4.4.2.4.1 Ensure pam_unix does not include nullok

Information

The nullok argument overrides the default action of pam_unix.so to not permit the user access to a service if their official password is blank.

Using a strong password is essential to helping protect personal and sensitive information from unauthorized access

Solution

Edit the files /etc/pam.d/system-auth and /etc/pam.d/password-auth:

Edit the following lines and remove the nullok option:

auth sufficient pam_unix.so try_first_pass
account required pam_unix.so
password sufficient pam_unix.so sha512 shadow try_first_pass use_authtok
session required pam_unix.so

See Also

https://workbench.cisecurity.org/benchmarks/15964

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1), CSCv7|4.4

Plugin: Unix

Control ID: 4cd856c296d420b404b1a095a0dd9b5198c2fe944c29228e85e02a474349c77b