UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must require at least four characters be changed between the old and new passwords during a password change.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22306 GEN000750 SV-37304r1_rule IAIA-1 IAIA-2 Medium
Description
To ensure password changes are effective in their goals, the system must ensure that old and new passwords have significant differences. Without significant changes, new passwords may be easily guessed based on the value of a previously compromised password.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2015-03-12

Details

Check Text ( C-35999r1_chk )
Check /etc/pam.d/system-auth for a pam_cracklib parameter difok.

Procedure:
# grep difok /etc/pam.d/system-auth
If difok is not present, or has a value less than 4, this is a finding.

Check for system-auth-ac inclusions.
# grep -c system-auth-ac /etc/pam.d/*

If the system-auth-ac file is included anywhere
# more /etc/pam.d/system-auth-ac | grep difok

If system-auth-ac is included anywhere and difok is not present, or has a value less than 4, this is a finding.

Ensure the passwd command uses the system-auth settings.
# grep system-auth /etc/pam.d/passwd
If a line "password include system-auth" is not found then the password checks in system-auth will not be applied to new passwords.
Fix Text (F-31252r1_fix)
If /etc/pam.d/system-auth references /etc/pam.d/system-auth-ac refer to the man page for system-auth-ac for a description of how to add options not configurable with authconfig. Edit /etc/pam.d/system-auth and add or edit a pam_cracklib entry with an difok parameter set equal to or greater than 4.