GEN001470 - The /etc/passwd file must not contain password hashes

Information

If password hashes are readable by non-administrators, the passwords are subject to attack through lookup tables or cryptographic weaknesses in the hashes.

Solution

Migrate /etc/passwd password hashes.

For Trusted Mode:
Use the System Administration Manager (SAM) or the System Management Homepage (SMH) to migrate from a non-SMSE Standard Mode to Trusted Mode.

For SMSE Mode:
Use the following command to create the shadow file. The command will then copy all encrypted passwords into the shadow file and replace the passwd file password entries with an 'x'.
# pwconv

See Also

https://iasecontent.disa.mil/stigs/zip/U_HPUX_11-31_V1R19_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5, CAT|II, CCI|CCI-000201, Rule-ID|SV-38323r2_rule, STIG-ID|GEN001470, Vuln-ID|V-22347

Plugin: Unix

Control ID: 4679ebccaad1847987e2947788774d4c374c06e569c3cd2641a33451d5afa6a6