Hi,
tacauth_limit is a MAVIS module, and it should keep track of lower-level MAVIS authentication failures.
However, you're probably testing with your local "test" user, so the MAVIS backend isn't involved at all and tacauth_limit won't see these authentications.
Cheers,
Marc
tac_plus can parse it but it seems not work as expected, try 3 time wrong pass and 1 correct with in 21 minute the last login unexpected --
You received this message because you are subscribed to the Google Groups "Event-Driven Servers" group.
To unsubscribe from this group and stop receiving emails from it, send an email to event-driven-ser...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/event-driven-servers/9a9bb98d-87a1-4847-8eb0-333a65aef8f5n%40googlegroups.com.
Hi,
no, "fail to lock" isn't an implemented feature for local users, neither for tac_plus nor for tac_plus-ng. Also, development is focused on the latter, so the legacy tac_plus won't see any new features.
Cheers,
Marc
Hi,
Yes, I am testing with the local test user... but the purpose of "fail to lock" is to counteract brute force password cracking, whether it's for local or MAVIS users...
Is this supported and how ? or will be supported?
Thanks在2026年4月30日星期四 UTC+8 00:56:50<Marc Huber> 写道:
Hi,
tacauth_limit is a MAVIS module, and it should keep track of lower-level MAVIS authentication failures.
However, you're probably testing with your local "test" user, so the MAVIS backend isn't involved at all and tacauth_limit won't see these authentications.
Cheers,
Marc
<snip>