UCF STIG Viewer Logo

The system must require passwords contain a minimum of 15 characters.


Overview

Finding ID Version Rule ID IA Controls Severity
V-11947 GEN000580 SV-37260r3_rule Medium
Description
The use of longer passwords reduces the ability of attackers to successfully obtain valid passwords using guessing or exhaustive search techniques by increasing the password search space.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2017-03-01

Details

Check Text ( C-35950r4_chk )
Check the system password length setting.

Procedure:
Check the password minlen option
# grep pam_cracklib.so /etc/pam.d/system-auth

Confirm the minlen option is set to at least 15 as in the example below:

password required pam_cracklib.so minlen=15

There may be other options on the line. If no such line is found, or the minlen is less than 15, this is a finding.

# grep PASS_MIN_LEN /etc/login.defs

Confirm the PASS_MIN_LEN option is set to at least 15 as in the example below:
PASS_MIN_LEN 15
Fix Text (F-31206r3_fix)
Edit "/etc/pam.d/system-auth" to include the line:
password required pam_cracklib.so minlen=15
prior to the "password include system-auth-ac" line.

Edit /etc/login.defs to include the line:

PASS_MIN_LEN 15