SLES-12-010230 - The SUSE operating system must configure the Linux Pluggable Authentication Modules (PAM) to only store encrypted representations of passwords - sha512

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised.

Satisfies: SRG-OS-000120-GPOS-00061

Solution

Configure the SUSE operating system Linux PAM to only store encrypted representations of passwords. All account passwords must be hashed with SHA512 encryption strength.

Edit '/etc/pam.d/common-password' and edit the line containing 'pam_unix.so' to contain the SHA512 keyword after third column. Remove the 'nullok' option.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SLES_12_V2R2_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-13, CAT|II, CCI|CCI-000196, CCI|CCI-000803, Rule-ID|SV-217124r603262_rule, STIG-ID|SLES-12-010230, STIG-Legacy|SV-91801, STIG-Legacy|V-77105, Vuln-ID|V-217124

Plugin: Unix

Control ID: 268a52c4d8f289a99f07c531a6fc6e86e07b913da82ff6b8cf95c228df2849e4