19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.14 Mandatory password protection under UNIX<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

Password protection for each account in a UNIX computer ensures that only<br />

an authorised user can log in with his log-in name, as, after entry of the log-in<br />

name, authentication is effected through entry of the password.<br />

When using passwords for users and groups, the rules described under S 2.11<br />

Provisions governing the use of passwords must be observed. It must be borne<br />

in mind that in some systems only a limited number of characters are<br />

considered during password verification. For implementation of these<br />

measures, appropriate program versions of passwd which ensure compliance<br />

with these rules or administrative measures, e.g. shell scripts and pertinent<br />

cron entries, should be applied.<br />

Another possibility is to replace the UNIX standard command passwd with<br />

other extended functionality password programs. <strong>The</strong>se include the public<br />

domain programs anlpasswd, npasswd and passwd+, which scrutinise new<br />

passwords chosen by users on changing their passwords and reject them if<br />

they are too weak. For example, these programs can be obtained from the FTP<br />

server at ftp://ftp.cert.dfn.de/pub/tools/password/.<br />

Passwords should not be stored in the universally readable /etc/passwd file,<br />

but in a shadow password file that cannot be read by the users. Newer UNIX<br />

systems come with this shadow option, but unfortunately it is not always<br />

activated following initial installation. Thus, for example, under RedHat Linux<br />

when the standard installation is completed, use of the shadow password file is<br />

activated via the command pwconv.<br />

<strong>The</strong> /etc/passwd file must be regularly checked for user IDs without a<br />

password. If such an ID is found, the user must be suspended. If mandatory<br />

password use has been agreed for groups, the /etc/group file must be reviewed<br />

accordingly. However, assignment of group passwords is not recommended.<br />

Each group entry should contain as few users as possible. This facilitates<br />

changing from one group to another for which a user has been entered, while<br />

unauthorised changes by means of appropriate programs are precluded.<br />

All log-ins, especially ones with UID 0, should be scrutinised regularly to<br />

ensure that there is a password and that it is of an acceptable type (see also<br />

S 2.11 and S 4.26). In addition to the programs described in S 4.26 Regular<br />

security checks of the UNIX system, such log-ins can also be detected, for<br />

example with<br />

awk -F: '{if ($3=="0") print $1}' /etc/passwd<br />

awk -F: '{if ($2=="") print $1}' /etc/passwd<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Use appropriate version<br />

of passwd<br />

Suspend user IDs<br />

without a password

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!