STIGQter STIGQter: STIG Summary: Oracle Linux 6 Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The system must require passwords to contain at least one numeric character.

DISA Rule

SV-208831r603263_rule

Vulnerability Number

V-208831

Group Title

SRG-OS-000071

Rule Version

OL6-00-000056

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

The pam_cracklib module's "dcredit" parameter controls requirements for usage of digits in a password. When set to a negative number, any password will be required to contain that many digits. When set to a positive number, pam_cracklib will grant +1 additional length credit for each digit.

Edit /etc/pam.d/system-auth and /etc/pam.d/password-auth adding "dcredit=-1" after pam_cracklib.so to require use of a digit in passwords.

Check Contents

To check how many digits are required in a password, run the following command:

$ grep pam_cracklib /etc/pam.d/system-auth /etc/pam.d/password-auth

The "dcredit" parameter (as a negative number) will indicate how many digits are required. The DoD requires at least one digit in a password. This would appear as "dcredit=-1".

If the “dcredit” parameter is not found or not set to the required value, this is a finding.

Vulnerability Number

V-208831

Documentable

False

Rule Version

OL6-00-000056

Severity Override Guidance

To check how many digits are required in a password, run the following command:

$ grep pam_cracklib /etc/pam.d/system-auth /etc/pam.d/password-auth

The "dcredit" parameter (as a negative number) will indicate how many digits are required. The DoD requires at least one digit in a password. This would appear as "dcredit=-1".

If the “dcredit” parameter is not found or not set to the required value, this is a finding.

Check Content Reference

M

Target Key

2928

Comments