Check: FreeBSD-10-000400
FreeBSD 10:
FreeBSD-10-000400
(in version v1 r1)
Title
The operating system must not allow passwords to be simlilar to previous ones. (Cat II impact)
Discussion
If the operating system allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attempts at guessing and brute-force attacks. Satisfies: SRG-OS-000072-GPOS-00040
Check Content
Verify the operating system does not allow passwords to be similiar to previous ones. FreeBSD password quality checks are performed by pam_passwdqc. Verify it is installed and in-use: $ cat /etc/pam.d/passwd password requisite pam_passwdqc.so enforce=everyone min=disabled,disabled,disabled,disabled,15 similar=deny password required pam_unix.so no_warn try_first_pass nullok Ensure pam_passwdqc.so is not commented out and contains the settings "enforce=everyone" and "similar=deny". If it does not, this is a finding.
Fix Text
Configure the operating system to not allow passwords to be similar to previous ones.
Additional Identifiers
Rule ID:
Vulnerability ID: V-400
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000195 |
The information system, for password-based authentication, when new passwords are created, enforces that at least an organization-defined number of characters are changed. |
Controls
Number | Title |
---|---|
IA-5 (1) |
Password-Based Authentication |