Check: RHEL-06-000056
Red Hat Enterprise Linux 6 STIG:
RHEL-06-000056
(in versions v2 r2 through v1 r19)
Title
The system must require passwords to contain at least one numeric character. (Cat III impact)
Discussion
Requiring digits makes password guessing attacks more difficult by ensuring a larger search space.
Check Content
To check how many digits are required in a password, run the following command: $ grep pam_cracklib /etc/pam.d/system-auth /etc/pam.d/password-auth Note: The "dcredit" parameter (as a negative number) will indicate how many digits are required. The DoD requires at least one digit in a password. This would appear as "dcredit=-1". If “dcredit” is not found or not set to the required value, this is a finding.
Fix Text
The pam_cracklib module's "dcredit" parameter controls requirements for usage of digits in a password. When set to a negative number, any password will be required to contain that many digits. When set to a positive number, pam_cracklib will grant +1 additional length credit for each digit. Edit /etc/pam.d/system-auth and /etc/pam.d/password-auth adding "dcredit=-1" after pam_cracklib.so to require use of a digit in passwords.
Additional Identifiers
Rule ID: SV-217892r603264_rule
Vulnerability ID: V-217892
Group Title: SRG-OS-000071
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000194 |
The information system enforces password complexity by the minimum number of numeric characters used. |
Controls
Number | Title |
---|---|
IA-5(1) |
Password-based Authentication |