UCF STIG Viewer Logo

The system must enforce compliance of the entire password during authentification.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22302 GEN000585 SV-37261r1_rule IAIA-1 IAIA-2 Medium
Description
Some common password hashing schemes only process the first eight characters of a user's password, which reduces the effective strength of the password.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2015-06-12

Details

Check Text ( C-35951r1_chk )
Verify no password hash in /etc/passwd or /etc/shadow begins with a character other than an underscore (_) or dollar sign ($).

# cut -d ':' -f2 /etc/passwd
# cut -d ':' -f2 /etc/shadow

If any password hash is present that does not have an initial underscore (_) or dollar sign ($) character, this is a finding.
Fix Text (F-31207r1_fix)
Change the passwords for all accounts using non-compliant password hashes.

(This requires GEN000590 is already met.)