UCF STIG Viewer Logo

The password hashes stored on the system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22304 GEN000595 SV-34824r1_rule DCNR-1 IAIA-1 IAIA-2 Medium
Description
Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors. The use of unapproved algorithms may result in weak password hashes that are more vulnerable to compromise.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2013-03-28

Details

Check Text ( C-36266r2_chk )
Verify all password hashes in /tcb/files/auth/[a-z,A-Z]*/* begin with '$6$'.

# find /tcb/files/auth/[a-z,A-Z}*/* | xargs -n1 egrep "name=|pwd="

If any password hash does not begin with '$6$', this is a finding.
Fix Text (F-31523r1_fix)
Change the passwords for all accounts using non-compliant password hashes.

(This requires that GEN000590 is already met.)