The SUSE operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.

From SLES 12 Security Technical Implementation Guide

Part of SRG-OS-000480-GPOS-00226

Associated with: CCI-000366

SV-91827r2_rule The SUSE operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.

Vulnerability discussion

Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account.

Check content

Verify the SUSE operating system enforces a delay of at least four seconds between logon prompts following a failed logon attempt. # grep pam_faildelay /etc/pam.d/common-auth* auth required pam_faildelay.so delay=4000000 If the value of "delay" is not set to "4000000", "delay" is commented out, "delay" is missing, or the "pam_faildelay" line is missing completely, this is a finding.

Fix text

Configure the SUSE operating system to enforce a delay of at least four seconds between logon prompts following a failed logon attempt. Edit the file "/etc/pam.d/common-auth". Add a parameter "pam_faildelay" and set it to: # delay is in micro seconds auth required pam_faildelay.so delay=4000000

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer