> -----Original Message-----
> From: Brad Tilley [mailto:b...@16systems.com]
> Sent: den 14 oktober 2010 13:36
> To: Leif Blixt; openbsd-misc
> Subject: Re: Force passwordcheck in login.conf
>
> Leif Blixt wrote:
>>
>> We are currently being reviewed for PCI DSS compliance, and the big
> problems
>> we have right now with the combination of PCI DSS and OpenBSD is the
> following
>> PCI DSS requirements:
>> 8.5.12 Password history check - you may not use the last 4 passwords.
>> 8.5.13 Lockout after 6 failed attempts - OpenBSD does not lock accounts
>> automatically.
>> 8.5.14 If 8.5.13 takes affect, the account must be locked for at least 30
>> minutes.
>
> I concluded the same for requirement 8. See my rough notes here. I plan
> to add to that page as I do more testing:
>
> http://16systems.com/OpenBSD/pci.html
>
>> How have you addressed these requirements? I'm starting to think we need a
>> RADIUS solution, which seems a bit redundant working with OpenBSD...
>>
>> Regards, Leif
>
> RADIUS may do it if the backend can enforce those things (I don't know
> enough about this to comment, but OpenLDAP may work). If that cannot do
> it, read Appendix B of the PCI DSS carefully. They allow compensating
> controls when the requirements cannot be followed precisely.
>
> Brad

just a quick note on how we addressed 8.5.13 ... yes, it requires python, but
we are
a python shop so this was not an issue for us. i'm just posting it for the
purpose of
sharing ideas.

http://www.deweyonline.com/files/openbsd/login_-custompasswd

Reply via email to