UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The SUSE operating system must enforce passwords that contain at least one special character.


Overview

Finding ID Version Rule ID IA Controls Severity
V-234896 SLES-15-020270 SV-234896r622137_rule Medium
Description
Use of a complex password helps increase the time and resources required to compromise the password. Password complexity or strength is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor in determining how long it takes to crack a password. The more complex the password, the greater the number of possible combinations that need to be tested before the password is compromised. Special characters are not alphanumeric. Examples include: ~ ! @ # $ % ^ *.
STIG Date
SUSE Linux Enterprise Server 15 Security Technical Implementation Guide 2024-02-16

Details

Check Text ( C-38084r618957_chk )
Verify the SUSE operating system enforces password complexity by requiring at least one special character.

Check that the operating system enforces password complexity by requiring at least one special character using the following command:

> grep pam_cracklib.so /etc/pam.d/common-password
password requisite pam_cracklib.so ocredit=-1

If the command does not return anything, the returned line is commented out, or has a second column value different from "requisite", or does not contain "ocredit=-1", this is a finding.
Fix Text (F-38047r618958_fix)
Configure the SUSE operating system to enforce password complexity by requiring at least one special character.

Edit "/etc/pam.d/common-password" and edit the line containing "pam_cracklib.so" to contain the option "ocredit=-1" after the third column.