3.2.3 /etc/security/login.cfg - logindisable

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Defines the number of unsuccessful login attempts required before a port will be locked. This parameter is applicable to all tty connections and the system console.

In setting the logindisable attribute, a port will be disabled if the incorrect password is entered a set number of times within a specified interval, set via logininterval.

Solution

In /etc/security/login.cfg, set the default stanza logindisable attribute to 10 or less-

chsec -f /etc/security/login.cfg -s default -a logindisable=10

This means that the port will be disabled if the incorrect password is typed 10 times within a 300 second interval.

See Also

https://workbench.cisecurity.org/files/528