Hi, the attached files don't look like ones that were changed by the USG
hardening script. Specially because the hardening scripts add the
pam_tally2 files in specific places. Below is the script code:

#################################################################################
#5.3.2 Ensure lockout for failed password attempts is configured (Automated)
rule-5.3.2()
{
    print_rule_banner "Ensure lockout for failed password attempts is 
configured"
    egrep -q 'pam_tally2.so.* deny=5 unlock_time=900' /etc/pam.d/common-auth
    if [ $? -gt 0 ]; then
        sed -i "1i # CIS rule 5.3.2\nauth required pam_tally2.so onerr=fail 
audit silent deny=5 unlock_time=900" /etc/pam.d/common-auth
        sed -i -E '/account\srequisite\s+pam_deny.so/a # CIS rule 
5.3.2\naccount required\t\t\tpam_tally2.so' /etc/pam.d/common-account
    fi
}
#################################################################################

As one may see, the code inserts the pam_tally2 line at the 1st line of
the common-auth file and appends the pam_tally2 line just after the
'account requisite pam_deny.so' line, in the common-auth file.

Check with the customer if they move the pam_tally2 lines to their
correct spot if it will work.

I can see a bug in the OVAL used to audit the files, because they just
check for the pam_tally2 lines and not their correct position.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1942010

Title:
  Ensure lockout for failed password attempts is configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1942010/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to