[31768] in Kerberos

home help back first fref pref prev next nref lref last post

account lockout after n failed password attempts

daemon@ATHENA.MIT.EDU (Steve Glasser)
Sat Dec 12 15:53:52 2009

MIME-Version: 1.0
Date: Sat, 12 Dec 2009 12:53:26 -0800
Message-ID: <c789fd70912121253t667745f9s6d1cd4f809622412@mail.gmail.com>
From: Steve Glasser <sgla9347@gmail.com>
To: Kerberos@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

Hi list,

I was wondering if account lockout after n failed password attempts
was ever successfully implemented with MIT Kerberos?

I know this was discussed several years ago (see:
http://mailman.mit.edu/pipermail/kerberos/2007-December/012705.html).
I haven't seen any  responses more current than that.  It looks like
an inherent design problem because with multiple kdc servers there is
no way to keep a centralized count of failed login attempts.

Btw, does anyone know how Microsoft got around this problem (assuming
they did so), as they do offer account lockout after n failed login
attempts?

Thanks,
-- 
Steve Glasser
sgla9347@gmail.com
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post