UBTU-16-010099 - The Ubuntu operating system must be configured so that when passwords are changed or new passwords are established, pwquality must be used - /etc/pam.d/common-password

Information

Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. 'pwquality' enforces complex password construction configuration and has the ability to limit brute-force attacks on the system.

Solution

Configure the operating system to use 'pam_pwquality' to enforce password complexity rules.
Install the 'libpam-pwquality' package:

# sudo apt install libpam-pwquality

Add the following line to '/etc/pam.d/common-password' (or modify the line to have the required value):

password required pam_pwquality.so retry=3

Note: The value of 'retry' should be between '1' and '3'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_CAN_Ubuntu_16-04_LTS_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-7, CAT|II, CCI|CCI-000192, CCI|CCI-000193, CCI|CCI-000194, CCI|CCI-000195, CCI|CCI-000200, CCI|CCI-000205, CCI|CCI-001619, CSCv6|16.7, Rule-ID|SV-214948r508033_rule, STIG-ID|UBTU-16-010099, STIG-Legacy|SV-108113, STIG-Legacy|V-99009, Vuln-ID|V-214948

Plugin: Unix

Control ID: 9a55ce0f7dbb5971980dc23e3d4ed16598dcb2d829f9bf5c73fb2bd48ddead13