VMware Cloud Community
Shanew1
Contributor
Contributor

User Password Aging Problems

I am working on hardening my ESX servers and have set the Pass_Max_Days value to 90 using "esxcfg-auth --passmaxdays=90". I confirm that this is correct by running an "esxcfg-auth --probe" command. My problem is that any new local user that I create on the ESX server does not inherit these settings. They successfully inherit the warning and minimum, but not the maximum (see below). Any ideas how to correct this? I understand that I can use the "chage" command per user, but I would rather have new users default to this setting.

Minimum: 7

Maximum: -1

Warning: 14

Inactive: -1

Last Change: Apr 06, 2009

Password Expires: Never

Password Inactive: Never

Account Expires: Never

0 Kudos
7 Replies
Texiwill
Leadership
Leadership

Hello,

Moved to Security and Compliance forum.

How are you creating this new user? Through the VIC or using useradd?


Best regards,
Edward L. Haletky
VMware Communities User Moderator, VMware vExpert 2009
====
Author of the book 'VMWare ESX Server in the Enterprise: Planning and Securing Virtualization Servers', Copyright 2008 Pearson Education.
Blue Gears and SearchVMware Pro Blogs -- Top Virtualization Security Links -- Virtualization Security Round Table Podcast

--
Edward L. Haletky
vExpert XIV: 2009-2023,
VMTN Community Moderator
vSphere Upgrade Saga: https://www.astroarch.com/blogs
GitHub Repo: https://github.com/Texiwill
0 Kudos
Shanew1
Contributor
Contributor

This seems to be working now, but when I reboot my root account reverts back to a password maximum of -1 (password aging disabled). I am working on running a compliance checker (configuresoft) against my ESX servers and one of the checks fails if password aging is not enabled for root. Is this a bug or is there some other configuration that keeps disabling password aging for the root account?

Also, there is another check that fails due to vpxuser not having password aging enabled. As I understand it the vpxuser password is used for communication between VC and ESX and cannot change unless a host is removed and re-added to VC.

0 Kudos
Texiwill
Leadership
Leadership

Hello,

This seems to be working now, but when I reboot my root account reverts back to a password maximum of -1 (password aging disabled). I am working on running a compliance checker (configuresoft) against my ESX servers and one of the checks fails if password aging is not enabled for root. Is this a bug or is there some other configuration that keeps disabling password aging for the root account?

You need to understand how it is doing the test. But the 'root' user never changes and is there before you setup password aging so you must run 'chage' on it.

Also, there is another check that fails due to vpxuser not having password aging enabled. As I understand it the vpxuser password is used for communication between VC and ESX and cannot change unless a host is removed and re-added to VC.

The same is true for vpxuser, you need to use chage on it.


Best regards,
Edward L. Haletky
VMware Communities User Moderator, VMware vExpert 2009
====
Author of the book 'VMWare ESX Server in the Enterprise: Planning and Securing Virtualization Servers', Copyright 2008 Pearson Education.
Blue Gears and SearchVMware Pro Blogs -- Top Virtualization Security Links -- Virtualization Security Round Table Podcast

--
Edward L. Haletky
vExpert XIV: 2009-2023,
VMTN Community Moderator
vSphere Upgrade Saga: https://www.astroarch.com/blogs
GitHub Repo: https://github.com/Texiwill
0 Kudos
Shanew1
Contributor
Contributor

I have used the "chage" command to set password aging for the root account, but when the ESX server reboots the root account reverts to its default settings.

Also, has anyone had luck getting the compliance checking tools (Configuresoft or Tripwire) to give you a 100% compliance. When we run theConfiguresoft checks we get a bunch of ESX logging failed checks and some other failures. We verified logging is working properly and even have a remote syslog server setup. Could these tools be for an older version of ESX (we are using 3.5 U3)?

0 Kudos
Texiwill
Leadership
Leadership

Hello,

I have used the "chage" command to set password aging for the root account, but when the ESX server reboots the root account reverts to its default settings.

That should never happen. At least it has not for me. You sure this is NOT ESXi which would do this.

Also, has anyone had luck getting the compliance checking tools (Configuresoft or Tripwire) to give you a 100% compliance. When we run theConfiguresoft checks we get a bunch of ESX logging failed checks and some other failures. We verified logging is working properly and even have a remote syslog server setup. Could these tools be for an older version of ESX (we are using 3.5 U3)?

Yes it is possible to get ConfigCheck to give 100% but you need to know exactly how the tools are checking for security issues. In general, they are looking for one method and you may be using a different method to verify security. Spacing is often an issue as well.


Best regards,
Edward L. Haletky
VMware Communities User Moderator, VMware vExpert 2009
====
Author of the book 'VMWare ESX Server in the Enterprise: Planning and Securing Virtualization Servers', Copyright 2008 Pearson Education.
Blue Gears and SearchVMware Pro Blogs -- Top Virtualization Security Links -- Virtualization Security Round Table Podcast

--
Edward L. Haletky
vExpert XIV: 2009-2023,
VMTN Community Moderator
vSphere Upgrade Saga: https://www.astroarch.com/blogs
GitHub Repo: https://github.com/Texiwill
0 Kudos
Shanew1
Contributor
Contributor

Nope, it is definitely ESX 3.5 U3 with all of the critical patches.

It appears that the compliance check utilities are giving me some incrorrect results. All of the syslog checks are failing, but I have verified that both local and remote syslog is working fine.

0 Kudos
Texiwill
Leadership
Leadership

Hello,

Nope, it is definitely ESX 3.5 U3 with all of the critical patches.

That is VERY odd.... I will do some digging.

It appears that the compliance check utilities are giving me some incrorrect results. All of the syslog checks are failing, but I have verified that both local and remote syslog is working fine.

The reason is the 'string' they are looking for is not formatted according to their rules. You need to contact the vendor of the utility for the exact string you require. For example:

CISecurity requires 4 settings to be made to syslog.conf while VMware Hardening Guide requires only 1. So you need to know what the exact test is looking at else it will never pass. There are many ways to redirect logs and each tool is basically looking for only 1.


Best regards,
Edward L. Haletky
VMware Communities User Moderator, VMware vExpert 2009
====
Author of the book 'VMWare ESX Server in the Enterprise: Planning and Securing Virtualization Servers', Copyright 2008 Pearson Education.
Blue Gears and SearchVMware Pro Blogs -- Top Virtualization Security Links -- Virtualization Security Round Table Podcast

--
Edward L. Haletky
vExpert XIV: 2009-2023,
VMTN Community Moderator
vSphere Upgrade Saga: https://www.astroarch.com/blogs
GitHub Repo: https://github.com/Texiwill
0 Kudos