File tree Expand file tree Collapse file tree 3 files changed +39
-2
lines changed
linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_root_unlock_time Expand file tree Collapse file tree 3 files changed +39
-2
lines changed Original file line number Diff line number Diff line change 85
85
- accounts_passwords_pam_faillock_enforce_local
86
86
- accounts_passwords_pam_faillock_interval
87
87
- accounts_passwords_pam_faillock_silent
88
+ - accounts_passwords_pam_faillock_root_unlock_time
88
89
- accounts_passwords_pam_faillock_unlock_time
89
90
- accounts_passwords_pam_faillock_enabled
90
91
- accounts_passwords_pam_tally2
Original file line number Diff line number Diff line change @@ -1913,8 +1913,10 @@ controls:
1913
1913
levels :
1914
1914
- l2_server
1915
1915
- l2_workstation
1916
- status : planned
1917
- notes : TODO. Rule does not seem to be implemented, nor does it map to any rules in ubuntu2204 profile.
1916
+ rules :
1917
+ - var_accounts_passwords_pam_faillock_unlock_time=900
1918
+ - accounts_passwords_pam_faillock_root_unlock_time
1919
+ status : automated
1918
1920
1919
1921
- id : 5.3.3.2.1
1920
1922
title : Ensure password number of changed characters is configured (Automated)
Original file line number Diff line number Diff line change
1
+ documentation_complete : true
2
+
3
+
4
+ title : ' Set Root Lockout Time for Failed Password Attempts'
5
+
6
+ description : |-
7
+ This rule configures the system to lock out root during a specified time period after a
8
+ number of incorrect login attempts using <tt>pam_faillock.so</tt>.
9
+
10
+ Ensure that the file <tt>/etc/security/faillock.conf</tt> contains the following entry:
11
+ <tt>root_unlock_time=<interval-in-seconds></tt> where
12
+ <tt>interval-in-seconds</tt> is <tt>{{{xccdf_value("var_accounts_passwords_pam_faillock_unlock_time") }}}</tt> or greater.
13
+
14
+ If <tt>root_unlock_time</tt> is set to <tt>0</tt>, it may enable attacker to
15
+ apply denial of service to legitimate users.
16
+
17
+ rationale : |-
18
+ By limiting the number of failed logon attempts the risk of unauthorized root
19
+ access via password guessing, otherwise known as brute-forcing, is reduced.
20
+ Limits are imposed by locking the account.
21
+
22
+ severity : medium
23
+
24
+ platform : package[pam]
25
+
26
+ template :
27
+ name : pam_account_password_faillock
28
+ vars :
29
+ prm_name : root_unlock_time
30
+ prm_regex_conf : ^[\s]*root_unlock_time[\s]*=[\s]*([0-9]+)
31
+ prm_regex_pamd : ^[\s]*auth[\s]+.+[\s]+pam_faillock.so[\s]+[^\n]*root_unlock_time=([0-9]+)
32
+ ext_variable : var_accounts_passwords_pam_faillock_unlock_time
33
+ description : The unlock time after number of failed logins should be set correctly.
34
+ variable_lower_bound : use_ext_variable
You can’t perform that action at this time.
0 commit comments