GEN000595 - The password hashes must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm - '/etc/shadow'

Information

Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors. The use of unapproved algorithms may result in weak password hashes more vulnerable to compromise.

Solution

Change the passwords for all accounts using non-compliant password hashes.

See Also

http://iasecontent.disa.mil/stigs/zip/U_RedHat_5_V1R18_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(c), CAT|II, CCI|CCI-000196, Group-ID|V-22304, Rule-ID|SV-26316r2_rule, STIG-ID|GEN000595, Vuln-ID|V-22304

Plugin: Unix

Control ID: 40ecd171456374c4b9bb13af8031e8dae29e6d437be901264cfcc3627e71536b