UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The BIG-IP appliance must be configured to obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.


Overview

Finding ID Version Rule ID IA Controls Severity
V-60163 F5BI-DM-000133 SV-74593r2_rule Medium
Description
To prevent the compromise of authentication information such as passwords during the authentication process, the feedback from the network device must not provide any information that would allow an unauthorized user to compromise the authentication mechanism. Obfuscation of user-provided information when typed into the system is a method used in addressing this risk. For example, displaying asterisks when a user types in a password is an example of obscuring feedback of authentication information.
STIG Date
F5 BIG-IP Device Management 11.x Security Technical Implementation Guide 2017-06-27

Details

Check Text ( C-61017r2_chk )
Verify if the BIG-IP appliance is configured to obscure feedback of authentication information during the authentication process.

Navigate to the BIG-IP System manager >> System >> Users >> Authentication.

Verify "Encryption" is configured to use SSL for the authentication process with a properly configured authentication server.

If the BIG-IP appliance is not configured to obscure feedback of authentication information during the authentication process, this is a finding.
Fix Text (F-65751r1_fix)
Configure the BIG-IP appliance to use SSL communications when connecting to a properly configured authentication server.