Password = wordlist word (UNIX)

Module: Password Strength

This check examines each password and reports matches with words in the word list (e.g., golf -> golf). The word files list lets you enable and disable the word files that are used for this check. For shorter run times, in the Percent of words per policy run text box, type a number less than 100. This defines the percentage of words that are examined during each run. Each run starts at the place in the word list where the previous run ended.

The following table lists the error messages for the check.

Table: Error messages for Password = wordlist word

Message String ID and Category

Platform and Message Numeric ID

Message Title and Description

Additional Information

String ID: STKU_GUESSPASS

Category: ESM Error

UNIX (5330)

Title: Guessed user password

Description:Symantec ESM guessed the passwords of the accounts listed below. This is a security problem because an intruder can also guess these passwords while trying to break into your system. You should immediately assign more secure passwords to these accounts. Then instruct each user to login, using the more secure password, and change the password again. A secure password should have six to eight characters, should not be found in any dictionary, and should have at least one non-alphabetic character. A secure password should also not match an account or host name.

Severity: red-4

Correctable: false

Snapshot Updatable: false

Template Updatable: false

Information Field Format: [%s]

String ID: STKU_NOWORDS

Category: ESM Error

UNIX (5336)

Title: No word files specified

Description:The Password = wordlist word option was enabled but no word files were specified. Change your policy so that at least one word file is enabled.

Severity: red-4

Correctable: false

Snapshot Updatable: false

Template Updatable: false

Information Field Format: [%s]

String ID: STKU_UNKNOWN_PAM_MODULE

Category: ESM Error

UNIX (5368)

Title: Unknown PAM authentication module

Description:ESM does not recognize any of the modules currently configured for authentication. Default Solaris hash types will be used for password cracking.

Severity: yellow-1

Correctable: false

Snapshot Updatable: false

Template Updatable: false

Information Field Format: []