PHTN-30-000117 - The Photon operating system must store only encrypted representations of passwords.

Information

Passwords must be protected at all times via strong, one-way encryption. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised. If they are encrypted with a weak cipher, those passwords are much more vulnerable to offline brute-force attacks.

Solution

Navigate to and open:

/etc/pam.d/system-password

Add the argument 'sha512' to the 'password' line:

password required pam_unix.so sha512 shadow try_first_pass

Note: On vCenter appliances, the equivalent file must be edited under '/etc/applmgmt/appliance', if one exists, for the changes to persist after a reboot.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_7-0_Y24M01_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(c), CAT|II, CCI|CCI-000196, Rule-ID|SV-256585r887429_rule, STIG-ID|PHTN-30-000117, Vuln-ID|V-256585

Plugin: Unix

Control ID: 419f6dbc628c762bb2bb5bfd5b65e63712d1f707dea4f4c6cbd5c2f3ae36d552