UCF STIG Viewer Logo

The SUSE operating system must lock an account after three consecutive invalid logon attempts.


Overview

Finding ID Version Rule ID IA Controls Severity
V-77071 SLES-12-010130 SV-91767r2_rule Medium
Description
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking the account.
STIG Date
SLES 12 Security Technical Implementation Guide 2018-09-27

Details

Check Text ( C-76681r2_chk )
Verify the SUSE operating system locks a user account until the locked account is released by an administrator after three consecutive failed logon attempts.

Check that the systems locks a user account after three consecutive failed login attempts with the following command:

# grep pam_tally2.so /etc/pam.d/login

auth required pam_tally2.so deny=3

If the "deny" option is greater than "3" or is missing, this is a finding.
Fix Text (F-83769r2_fix)
Configure the SUSE operating system to lock a user account until the locked account is released by an administrator after three consecutive failed logon attempts.

Add or modify the following line in the auth section of the "/etc/pam.d/login" file (or other services being used) to match the following:

auth required pam_tally2.so deny=3