UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The password hashes stored on the system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22304 GEN000595 SV-34824r1_rule DCNR-1 IAIA-1 IAIA-2 Medium
Description
Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors. The use of unapproved algorithms may result in weak password hashes that are more vulnerable to compromise.
STIG Date
HP-UX 11.23 Security Technical Implementation Guide 2012-05-25

Details

Check Text ( C-36266r2_chk )
Verify all password hashes in /tcb/files/auth/[a-z,A-Z]*/* begin with '$6$'.

# find /tcb/files/auth/[a-z,A-Z}*/* | xargs -n1 egrep "name=|pwd="

If any password hash does not begin with '$6$', this is a finding.
Fix Text (F-31523r1_fix)
Change the passwords for all accounts using non-compliant password hashes.

(This requires that GEN000590 is already met.)