Closed sjmh closed 8 years ago
I am going to take a look at this
This is happening on 2015.8 as well.
Is this the first time you are running into this, or did you have this same problem with previous versions of salt? It looks like we are going to have to investigate this a bit farther.
It looks like our pam eauth implementation only runs the auth portion of the pam services, which is where the failures get tallyed in your pam_tally2 configuration. We need to run the account levels as well to make sure that they will get cleared on a successful login.
@gtmanfred - Perhaps never noticed it with 2015.8 or may just be with our newer OS baselines that we actually use pam_tally2.
this is going to take a while for us to troubleshoot this I think, because this hasn't been touched in a while.
Would it be possible to setup a separate service file for /etc/pam.d/ call salt
and set auth.pam.service: salt
that does all the pam.d login stuff without the pam_tally2, until we can figure out how to get the account and session stuff processed in pam?
@gtmanfred - sure.
Description of Issue/Question
When using the PAM external_auth in 2016.3-rc2, successful logins via salt will cause invalid logins to be registered by pam_tally2, resulting in the account eventually being locked.
Setup
(Please provide relevant configs and/or SLS files (Be sure to remove sensitive info).)
2016.3 RC2 master with external_auth pam:
Steps to Reproduce Issue
(Include debug logs if possible and relevant.)
Versions Report
(Provided by running
salt --versions-report
. Please also mention any differences in master/minion versions.)