UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

AIX root passwords must never be passed over a network in clear text form.


Overview

Finding ID Version Rule ID IA Controls Severity
V-215221 AIX7-00-001124 SV-215221r508663_rule High
Description
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised.
STIG Date
IBM AIX 7.x Security Technical Implementation Guide 2020-09-11

Details

Check Text ( C-16419r294114_chk )
Determine if root has logged in over an unencrypted network connection:

# last | grep "root " | egrep -v "reboot|console" | more
root pts/1 10.74.17.76 Jul 4 16:44 - 17:39 (00:54)

Next, determine if the SSH daemon is running:

# ps -ef |grep sshd
root 3670408 6029762 0 Jan 24 - 0:00 /usr/sbin/sshd

If root has logged in over the network and SSHD is not running, this is a finding.
Fix Text (F-16417r294115_fix)
If OpenSSH server is not installed, install it from the from AIX DVD Volume 1 using the following command (assuming that the DVD device is /dev/cd0):
# installp -aXYgd /dev/cd0 -e /tmp/install.log openssh.base.server

Start SSH server if it is not started:
# startsrc -s sshd

Enable SSH on the system and use it for all remote connections used to attain root access.

Disable direct root remote login:
# chsec -f /etc/security/user -s root -a rlogin=false