RHEL-06-000050 - The system must require passwords to contain a minimum of 15 characters.

Information

Requiring a minimum password length makes password cracking attacks more difficult by ensuring a larger search space. However, any security benefit from an onerous requirement must be carefully weighed against usability problems, support costs, or counterproductive behavior that may result.

While it does not negate the password length requirement, it is preferable to migrate from a password-based authentication scheme to a stronger one based on PKI (public key infrastructure).

Solution

To specify password length requirements for new accounts, edit the file '/etc/login.defs' and add or correct the following lines:

PASS_MIN_LEN 15

The DoD requirement is '15'. If a program consults '/etc/login.defs' and also another PAM module (such as 'pam_cracklib') during a password change operation, then the most restrictive must be satisfied.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_6_V2R2_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(a), CAT|II, CCI|CCI-000205, Rule-ID|SV-217887r603264_rule, STIG-ID|RHEL-06-000050, STIG-Legacy|SV-50275, STIG-Legacy|V-38475, Vuln-ID|V-217887

Plugin: Unix

Control ID: 64e8f69ea4bf5aefed401f1b55532e5ac1bd2f61125e13c45237f52050ccb9bd