Communities

Writing
Writing
Codidact Meta
Codidact Meta
The Great Outdoors
The Great Outdoors
Photography & Video
Photography & Video
Scientific Speculation
Scientific Speculation
Cooking
Cooking
Electrical Engineering
Electrical Engineering
Judaism
Judaism
Languages & Linguistics
Languages & Linguistics
Software Development
Software Development
Mathematics
Mathematics
Christianity
Christianity
Code Golf
Code Golf
Music
Music
Physics
Physics
Linux Systems
Linux Systems
Power Users
Power Users
Tabletop RPGs
Tabletop RPGs
Community Proposals
Community Proposals
tag:snake search within a tag
answers:0 unanswered questions
user:xxxx search by author id
score:0.5 posts with 0.5+ score
"snake oil" exact phrase
votes:4 posts with 4+ votes
created:<1w created < 1 week ago
post_type:xxxx type of post
Search help
Notifications
Mark all as read See all your notifications »
Q&A

Increase incorrect login attempts before locking account

+3
−0

When I enter the login password incorrectly 3 times, my computer locks me out from attempting a login for 10 minutes. How can I increase the number of attempts?

History
Why does this post require moderator attention?
You might want to add some details to your flag.
Why should this post be closed?

0 comment threads

2 answers

+3
−0

Authentication events such as logging in are ultimately handled by PAM, the Linux Pluggable Authentication Modules project. PAM is very flexible and different Linux distributions will ship with different PAM configurations.

The Arch documentation describes how PAM is set up for Arch. In 2020, Arch switched to using the pam_faillock.so module to handle counting authentication failures (the previously-used module, pam_tally2.so, is deprecated). The man page for pam_faillock describes how it is to be configured, including a config file that lives by default at /etc/security/faillock.conf.

Users of other Linux distributions may not be using pam_faillock.so, but they are almost certainly using PAM. Consult the /etc/pam.d directory (or /etc/pam.conf file) to determine what modules are in effect for the service you're investigating, and then consult their man pages to determine how to configure them.

History
Why does this post require moderator attention?
You might want to add some details to your flag.

0 comment threads

+1
−0

This appears to be set by the option deny in /etc/security/faillock.conf.

History
Why does this post require moderator attention?
You might want to add some details to your flag.

0 comment threads

Sign up to answer this question »