UCF STIG Viewer Logo

The SUSE operating system must lock an account after three consecutive invalid logon attempts.


Overview

Finding ID Version Rule ID IA Controls Severity
V-77071 SLES-12-010130 SV-91767r3_rule Medium
Description
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking the account.
STIG Date
SLES 12 Security Technical Implementation Guide 2020-06-30

Details

Check Text ( C-76681r3_chk )
Verify the SUSE operating system locks a user account after three consecutive failed logon attempts until the locked account is released by an administrator.

Check that the system locks a user account after three consecutive failed login attempts using the following command:

# grep pam_tally2.so /etc/pam.d/common-auth
auth required pam_tally2.so deny=3

If the "deny" option is greater than "3", is missing, or is commented out, this is a finding.

Check that the system resets the failed login attempts counter after a successful login using the following command:

# grep pam_tally2.so /etc/pam.d/common-account
account required pam_tally2.so deny=3

If the "deny" option is greater than "3", is missing, or is commented out, this is a finding.
Fix Text (F-83769r3_fix)
Configure the SUSE operating system to lock a user account after three consecutive failed logon attempts until the locked account is released by an administrator.

Add or modify the following line in the auth section of the "/etc/pam.d/common-auth" file to match the following:

auth required pam_tally2.so deny=3

Add or modify the following line in the account section of the "/etc/pam.d/common-account" file to match the following:

account required pam_tally2.so deny=3