Skip to content

The Ubuntu operating system must be configured so that three consecutive invalid logon attempts by a user automatically locks the account until released by an administrator.

An XCCDF Rule

Description

By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking the account. Satisfies: SRG-OS-000329-GPOS-00128

ID
SV-219166r853369_rule
Version
UBTU-18-010033
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Configure the Ubuntu operating system to utilize the "pam_faillock" module. 

Edit the /etc/pam.d/common-auth file. 

Add the following lines below the "auth" definition for pam_unix.so:
auth     [default=die]  pam_faillock.so authfail