RHEL-07-010270 - The Red Hat Enterprise Linux operating system must be configured so that passwords are prohibited from reuse for a minimum of five generations - system-auth

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed per policy requirements.

Solution

Configure the operating system to prohibit password reuse for a minimum of five generations.

Add the following line in '/etc/pam.d/system-auth' and '/etc/pam.d/password-auth' (or modify the line to have the required value):

password requisite pam_pwhistory.so use_authtok remember=5 retry=3

Note: Per requirement RHEL-07-010199, RHEL 7 must be configured to not overwrite custom authentication configuration settings while using the authconfig utility, otherwise manual changes to the listed files will be overwritten whenever the authconfig utility is used.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_7_V3R10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000200, Rule-ID|SV-204422r880836_rule, STIG-ID|RHEL-07-010270, STIG-Legacy|SV-86557, STIG-Legacy|V-71933, Vuln-ID|V-204422

Plugin: Unix

Control ID: 867ca152ef579572c7aeb16454fb83888693e339ddb82627e89f622d56355cda