sábado, 12 de noviembre de 2022

Debian 10 Buster Aministration Tutorials with examples

Debian 10 Buster Aministration Tutorials with examples

https://www.server-world.info/en/note?os=Debian_10&p=download&f=1


Debian 10 Buster


















Tiene muchos temas, por ejemplo las Reglas para Setear los Passwords, entre muchas cosas:

Set Password Rules
2019/08/26
 
Set Password Rules for security reasons.
[1]Install password quality checking library.
root@dlp:~# 
apt -y install libpam-pwquality
[2]Set number of days for password Expiration.
Users must change their password within the days.
This setting impacts only when creating a user, not impacts to exisiting users.
If set to exisiting users, run the command [chage -M (days) (user)].
root@dlp:~# 
vi /etc/login.defs
# line 160: set 60 for Password Expiration

PASS_MAX_DAYS 
60
[3]Set minimum number of days available of password.
Users must use their password at least this days after changing it.
This setting impacts only when creating a user, not impacts to exisiting users.
If set to exisiting users, run the command [chage -m (days) (user)].
root@dlp:~# 
vi /etc/login.defs
# line 161: set 2 for Minimum number of days available

PASS_MIN_DAYS 
1
[4]Set number of days for warnings before expiration.
This setting impacts only when creating a user, not impacts to exisiting users.
If set to exisiting users, run the command [chage -W (days) (user)].
root@dlp:~# 
vi /etc/login.defs
# line 162: set 7 for number of days for warnings

PASS_WARN_AGE 
7
[5]Limit using a password that was used in past.
Users can not set the same password within the generation.
root@dlp:~# 
vi /etc/pam.d/common-password
# line 26: prohibit to use the same password for 5 generation in past

password        [success=1 default=ignore]      pam_unix.so obscure use_authtok try_first_pass sha512 remember=5
[6]Set minimum password length.
Users can not set thier password length less than this parameter.
root@dlp:~# 
vi /etc/security/pwquality.conf
# line 11: uncomment and set minimum password length

minlen = 
8
[7]Set minimum number of required classes of characters for the new password. (kinds ⇒ UpperCase / LowerCase / Digits / Others)
root@dlp:~# 
vi /etc/security/pwquality.conf
# line 34: uncomment and set minimum number of required classes of characters

minclass = 
3
[8]Set maximum number of allowed consecutive same characters in the new password.
root@dlp:~# 
vi /etc/security/pwquality.conf
# line 38: uncomment and set maximum number of allowed consecutive same characters

maxrepeat = 
2
[9]Set maximum number of allowed consecutive characters of the same class in the new password.
root@dlp:~# 
vi /etc/security/pwquality.conf
# line 43: uncomment and set maximum number of allowed consecutive characters of the same class

maxclassrepeat = 
4
[10]Require at least one lowercase character in the new password.
root@dlp:~# 
vi /etc/security/pwquality.conf
# line 25: uncomment and set minimum lowercase character

lcredit = 
-1
[11]Require at least one uppercase character in the new password.
root@dlp:~# 
vi /etc/security/pwquality.conf
# line 20: uncomment and set minimum uppercase character

ucredit = 
-1
[12]Require at least one digit in the new password.
root@dlp:~# 
vi /etc/security/pwquality.conf
# line 15: uncomment and set minimum digit character

dcredit = 
-1
[13]Require at least one other character in the new password.
root@dlp:~# 
vi /etc/security/pwquality.conf
# line 30: uncomment and set minimum other special character

ocredit = 
-1
[14]Set maximum length of monotonic character sequences in the new password. (ex ⇒ '12345', 'fedcb')
root@dlp:~# 
vi /etc/security/pwquality.conf
# add to the end

maxsequence = 3
[15]Set number of characters in the new password that must not be present in the old password.
root@dlp:~# 
vi /etc/security/pwquality.conf
# line 6: uncomment and set number of characters

difok = 
5
[16]Check whether the words longer than 3 characters from the GECOS field of the user's passwd entry are contained in the new password.
root@dlp:~# 
vi /etc/security/pwquality.conf
# line 47: uncomment and enable it

gecoscheck = 
1
[17]Set Ssace separated list of words that must not be contained in the password.
root@dlp:~# 
vi /etc/security/pwquality.conf
# add to the end

badwords = denywords1 denywords2 denywords3
[18]Set hash/crypt algorithm for new passwords. (default is sha512)
root@dlp:~# 
vi /etc/pam.d/common-password
# line 26: hnage algorithm to sha512

password        [success=1 default=ignore]      pam_unix.so obscure use_authtok try_first_pass sha512

No hay comentarios:

Publicar un comentario