Warren Jones wrote:
Our site has configured Active Directory so that an account is
temporarily locked after five consecutive failed login attempts.  This
works as expected when I authenticate from a Linux box running MIT
Kerberos 1.6.3.  However, I've noticed a change after updating to
version 1.7:  My account is now locked after a single failed login
attempt, using either kinit or pam_krb5.

Has anyone else run into this?

I've tried the following combinations:

   OS              MIT Kerberos   Results
   -------------   ------------   --------------------------------
   openSUSE 11.0   1.6.3-50.5     works as expected
   openSUSE 11.2   1.6.3-132.1    works as expected
   openSUSE 11.2   1.7-6.1        account locked after one failure
   openSUSE 11.2   1.7-15.1       account locked after one failure

Any insights will be much appreciated.

I had seen that during testing, and used the attached patch to get around it.




--

 Douglas E. Engert  <[email protected]>
 Argonne National Laboratory
 9700 South Cass Avenue
 Argonne, Illinois  60439
 (630) 252-5444
--- ./lib/krb5/krb/,get_in_tkt.c        Mon May 11 15:55:59 2009
+++ ./lib/krb5/krb/get_in_tkt.c Wed Oct 21 13:27:23 2009
@@ -483,7 +483,11 @@
     return 0;
 }
 
-#define MAX_IN_TKT_LOOPS 16
+/*
+ * DEE tmp fix to keep AD from turning off account
+ * #define MAX_IN_TKT_LOOPS 16
+ */
+#define MAX_IN_TKT_LOOPS 2
 static const krb5_enctype get_in_tkt_enctypes[] = {
     ENCTYPE_DES3_CBC_SHA1,
     ENCTYPE_ARCFOUR_HMAC,
________________________________________________
Kerberos mailing list           [email protected]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to