STIGQter STIGQter: STIG Summary: Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 10 Mar 2021:

The Ubuntu operating system must enforce a delay of at least 4 seconds between logon prompts following a failed logon attempt.

DISA Rule

SV-238237r653886_rule

Vulnerability Number

V-238237

Group Title

SRG-OS-000480-GPOS-00226

Rule Version

UBTU-20-010075

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Configure the Ubuntu operating system to enforce a delay of at least 4 seconds between logon prompts following a failed logon attempt.

Edit the file "/etc/pam.d/common-auth" and set the parameter "pam_faildelay" to a value of 4000000 or greater:

auth required pam_faildelay.so delay=4000000

Check Contents

Verify the Ubuntu operating system enforces a delay of at least 4 seconds between logon prompts following a failed logon attempt with the following command:

$ grep pam_faildelay /etc/pam.d/common-auth

auth required pam_faildelay.so delay=4000000

If the line is not present or is commented out, this is a finding.

Vulnerability Number

V-238237

Documentable

False

Rule Version

UBTU-20-010075

Severity Override Guidance

Verify the Ubuntu operating system enforces a delay of at least 4 seconds between logon prompts following a failed logon attempt with the following command:

$ grep pam_faildelay /etc/pam.d/common-auth

auth required pam_faildelay.so delay=4000000

If the line is not present or is commented out, this is a finding.

Check Content Reference

M

Target Key

5318

Comments