Korean
<< Back
VID 14103
Severity 40
Port 22
Protocol TCP
Class LSC
Detailed Description When a brute force attack or a password guessing attack occurs, by restricting the number of failed passwords appropriately, you can prevent automatic attacks and delay attack time. thereby the risk of password leakage can be reduced.

* Affected platforms:
UNIX, Linux
Recommendation Follow the steps below to set the account lockout.

*Solaris
1. Open "/etc/default/login"
2. Edit or insert as follows
(Before) #RETRIES=2
DISABELTIME=180
LOCK_AFTER_RETRIES=NO
(After) RETRIES=5
DISABELTIME=1800
LOCK_AFTER_RETRIES=YES

*Linux
1. Open "/etc/pam.d/system-auth"
2. Edit or insert as follows
auth required /lib/security/pam_tally.so deny=4 unlock_time=1800 no_magic_root reset
account required /lib/security/pam_tally.so no_magic_root reset

*AIX
1. Open "/etc/security/user"
2. Edit or insert as follows
(Before) loginretries = 0
(After) loginretries = 5

*HP
Trusted Mode
1. Open "/tcb/files/auth/system/default"
2. Edit or insert as follows
(Before) u_maxtries#
(After) u_maxtries#5

Normal Mode
1. Open "/etc/default/security"
2. Edit or insert as follows
(Before) AUTH_MAXTRIES=0
(After) AUTH_MAXTRIES=5
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)