STIGQter STIGQter: STIG Summary: Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 10 Mar 2021:

The Ubuntu operating system must be configured so that when passwords are changed or new passwords are established, pwquality must be used.

DISA Rule

SV-238228r653859_rule

Vulnerability Number

V-238228

Group Title

SRG-OS-000480-GPOS-00225

Rule Version

UBTU-20-010057

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the operating system to use "pwquality" to enforce password complexity rules.

Install the "pam_pwquality" package by using the following command:

$ sudo apt-get install libpam-pwquality -y

Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value):

enforcing = 1

Add the following line to "/etc/pam.d/common-password" (or modify the line to have the required value):

password requisite pam_pwquality.so retry=3

Note: The value of "retry" should be between "1" and "3".

Check Contents

Verify the Ubuntu operating system has the "libpam-pwquality" package installed by running the following command:

$ dpkg -l libpam-pwquality

ii libpam-pwquality:amd64 1.4.0-2 amd64 PAM module to check password strength

If "libpam-pwquality" is not installed, this is a finding.

Verify that the operating system uses "pwquality" to enforce the password complexity rules.

Verify the pwquality module is being enforced by the Ubuntu operating system by running the following command:

$ grep -i enforcing /etc/security/pwquality.conf

enforcing = 1

If the value of "enforcing" is not "1" or the line is commented out, this is a finding.

Check for the use of "pwquality" with the following command:

$ cat /etc/pam.d/common-password | grep requisite | grep pam_pwquality

password requisite pam_pwquality.so retry=3

If no output is returned or the line is commented out, this is a finding.

If the value of "retry" is set to "0" or greater than "3", this is a finding.

Vulnerability Number

V-238228

Documentable

False

Rule Version

UBTU-20-010057

Severity Override Guidance

Verify the Ubuntu operating system has the "libpam-pwquality" package installed by running the following command:

$ dpkg -l libpam-pwquality

ii libpam-pwquality:amd64 1.4.0-2 amd64 PAM module to check password strength

If "libpam-pwquality" is not installed, this is a finding.

Verify that the operating system uses "pwquality" to enforce the password complexity rules.

Verify the pwquality module is being enforced by the Ubuntu operating system by running the following command:

$ grep -i enforcing /etc/security/pwquality.conf

enforcing = 1

If the value of "enforcing" is not "1" or the line is commented out, this is a finding.

Check for the use of "pwquality" with the following command:

$ cat /etc/pam.d/common-password | grep requisite | grep pam_pwquality

password requisite pam_pwquality.so retry=3

If no output is returned or the line is commented out, this is a finding.

If the value of "retry" is set to "0" or greater than "3", this is a finding.

Check Content Reference

M

Target Key

5318

Comments