> # User changes will be destroyed the next time authconfig is run.
> auth required pam_env.so
> auth sufficient pam_unix.so nullok try_first_pass
> auth
2015 Oct 08
0
Changing User password from ssh member server
On 08/10/15 18:59, Guilherme Boing wrote:
> Hi Rowland,
>
> This is a CentOS 6.7 server.
> I was able to make some progress. I have edited
> /etc/pam.d/system-auth, and now it looks like:
>
> auth required pam_env.so
> auth sufficient pam_unix.so nullok try_first_pass
> auth requisite pam_succeed_if.so uid >= 500 quiet
> auth
2014 Oct 29
1
samba ssh change password Error was: Wrong password
passwd: Authentication token manipulation error
smbpasswd: machine 127.0.0.1 rejected the password change: Error was :
Wrong Password
best regards
[FACILITY/btombul at samba ~]$ passwd
Changing password for user FACILITY/btombul.
Changing password for FACILITY/btombul
(current) NT password:
New password:
Retype new password:
passwd: Authentication token manipulation error
[FACILITY/btombul at
2015 Sep 07
0
rsync question
I tried your rsync command and it worked on my LAN over ssh.
The following was placed in the destination directory:
drwxr-x--- 2 root smmsp 4.0K Jul 28 21:05 named/
-rw-r----- 1 root smmsp 1.6K Oct 30 2013 named.conf
-rw-r--r-- 1 root smmsp 2.4K Jul 28 21:05 named.iscdlv.key
-rw-r----- 1 root smmsp 931 Jun 21 2007 named.rfc1912.zones
-rw-r--r-- 1 root smmsp 487 Jul 19 2010
2011 Jun 09
1
pam_succeed_if
Hi,
The default system-auth file for PAM on CentOS has the following auth
section:
auth required pam_env.so
auth sufficient pam_unix.so nullok try_first_pass
auth requisite pam_succeed_if.so uid >= 500 quiet
auth required pam_deny.so
What's the use of the pam_succeed_if line? It will only be reached if
the pam_unix doesn't succeed and from
2007 Aug 22
1
problem with poppassd
Dear All,
I have recently installed CentOS 5 and is workin perfect
i recently download n installed poppassd daemon ver 1.6a so as to let the
users to change their password
but when i try to change password i get the folling error
500 'BAD PASSWORD: it is based on a dictionary word'
i tried googlin arround and tried to play with
system-auth-ac file in /etc/pam.d but no use
my
2008 Oct 27
0
system-auth on CentOS 5.2
Hi al.I have a problem with pam.d authentication rules.
I searched on google and modified my system-auth file.Bu some rules
does not works properly
my system-auth like below:
--------------------------
auth required pam_env.so
auth required pam_tally.so onerr=fail per_user deny=3
auth sufficient pam_unix.so md5 nullok try_first_pass
auth requisite