GEN000595 - Password hashes must have been generated using a FIPS 140-2 hashing algorithm - 'Verify no password hashes in /etc/passwd'

Information

Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors. The use of unapproved algorithms may result in weak password hashes that are more vulnerable to compromise.

Solution

Change the passwords for all accounts using non-compliant password hashes.

# passwd account
OR
# smitty passwd

(This requires that GEN000590 is already met.)

See Also

https://iasecontent.disa.mil/stigs/zip/U_AIX_6-1_V1R14_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(c), CAT|II, CCI|CCI-000196, Group-ID|V-22304, Rule-ID|SV-38672r1_rule, STIG-ID|GEN000595, Vuln-ID|V-22304

Plugin: Unix

Control ID: 8d09cffec5aada0562d333ca2b618bfc12ba48f89665c704f6037b57b6217b38