GEN000595 - Password hashes must have been generated using a FIPS 140-2 hashing algorithm - 'Verify no password hashes in /etc/passwd'

Information

Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors. The use of unapproved algorithms may result in weak password hashes that are more vulnerable to compromise.

Solution

Change the passwords for all accounts using non-compliant password hashes.
# passwd account
OR
# smitty passwd
(This requires that GEN000590 is already met.)

See Also

http://iasecontent.disa.mil/stigs/zip/U_STIG_Library_2015_07.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(c), CAT|II, CCI|CCI-000196, Rule-ID|SV-38672r1_rule, STIG-ID|GEN000595, Vuln-ID|V-22304

Plugin: Unix

Control ID: 35b0e0997602b86fe7983490b9708c10bf64fbf8482f8fcfc6fefad660c4161c