Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-230380 | RHEL-08-020330 | SV-230380r627750_rule | High |
Description |
---|
If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 8 Security Technical Implementation Guide | 2021-03-04 |
Check Text ( C-33049r567886_chk ) |
---|
To verify that null passwords cannot be used, run the following commands: $ sudo grep -i nullok /etc/pam.d/system-auth /etc/pam.d/password-auth If this produces any output, it may be possible to log on with accounts with empty passwords. $ sudo grep -i permitemptypasswords /etc/ssh/sshd_config PermitEmptyPasswords no If "PermitEmptyPasswords" is set to "yes", or If null passwords can be used, this is a finding. Note: Manual changes to the listed files may be overwritten by the "authselect" program. |
Fix Text (F-33024r567887_fix) |
---|
Remove any instances of the "nullok" option in "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" and add or edit the following line in "etc/ssh/sshd_config" to prevent logons with empty passwords. PermitEmptyPasswords no The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service Note: Manual changes to the listed files may be overwritten by the "authselect" program. |