--- scap-security-guide-0.1.19/RHEL/7/input/system/accounts/pam.xml.orig 2014-09-29 08:53:24.078751294 -0400 +++ scap-security-guide-0.1.19/RHEL/7/input/system/accounts/pam.xml 2014-09-29 08:59:28.963638607 -0400 @@ -81,33 +81,28 @@ and gives them an opportunity to notify Set Password Quality Requirements -The default pam_cracklib PAM module provides strength +The default pam_pwquality PAM module provides strength checking for passwords. It performs a number of checks, such as making sure passwords are not similar to dictionary words, are of at least a certain length, are not the previous password reversed, and are not simply a change of case from the previous password. It can also require passwords to be in certain character classes.

-The pam_passwdqc PAM module also provides the ability to enforce -stringent password strength requirements. It is provided -in an RPM of the same name. -

-The man pages pam_cracklib(8) and pam_passwdqc(8) -provide information on the capabilities and configuration of -each.
+The man page pam_pwquality(8) provide further information +on the capabilities and configuration.
Set Password Quality Requirements, if using -pam_cracklib -The pam_cracklib PAM module can be configured to meet + pam_pwquality +The pam_pwquality PAM module can be configured to meet requirements for a variety of policies.

-For example, to configure pam_cracklib to require at least one uppercase +For example, to configure pam_pwquality to require at least one uppercase character, lowercase character, digit, and other (special) character, locate the following line in /etc/pam.d/system-auth: -
password requisite pam_cracklib.so try_first_pass retry=3
+
password requisite pam_pwquality.so try_first_pass retry=3
and then alter it to read: -
password required pam_cracklib.so try_first_pass retry=3 maxrepeat=3 minlen=14 dcredit=-1 ucredit=-1 ocredit=-1 lcredit=-1 difok=4
+
password required pam_pwquality.so try_first_pass retry=3 maxrepeat=3 minlen=14 dcredit=-1 ucredit=-1 ocredit=-1 lcredit=-1 difok=4
If no such line exists, add one as the first line of the password section in /etc/pam.d/system-auth. The arguments can be modified to ensure compliance with your organization's security policy. Discussion of each parameter follows. @@ -268,14 +263,14 @@ is different from account lockout, which Set Password to Maximum of Three Consecutive Repeating Characters -The pam_cracklib module's maxrepeat parameter controls requirements for +The pam_pwquality module's maxrepeat parameter controls requirements for consecutive repeating characters. When set to a positive number, it will reject passwords which contain more than that number of consecutive characters. Add maxrepeat=3 -after pam_cracklib.so to prevent a run of four or more identical characters. +after pam_pwquality.so to prevent a run of four or more identical characters. To check the maximum value for consecutive repeating characters, run the following command: -
$ grep pam_cracklib /etc/pam.d/system-auth
+
$ grep pam_pwquality /etc/pam.d/system-auth
Look for the value of the maxrepeat parameter. The DoD requirement is 3.
@@ -413,7 +408,7 @@ Note that passwords which are changed on Set Password Strength Minimum Different Categories -The pam_cracklib module's minclass parameter controls requirements for +The pam_pwquality module's minclass parameter controls requirements for usage of different character classes, or types, of character that must exist in a password before it is considered valid. For example, setting this value to three (3) requires that any password must have characters from at least three different categories in order to be @@ -425,7 +420,7 @@ four categories available: * Digits * Special characters (for example, punctuation) -Add minclass=NUM after pam_cracklib.so entry into the +Add minclass=NUM after pam_pwquality.so entry into the /etc/pam.d/system-auth file in order to require differing categories of characters when changing passwords, substituting NUM appropriately (for example to require at least three character classes to be used in password, use minclass=3). @@ -433,7 +428,7 @@ require at least three character classes To check how many categories of characters must be used in password during a password change, run the following command: -
$ grep pam_cracklib /etc/pam.d/system-auth
+
$ grep pam_pwquality /etc/pam.d/system-auth
The minclass parameter will indicate how many character classes must be used. If the requirement was for the password to contain characters from three different categories, then this would appear as minclass=3.