GEN000585-ESXI5-000080 - The system must enforce the entire password during authentication

Information

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

As root, log in to the host and verify the expected settings are configured in the /etc/pam.d/passwd file. The entry format is 'password requisite /lib/security/pam_passwdqc.so similar=deny retry=N min=N0,N1,N2,N3,N4'. The 'N4' field controls the behavior requiring at least one character each of the 4 different character classes, with a minimum required length of 14 characters.
vi /etc/pam.d/passwd
Set the 'N4' password complexity field to '14' and set the 'N0' thru 'N3' fields to 'disabled'.

See Also

http://iasecontent.disa.mil/stigs/zip/U_ESXi5_Server_V1R10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Group-ID|V-39263, Rule-ID|SV-51079r1_rule, STIG-ID|GEN000585-ESXI5-000080, Vuln-ID|V-39263

Plugin: VMware

Control ID: d4914aa9fc146e16894f2fee30d15e86492af705aafc5cb4ab2f2f9f9ad2e4d2