GEN000595 - The password hashes stored on the system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm - '/etc/shadow'

Information

Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors. The use of unapproved algorithms may result in weak password hashes more vulnerable to compromise.

Solution

Change the passwords for all accounts using non-compliant password hashes.

(This requires GEN000590 is already met.)

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V1R14_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-13, CAT|II, CCI|CCI-000196, Rule-ID|SV-63949r1_rule, STIG-ID|GEN000595, Vuln-ID|V-22304

Plugin: Unix

Control ID: ad39b740e9ccf021a96ba0761b5a4cab69505d02390899908c05ae0e43be7fe4