Check: GEN000790
Title
The system must prevent the use of dictionary words for passwords. (Cat II impact)
Discussion
An easily guessable password provides an open door to any external or internal malicious intruder. Many computer compromises occur as the result of account name and password guessing. This is generally done by someone with an automated script using repeated logon attempts until the correct account and password pair is guessed. Utilities, such as cracklib, can be used to validate passwords are not dictionary words and meet other criteria during password changes.
Check Content
Check /etc/default/passwd for dictionary check configuration. # grep DICTION /etc/default/passwd If the DICTIONLIST or DICTIONDBDIR settings are not present, or are set to non-existent files or directories, this is a finding.
Fix Text
Edit /etc/default/passwd; add or set DICTIONLIST to the dictionary file and DICTIONDBDIR to a database directory such as /var/passwd. Generate the password dictionary by running the mkpwdict command.
Additional Identifiers
Rule ID:
Vulnerability ID: V-22307
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000189 |
The organization employs automated tools to determine if authenticators are sufficiently strong to resist attacks intended to discover or otherwise compromise the authenticators. |
Controls
Number | Title |
---|---|
No controls are assigned to this check |