UBTU-16-030250 - The Ubuntu operating system must be configured so that the SSH daemon does not allow authentication using an empty password - PermitEmptyPasswords

Information

Failure to restrict system access to authenticated users negatively impacts Ubuntu operating system security.

Solution

To explicitly disallow remote logon from accounts with empty passwords, add or correct the following line in '/etc/ssh/sshd_config':

PermitEmptyPasswords no

Note: Any accounts with empty passwords should be disabled immediately, and PAM configuration should prevent users from being able to assign themselves empty passwords.

The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command:

# sudo systemctl restart sshd.service

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_CAN_Ubuntu_16-04_LTS_V2R3_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|I, CCI|CCI-000366, Rule-ID|SV-215126r610931_rule, STIG-ID|UBTU-16-030250, STIG-Legacy|SV-90513, STIG-Legacy|V-75833, Vuln-ID|V-215126

Plugin: Unix

Control ID: deadc2a3fec8b6f4f8b1eb6288f997cf9f683e493ffda970a0af5a9738cfa256