Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22302 | GEN000585 | SV-37261r2_rule | IAIA-1 IAIA-2 | Medium |
Description |
---|
Some common password hashing schemes only process the first eight characters of a user's password, which reduces the effective strength of the password. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2015-12-03 |
Check Text ( C-35951r3_chk ) |
---|
Verify no valid password hash in /etc/passwd or /etc/shadow begins with a character other than an underscore (_) or dollar sign ($). # cut -d ':' -f2 /etc/passwd # cut -d ':' -f2 /etc/shadow If any valid password hash is present that does not have an initial underscore (_) or dollar sign ($) character, this is a finding. Note: Locked accounts are indicated by a leading exclamation point (!). System accounts, other than "root", may have an asterisk (*) in the password field. On systems utilizing shadow passwords, the password field in /etc/passwd will be a single "x". |
Fix Text (F-31207r1_fix) |
---|
Change the passwords for all accounts using non-compliant password hashes. (This requires GEN000590 is already met.) |