UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The SUSE operating system must not allow passwords to be reused for a minimum of five generations.


Overview

Finding ID Version Rule ID IA Controls Severity
V-234894 SLES-15-020250 SV-234894r622137_rule Medium
Description
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements.
STIG Date
SUSE Linux Enterprise Server 15 Security Technical Implementation Guide 2024-02-16

Details

Check Text ( C-38082r618951_chk )
Verify the SUSE operating system prohibits the reuse of a password for a minimum of five generations.

Check that the SUSE operating system prohibits the reuse of a password for a minimum of five generations with the following command:

> grep pam_pwhistory.so /etc/pam.d/common-password

password requisite pam_pwhistory.so remember=5 use_authtok

If the command does not return a result, or the returned line is commented out, has a second column value different from "requisite", does not contain "remember" value, the value is less than "5", or is missing the "use_authtok" keyword, this is a finding.
Fix Text (F-38045r618952_fix)
Configure the SUSE operating system password history to prohibit the reuse of a password for a minimum of five generations.

Edit "/etc/pam.d/common-password" and edit the line containing "pam_pwhistory.so" to contain the option "remember=5 use_authtok" after the third column.