Bug#883838: [Pkg-openldap-devel] Bug#883838: slapd: Overlay ppolicy: When pwdFailureCountInterval (!=0) is reached the password failures are not purged.

Ryan Tandy ryan at nardis.ca
Wed Mar 25 01:42:05 GMT 2020


Control: tag -1 moreinfo

Hello Mats,

I finally looked more closely at this bug, and I believe the code is 
working as intended.

On Fri, Dec 08, 2017 at 08:39:32AM +0100, Mats Luspa wrote:
>in the overlay ppolicy you can use pwdFailureCountInterval attribute. The documentation says "pwdFailureCountInterval attribute holds the number of seconds after which the password failures are purged from the failure counter, even though no successful authentication occurred.
>If pwdFailureCountInterval attribute is not present, or if its value is 0, the failure counter is only reset by a successful authentication."
>
>But that doesn't work.

The documentation doesn't talk about how many values of pwdFailureTime 
are actually present in the database, only how many are _counted_ when 
deciding whether to lock the account.

Given the following policy:

pwdFailureCountInterval: 10
pwdMaxFailure: 2
pwdLockout: TRUE

If I try an incorrect password two times within ten seconds, my account 
will be locked (permanently, since I did not specify a lock duration).

However, if I try an incorrect password one time, wait at least ten 
seconds, and then try it again, my account will not be locked, because 
the earlier failure is considered to have expired and is not counted. I 
have verified this in the jessie version of slapd.

In either case, it's intentional that pwdFailureTime is not physically 
deleted until the next successful authentication. It's possible the 
documentation is not clear enough on this point.

Please let me know if you agree with my analysis above.

thanks,
Ryan



More information about the Pkg-openldap-devel mailing list