UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The password hashes stored on the system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22304 GEN000595 SV-44865r1_rule DCNR-1 IAIA-1 IAIA-2 Medium
Description
Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors. The use of unapproved algorithms may result in weak password hashes more vulnerable to compromise.
STIG Date
SUSE Linux Enterprise Server v11 for System z 2015-05-27

Details

Check Text ( C-42327r1_chk )
Check all password hashes in /etc/passwd or /etc/shadow begin with '$5$' or '$6$'.

Procedure:
# cut -d ':' -f2 /etc/passwd
# cut -d ':' -f2 /etc/shadow

Any password hashes present not beginning with '$5$' or '$6$', is a finding.
Fix Text (F-38298r1_fix)
Change the passwords for all accounts using non-compliant password hashes.

(This requires GEN000590 is already met.)