Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-77071 | SLES-12-010130 | SV-91767r3_rule | Medium |
Description |
---|
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking the account. |
STIG | Date |
---|---|
SLES 12 Security Technical Implementation Guide | 2020-06-30 |
Check Text ( C-76681r3_chk ) |
---|
Verify the SUSE operating system locks a user account after three consecutive failed logon attempts until the locked account is released by an administrator. Check that the system locks a user account after three consecutive failed login attempts using the following command: # grep pam_tally2.so /etc/pam.d/common-auth auth required pam_tally2.so deny=3 If the "deny" option is greater than "3", is missing, or is commented out, this is a finding. Check that the system resets the failed login attempts counter after a successful login using the following command: # grep pam_tally2.so /etc/pam.d/common-account account required pam_tally2.so deny=3 If the "deny" option is greater than "3", is missing, or is commented out, this is a finding. |
Fix Text (F-83769r3_fix) |
---|
Configure the SUSE operating system to lock a user account after three consecutive failed logon attempts until the locked account is released by an administrator. Add or modify the following line in the auth section of the "/etc/pam.d/common-auth" file to match the following: auth required pam_tally2.so deny=3 Add or modify the following line in the account section of the "/etc/pam.d/common-account" file to match the following: account required pam_tally2.so deny=3 |