Difference between revisions of "Linux password security"
(Created page with "== Introduction == This artile briefly describes ways to enforce Linux password security. == Password expiry == === Expiry defaults === We can manage the password expiry by ed...") |
m |
||
Line 56: | Line 56: | ||
vi /etc/pam.d/common-password | vi /etc/pam.d/common-password | ||
password requisite pam_cracklib.so ucredit=-1 lcredit=-1 | password requisite pam_cracklib.so ucredit=-1 lcredit=-1 | ||
[[Category:Linux]][[Category:Debian]][[Category:OpenSuSE]] |
Latest revision as of 10:42, 22 November 2019
Introduction
This artile briefly describes ways to enforce Linux password security.
Password expiry
Expiry defaults
We can manage the password expiry by editing /etc/login.defs. The settings below are relevant:
PASS_MAX_DAYS 99999 PASS_MIN_DAYS 0 PASS_MIN_LEN 5 PASS_WARN_AGE 7
These values set the following expiration options:
- PASS_MAX_DAYS: Maximum number of days a password may be used.
- PASS_MIN_DAYS: Minimum number of days allowed between password changes.
- PASS_MIN_LEN: Minimum acceptable password length.
- PASS_WARN_AGE: Number of days warning given before a password expires.
Force password change on next logon
To force a user to change the password on next logon run the following command:
passwd --expire <username>
Check password settings for a user
Next we check the password expiration for the user:
# chage -l <username> Last password change : password must be changed Password expires : password must be changed Password inactive : password must be changed Account expires : never Minimum number of days between password change : 0 Maximum number of days between password change : 99999 Number of days of warning before password expires : 7
Password complexity options
The password complexity is configured using PAM. The settings can be changed in /etc/pam.d/common-password. for Debian based systems and in /etc/pam.d/system-auth for RedHat based systems. On SuSE based systems you need to use pam-config in order to change the values. If you edit the configuration files directly changes will automatically be reverted back by the configuration tool
Deny password re-use
To avoid the user can re-use the same password over and over again Linux can keep track of the password history and specify the number of "old" passwords that cannot be reused. In the example below it's set to 5.
SuSE
pam-config -a --pwhistory-remember=5
Debian
vi /etc/pam.d/common-password password requisite pam_cracklib.so remember=5
Password minimum length
Longer passwords are safer. So it's a good idea to set a minimum lenght for the passwords users can choose. In the example below we set it to a minimum of 15 characters. SuSE
pam-config -a --cracklib --cracklib-minlen=15
Debian
vi /etc/pam.d/common-password password requisite pam_cracklib.so minlen=15
Minimum number of upper- and lowercase characters
Making a password more complex is a good idea to keep hackers at bay. So we can force the users to choose passwords that at least concist of 1 upper- and 1 lowercase character (or more if desired): SuSE
pam-config -a --cracklib --cracklib-lcredit=-1 --cracklib-ucredit=-1
Debian
vi /etc/pam.d/common-password password requisite pam_cracklib.so ucredit=-1 lcredit=-1