UCF STIG Viewer Logo

The system must disable accounts after three consecutive unsuccessful login attempts.


Overview

Finding ID Version Rule ID IA Controls Severity
RHEL-06-000061 RHEL-06-000061 RHEL-06-000061_rule Medium
Description
Locking out user accounts after a number of incorrect attempts prevents direct password guessing attacks.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2013-02-05

Details

Check Text ( C-RHEL-06-000061_chk )
To ensure the failed password attempt policy is configured correctly, run the following command:

# grep pam_faillock /etc/pam.d/system-auth-ac

The output should show "deny=3".
If that is not the case, this is a finding.
Fix Text (F-RHEL-06-000061_fix)
To configure the system to lock out accounts after a number of incorrect login attempts using "pam_faillock.so":

Add the following lines immediately below the "pam_env.so" statement in "/etc/pam.d/system-auth-ac":

auth [default=die] pam_faillock.so authfail deny=3 unlock_time=604800 fail_interval=900



auth required pam_faillock.so authsucc deny=3 unlock_time=604800 fail_interval=900