Stuart VanZee wrote:
The company I work for is having their yearly Payment Card Industry
(PCI) assessment and while I believe that OpenBSD is the most secure
OS going, I am having some problems proving it.  Here are some of
the issues I need to figure out.

8.5.9    For a sample of system components, obtain and inspect system
         configuration settings to verify that user password parameters
         are set to require users to change passwords at least every
         90 days.
     I have no idea how to set OpenBSD to do this, any suggestions?

You configure this in the login class for users (probably the default and staff login classes) - see login.conf(5).

8.5.10   For a sample of system components, obtain and inspect system
         configuration settings to verify that user password parameters
         are set to require passwords to be at least seven characters long.
     I know that OpenBSD uses 6 characters, is there a way to change this?

login.conf(5)

8.5.12   For a sample of system components, obtain and inspect system
         configuration settings to verify that user password parameters
         are set to require that new passwords cannot be the same as the
         four previously used passwords.
     I have no idea how to set OpenBSD to do this, any suggestions?

You can specify a passwordcheck program in login.conf(5), which you could use to store (hashes of) passwords that have been previously used by each user.

8.5.13   For a sample of system components, obtain and inspect system
         configuration settings to verify that user password parameters
         are set to require that a users account is locked out after not
         more than six invalid logon attempts.

8.5.14   For a sample of system components, obtain and inspect system
         configuration settings to verify that user password parameters
         are set to require that once a users account is locked out, it
         remains locked for a minimum of 30 minutes or until a system
         administrator resets the account.
     13 and 14 go togeather, I know that this isn't the scheme that OpenBSD
     uses.  In OpenBSD, each time a user fails a password attempt it takes
     a little bit longer to get a new login prompt.  Maybe if there was a
     way that I could set it so that by the time six failures happen that
     it takes 30 minutes to get the next login prompt.  Does anyone know
     how to do this or have any other suggestion?

I don't, I'm afraid, and a quick Google (which could have answered some of your other questions) suggests that it's come up before both on misc@ and elsewhere. I know you don't want to hear about how the PCI DSS is wrong, but in this case their wrongness is, I think, the reason it's not an available option.

You could likely implement this yourself with a custom login style, though.

8.5.15   For a sample of system components, obtain and inspect system
         configuration settings to verify that system/session idle time
         out features have been set to 15 minutes or less.
     This one requires that a user must re-enter the password if their
     terminal is idle for more than 15 minutes.  Any ideas how to do this
     with OpenBSD?

You might be able to do this with tmux(1), if you force it to be started for every user with some kind of global configuration. You might also be able to go for strictly X11 logins, and then using xlock.
--
 Matthew Weigel
 hacker
 unique & idempot . ent

Reply via email to