ESXI-06-000033 - The password hashes stored on the system must have been generated using a FIPS 140-2 approved cryptographic hash algorithm.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors. The use of unapproved algorithms may result in weak password hashes more vulnerable to compromise.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

To set the remember option, add or correct the following line in '/etc/pam.d/passwd':

password sufficient /lib/security/$ISA/pam_unix.so use_authtok nullok shadow sha512 remember=5

See Also

http://iasecontent.disa.mil/stigs/zip/U_VMware_vSphere_6-0_ESXi_V1R4_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Group-ID|V-63235, Rule-ID|SV-77725r1_rule, STIG-ID|ESXI-06-000033

Plugin: VMware

Control ID: 7584ebc94759bc29fddfb803636e371b8b67cd8d184805e79a6e14e2e93c6659