diff options
Diffstat (limited to 'source/n')
-rwxr-xr-x | source/n/openssh/openssh.SlackBuild | 2 | ||||
-rw-r--r-- | source/n/openssh/sshd.pam | 13 |
2 files changed, 9 insertions, 6 deletions
diff --git a/source/n/openssh/openssh.SlackBuild b/source/n/openssh/openssh.SlackBuild index 3c614d877..3a423c91f 100755 --- a/source/n/openssh/openssh.SlackBuild +++ b/source/n/openssh/openssh.SlackBuild @@ -30,7 +30,7 @@ PKG=$TMP/package-openssh PKGNAM=openssh VERSION=${VERSION:-$(echo openssh-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)} -BUILD=${BUILD:-1} +BUILD=${BUILD:-2} NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "} diff --git a/source/n/openssh/sshd.pam b/source/n/openssh/sshd.pam index 570412d68..dcf1ff3fd 100644 --- a/source/n/openssh/sshd.pam +++ b/source/n/openssh/sshd.pam @@ -4,13 +4,16 @@ # need to add additional consoles to /etc/securetty if you want to allow # root logins on them, such as: ssh, pts/0, :0, etc #auth required pam_securetty.so -# To set a limit on failed authentications, the pam_tally2 module -# can be enabled. See pam_tally2(8) for options. -#auth required pam_tally2.so deny=4 unlock_time=1200 +# When using pam_faillock, print a message to the user if the account is +# locked. This lets the user know what is going on, but it also potentially +# gives additional information to attackers: +#auth requisite pam_faillock.so preauth auth include system-auth +# To set a limit on failed authentications, the pam_faillock module +# can be enabled. See pam_faillock(8) for more information. +#auth [default=die] pam_faillock.so authfail +#auth sufficient pam_faillock.so authsucc auth include postlogin -# Also uncomment this line to use pam_tally2: -#account required pam_tally2.so account required pam_nologin.so account include system-auth password include system-auth |