SV-99011r1_rule
V-88361
SRG-OS-000021-GPOS-00005
VROM-SL-000025
CAT II
10
To configure the SLES for vRealize to enforce the limit of "3" consecutive invalid attempts using "pam_tally2.so", modify the content of the /etc/pam.d/common-auth-vmware.local by running the following command:
# sed -i "/^[^#]*pam_tally2.so/ c\auth required pam_tally2.so deny=3 onerr=fail even_deny_root unlock_time=86400 root_unlock_time=300" /etc/pam.d/common-auth-vmware.local
Run the following command to ensure that the SLES for vRealize enforces the limit of "3" consecutive invalid logon attempts by a user:
# grep pam_tally2.so /etc/pam.d/common-auth
The output should contain "deny=3" in the returned line.
If the output does not contain "deny=3", this is a finding.
Expected Result:
auth required pam_tally2.so deny=3 onerr=fail even_deny_root unlock_time=86400 root_unlock_time=300
V-88361
False
VROM-SL-000025
Run the following command to ensure that the SLES for vRealize enforces the limit of "3" consecutive invalid logon attempts by a user:
# grep pam_tally2.so /etc/pam.d/common-auth
The output should contain "deny=3" in the returned line.
If the output does not contain "deny=3", this is a finding.
Expected Result:
auth required pam_tally2.so deny=3 onerr=fail even_deny_root unlock_time=86400 root_unlock_time=300
M
3461