STIGQter STIGQter: STIG Summary: Red Hat Enterprise Linux 8 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 23 Apr 2021:

RHEL 8 must encrypt all stored passwords with a FIPS 140-2 approved cryptographic hashing algorithm.

DISA Rule

SV-230231r627750_rule

Vulnerability Number

V-230231

Group Title

SRG-OS-000073-GPOS-00041

Rule Version

RHEL-08-010110

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure RHEL 8 to encrypt all stored passwords.

Edit/Modify the following line in the "/etc/login.defs" file and set "[ENCRYPT_METHOD]" to SHA512.

ENCRYPT_METHOD SHA512

Check Contents

Verify that the shadow password suite configuration is set to encrypt password with a FIPS 140-2 approved cryptographic hashing algorithm.

Check the hashing algorithm that is being used to hash passwords with the following command:

$ sudo grep -i crypt /etc/login.defs

ENCRYPT_METHOD SHA512

If "ENCRYPT_METHOD" does not equal SHA512 or greater, this is a finding.

Vulnerability Number

V-230231

Documentable

False

Rule Version

RHEL-08-010110

Severity Override Guidance

Verify that the shadow password suite configuration is set to encrypt password with a FIPS 140-2 approved cryptographic hashing algorithm.

Check the hashing algorithm that is being used to hash passwords with the following command:

$ sudo grep -i crypt /etc/login.defs

ENCRYPT_METHOD SHA512

If "ENCRYPT_METHOD" does not equal SHA512 or greater, this is a finding.

Check Content Reference

M

Target Key

2921

Comments