On 10/19/12 12:23 PM, Andrew Gilmore wrote:
So in digging through all this, I'm finding a couple of things that either aren't working right or that will require alterations to my current configuration to comply.

Where do I ask the following questions? It seems that this group isn't the place, but my google-fu is coming up short.

gov-sec is a great place. It's a community group of security interested parties running RHEL. Mailing list here:
http://www.redhat.com/mailman/listinfo/gov-sec

Note that we (Red Hat) moderate the list to ensure only U.S. customers join. If you do send a request to join give your primary Red Hat contact a heads up to ensure you don't get rejected (if you don't know who that is, feel free to ping me so I can pass your name/email to the list moderator).

And if you have paid Red Hat subscriptions, just you can always email Red Hat support at [email protected]. They eat questions like this up.


auth pam_tally2 ... deny=5
in /etc/pam.d/system_auth doesn't appear to reset if I successfully enter my password after a failure. Eventually I get locked out and the audit scripts do not appear to allow "unlock="
What is the best practice for application of pam_tally2?

Note pam_tally2 is a carryover from RHEL5, we'll be updating the guides to reflect pam_faillock soonish. Regardless, the lockout controls generally are time based. Say, for example, the requirement is: "Allow 5 password attempts in 3 minutes"

In that case, say I SSH in:
0.01: Failed password
0.02: Failed password
0.03: Failed password
0.04: I'm in!

and then I decide to open another SSH terminal a minute later:
1.00: Failed password
1.01: Failed password

... Even though I did eventually establish my first connection, at this point my account would be locked out since I had 5 failed attempts within 3 minutes.


SRG requires no .forward files. I currently do some data processing on automated emails via procmail configured in .forward in a dedicated user. What is the best practice for configuring such?
That's only for RHEL5, we went ahead and dropped it for RHEL6.

Personally I setup /etc/aliases to take care of this. I don't want local mail sitting on my servers, so I alias root to whatever sysadmin group I'm working for (e.g. "root: [email protected]") and my non-privileged username to my work address (e.g. "shawn: [email protected]")

-shawn

--
Shawn Wells
Technical Director,
U.S. Intelligence Programs
(e) [email protected]
(c) 443.534.0130

_______________________________________________
scap-security-guide mailing list
[email protected]
https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide

Reply via email to