-
Notifications
You must be signed in to change notification settings - Fork 711
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
add new rule checking retry count in /etc/security/pwquality.conf
- Loading branch information
1 parent
5f36e31
commit 1b64881
Showing
1 changed file
with
37 additions
and
0 deletions.
There are no files selected for viewing
37 changes: 37 additions & 0 deletions
37
...quality/password_quality_libpwquality/accounts_password_pam_pwquality_conf_retry/rule.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
documentation_complete: true | ||
|
||
|
||
title: 'Ensure PAM Enforces Password Requirements - Authentication Retry Prompts Permitted Per-Session in /etc/security/pwquality.conf' | ||
|
||
description: |- | ||
To configure the number of retry prompts that are permitted per-session: | ||
Edit the <tt>/etc/security/pwquality.conf</tt> to include | ||
<tt>retry={{{xccdf_value("var_password_pam_retry") }}}</tt>, or a lower value if site | ||
policy is more restrictive. The DoD requirement is a maximum of 3 prompts | ||
per session. | ||
rationale: |- | ||
Setting the password retry prompts that are permitted on a per-session basis to a low value | ||
requires some software, such as SSH, to re-connect. This can slow down and | ||
draw additional attention to some types of password-guessing attacks. Note that this | ||
is different from account lockout, which is provided by the pam_faillock module. | ||
severity: medium | ||
|
||
identifiers: | ||
cce@rhel9: CCE-86492-6 | ||
|
||
ocil_clause: 'the value of "retry" is set to "0" or greater than "{{{ xccdf_value("var_password_pam_retry") }}}", or is missing' | ||
|
||
ocil: |- | ||
Verify {{{ full_name }}} is configured to limit the "pwquality" retry option to {{{ xccdf_value("var_password_pam_retry") }}}. | ||
Check for the use of the "pwquality" retry option in the pwquality.conf file with the following command: | ||
<pre>$ grep retry /etc/security/pwquality.conf</pre> | ||
template: | ||
name: key_value_pair_in_file | ||
vars: | ||
path: /etc/security/pwquality.conf | ||
key: retry | ||
xccdf_variable: var_password_pam_retry |