From: root <[email protected]>

---
 RHEL6/input/system/accounts/pam.xml |   22 +++++++++++-----------
 1 files changed, 11 insertions(+), 11 deletions(-)

diff --git a/RHEL6/input/system/accounts/pam.xml 
b/RHEL6/input/system/accounts/pam.xml
index 9089911..4f60fb1 100644
--- a/RHEL6/input/system/accounts/pam.xml
+++ b/RHEL6/input/system/accounts/pam.xml
@@ -118,9 +118,9 @@ operator="equals" interactive="0">
 <title>dcredit</title>
 <description>Minimum number of digits in password</description>
 <value selector="">-1</value>
-<value selector="2">-2</value>
 <value selector="1">-1</value>
-<value selector="0">0</value>
+<value selector="2">-2</value>
+<value selector="3">-3</value>
 </Value>
 <Value id="var_password_pam_cracklib_ocredit" type="number"
 operator="equals" interactive="0">
@@ -128,27 +128,27 @@ operator="equals" interactive="0">
 <description>Minimum number of other (special characters) in
 password</description>
 <value selector="">-1</value>
-<value selector="2">-2</value>
 <value selector="1">-1</value>
-<value selector="0">0</value>
+<value selector="2">-2</value>
+<value selector="3">-3</value>
 </Value>
 <Value id="var_password_pam_cracklib_lcredit" type="number"
 operator="equals" interactive="0">
 <title>lcredit</title>
 <description>Minimum number of lower case in password</description>
 <value selector="">-1</value>
-<value selector="2">-2</value>
 <value selector="1">-1</value>
-<value selector="0">0</value>
+<value selector="2">-2</value>
+<value selector="3">-3</value>
 </Value>
 <Value id="var_password_pam_cracklib_ucredit" type="number"
 operator="equals" interactive="0">
 <title>ucredit</title>
 <description>Minimum number of upper case in password</description>
 <value selector="">-1</value>
-<value selector="2">-2</value>
 <value selector="1">-1</value>
-<value selector="0">0</value>
+<value selector="2">-2</value>
+<value selector="3">-3</value>
 </Value>
 <Value id="var_password_pam_cracklib_difok" type="number"
 operator="equals" interactive="0">
@@ -515,7 +515,7 @@ ensure that the <tt>pam_unix.so</tt> module includes the 
argument
 Using a stronger hashing algorithm makes password cracking attacks more 
difficult.
 </rationale>
 <ident cce="26303-8" />
-<!-- <oval id="accounts_password_hashing_algorithm" /> -->
+<oval id="accounts_password_hashing_algorithm" />
 <ref nist="IA-5" disa="803"/>
 <tested by="DS" on="20121024"/>
 </Rule>
@@ -534,7 +534,7 @@ Inspect <tt>/etc/login.defs</tt> and ensure the following 
line appears:
 <rationale>
 Using a stronger hashing algorithm makes password cracking attacks more 
difficult.
 </rationale>
-<!-- <oval id="accounts_password_hashing_algorithm" /> -->
+<oval id="accounts_password_hashing_algorithm" />
 <ident cce="TODO" />
 <ref nist="IA-5" disa="803"/>
 <tested by="DS" on="20121024"/>
@@ -556,7 +556,7 @@ in the <tt>[default]</tt> section:
 <rationale>
 Using a stronger hashing algorithm makes password cracking attacks more 
difficult.
 </rationale>
-<!-- <oval id="accounts_password_hashing_algorithm" /> -->
+<oval id="accounts_password_hashing_algorithm" />
 <ident cce="TODO" />
 <ref nist="IA-5" disa="803"/>
 <tested by="DS" on="20121026"/>
-- 
1.7.1

_______________________________________________
scap-security-guide mailing list
[email protected]
https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide

Reply via email to