UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Ubuntu 22.04 LTS must be configured so that when passwords are changed or new passwords are established, pwquality must be used.


Overview

Finding ID Version Rule ID IA Controls Severity
V-260567 UBTU-22-611045 SV-260567r953514_rule Medium
Description
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. "pwquality" enforces complex password construction configuration and has the ability to limit brute-force attacks on the system.
STIG Date
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide 2024-03-21

Details

Check Text ( C-64296r953512_chk )
Verify Ubuntu 22.04 LTS enforces password complexity rules by using the following command:

$ grep -i enforcing /etc/security/pwquality.conf
enforcing = 1

If "enforcing" is not "1", is commented out, or is missing, this is a finding.

Check for the use of "pwquality" by using the following command:

$ cat /etc/pam.d/common-password | grep requisite | grep pam_pwquality
password requisite pam_pwquality.so retry=3

If "retry" is set to "0" or is greater than "3", or is missing, this is a finding.
Fix Text (F-64204r953513_fix)
Configure Ubuntu 22.04 LTS to enforce password complexity rules.

Add or modify the following line in the "/etc/security/pwquality.conf" file:

enforcing = 1

Add or modify the following line in the "/etc/pam.d/common-password" file:

password requisite pam_pwquality.so retry=3

Note: The value of "retry" should be between "1" and "3".