The system must disable accounts after three consecutive unsuccessful login attempts.

From SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

Part of GEN000460

Associated with: CCI-000044

SV-44834r1_rule The system must disable accounts after three consecutive unsuccessful login attempts.

Vulnerability discussion

Disabling accounts after a limited number of unsuccessful login attempts improves protection against password guessing attacks.

Check content

Check the pam_tally configuration. # more /etc/pam.d/login Confirm the following line is configured, before the "common-auth” file is included: auth required pam_tally.so deny=3 onerr=fail # more /etc/pam.d/sshd Confirm the following line is configured, before the "common-auth” file is included: auth required pam_tally.so deny=3 onerr=fail If no such line is found, this is a finding.

Fix text

Edit /etc/pam.d/login and/or /etc/pam.d/sshd and add the following line, before the "common-auth" file is included: auth required pam_tally.so deny=3 onerr=fail

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer