From de1eb3fe2c49e9bde918fcb80b698217f8958e3e Mon Sep 17 00:00:00 2001 From: Bob Mottram Date: Tue, 29 Nov 2016 15:34:12 +0000 Subject: [PATCH] Passwords are randomly generated --- src/freedombone-tests | 9 --------- 1 file changed, 9 deletions(-) diff --git a/src/freedombone-tests b/src/freedombone-tests index cae35bd1..15817695 100755 --- a/src/freedombone-tests +++ b/src/freedombone-tests @@ -1151,15 +1151,6 @@ function test_stig { output "V-38683" $? ${SETLANG} ################ - ##RHEL-06-000299 - ##The system must require passwords to contain no more than three consecutive repeating characters. - - bash $STIG_TESTS_DIR/check-password.sh /etc/pam.d/common-password pam_cracklib.so maxrepeat lt 3 > /dev/null 2>&1 & - - stig_spinner $! - output "V-38693" $? ${SETLANG} - ################ - ##RHEL-06-000302 ##A file integrity tool must be used at least weekly to check for unauthorized file changes, particularly the addition of unauthorized system libraries or binaries, or for unauthorized modification to authorized system libraries or binaries.