PHTN-30-000117 - The Photon operating system must store only encrypted representations of passwords.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Passwords must be protected at all times via strong, one-way encryption. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised. If they are encrypted with a weak cipher, those passwords are much more vulnerable to offline brute-force attacks.

Solution

Navigate to and open:

/etc/pam.d/system-password

Add the argument 'sha512' to the 'password' line:

password required pam_unix.so sha512 shadow try_first_pass

Note: On vCenter appliances, the equivalent file must be edited under '/etc/applmgmt/appliance', if one exists, for the changes to persist after a reboot.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_7-0_Y23M07_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000196, Rule-ID|SV-256585r887429_rule, STIG-ID|PHTN-30-000117, Vuln-ID|V-256585

Plugin: Unix

Control ID: 469e992a9b9b615b8a3254b1935c51584b545d8a66662fe99f51121c8c2d2c38