4.4.2.4.1 Ensure pam_unix does not include nullok

Information

The nullok argument overrides the default action of pam_unix.so to not permit the user access to a service if their official password is blank.

Using a strong password is essential to helping protect personal and sensitive information from unauthorized access

Solution

Edit the files /etc/pam.d/system-auth and /etc/pam.d/password-auth:

Edit the following lines and remove the nullok option:

auth sufficient pam_unix.so try_first_pass
account required pam_unix.so
password sufficient pam_unix.so sha512 shadow try_first_pass use_authtok
session required pam_unix.so

See Also

https://workbench.cisecurity.org/benchmarks/15963

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1), CSCv7|4.4

Plugin: Unix

Control ID: a5b5dfda3aa3848552e7176a4dbd140955e0e04965dca7a8919fe38b9d032ed4