UCF STIG Viewer Logo

The system must enforce compliance of the entire password during authentification.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22302 GEN000585 SV-37261r2_rule Medium
Description
Some common password hashing schemes only process the first eight characters of a user's password, which reduces the effective strength of the password.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2017-03-01

Details

Check Text ( C-35951r3_chk )
Verify no valid password hash in /etc/passwd or /etc/shadow begins with a character other than an underscore (_) or dollar sign ($).

# cut -d ':' -f2 /etc/passwd
# cut -d ':' -f2 /etc/shadow

If any valid password hash is present that does not have an initial underscore (_) or dollar sign ($) character, this is a finding.

Note: Locked accounts are indicated by a leading exclamation point (!). System accounts, other than "root", may have an asterisk (*) in the password field. On systems utilizing shadow passwords, the password field in /etc/passwd will be a single "x".
Fix Text (F-31207r1_fix)
Change the passwords for all accounts using non-compliant password hashes.

(This requires GEN000590 is already met.)