Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-219180 | UBTU-18-010108 | SV-219180r610963_rule | Low |
Description |
---|
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements. |
STIG | Date |
---|---|
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide | 2023-03-06 |
Check Text ( C-20905r304868_chk ) |
---|
Verify that the Ubuntu operating system prevents passwords from being reused for a minimum of five generations by running the following command: # grep -i remember /etc/pam.d/common-password password [success=1 default=ignore] pam_unix.so sha512 shadow remember=5 rounds=5000 If the "remember" parameter value is not greater than or equal to 5, commented out, or not set at all this is a finding. |
Fix Text (F-20904r304869_fix) |
---|
Configure the Ubuntu operating system prevents passwords from being reused for a minimum of five generations. Add, or modify the "remember" parameter value to the following line in "/etc/pam.d/common-password" file: password [success=1 default=ignore] pam_unix.so sha512 shadow remember=5 rounds=5000 |