Check: RHEL-06-000274
Red Hat Enterprise Linux 6 STIG:
RHEL-06-000274
(in versions v2 r2 through v1 r19)
Title
The system must prohibit the reuse of passwords within five iterations. (Cat II impact)
Discussion
Preventing reuse of previous passwords helps ensure that a compromised password is not reused by a user.
Check Content
To verify the password reuse setting is compliant, run the following command: # grep remember /etc/pam.d/system-auth /etc/pam.d/password-auth If the line is commented out, the line does not contain "password required pam_pwhistory.so" or "password requisite pam_pwhistory.so", or the value for "remember" is less than “5”, this is a finding.
Fix Text
Do not allow users to reuse recent passwords. This can be accomplished by using the "remember" option for the "pam_pwhistory" PAM module. In the file "/etc/pam.d/system-auth" and /etc/pam.d/password-auth, append "remember=5" to the lines that refer to the "pam_pwhistory.so" module, as shown: password required pam_pwhistory.so [existing_options] remember=5 or password requisite pam_pwhistory.so [existing_options] remember=5 The DoD requirement is five passwords.
Additional Identifiers
Rule ID: SV-218026r603264_rule
Vulnerability ID: V-218026
Group Title: SRG-OS-000077
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000200 |
The information system prohibits password reuse for the organization-defined number of generations. |
Controls
Number | Title |
---|---|
IA-5 (1) |
Password-Based Authentication |