GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes.

Information

Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors. The use of unapproved algorithms may result in weak password hashes that are more vulnerable to compromise.

Solution

Configure the system to use a FIPS 140-2 approved cryptographic hash algorithm for creating password hashes.
# chsec -f /etc/security/login.cfg -s usw -a pwd_algorithm=ssha256

See Also

http://iasecontent.disa.mil/stigs/zip/U_STIG_Library_2015_07.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-7, CAT|II, CCI|CCI-000803, Rule-ID|SV-38938r1_rule, STIG-ID|GEN000590, Vuln-ID|V-22303

Plugin: Unix

Control ID: a5d46679e933417c7221d6a4cbb624d82ac86857f1f996b3844e1b6ebff785b6