UBTU-16-010320 - The Ubuntu operating system must enforce a delay of at least 4 seconds between logon prompts following a failed logon attempt.

Information

Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account.

Solution

Configure the Ubuntu operating system to enforce a delay of at least 4 seconds between logon prompts following a failed logon attempt.

Edit the file '/etc/pam.d/common-auth' and set the parameter 'pam_faildelay' to a value of 4000000 or greater:

auth required pam_faildelay.so delay=4000000

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_CAN_Ubuntu_16-04_LTS_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-7, CAT|II, CCI|CCI-000366, CSCv6|16.7, Rule-ID|SV-214971r508033_rule, STIG-ID|UBTU-16-010320, STIG-Legacy|SV-90173, STIG-Legacy|V-75493, Vuln-ID|V-214971

Plugin: Unix

Control ID: 068df84663d241f73e2a10c8dc7b38ddcf6681ffb1768b79953ace79e87fa2d6