STIGQter STIGQter: STIG Summary: SLES 12 Security Technical Implementation Guide Version: 1 Release: 4 Benchmark Date: 24 Jan 2020: The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords.

DISA Rule

SV-91795r2_rule

Vulnerability Number

V-77099

Group Title

SRG-OS-000073-GPOS-00041

Rule Version

SLES-12-010220

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the SUSE operating system to encrypt all stored passwords with a strong cryptographic hash.

Set "ENCRYPT_METHOD" in "/etc/login.defs" to "SHA512" by running the following command as a superuser:

# sudo grep -q '^.*ENCRYPT_METHOD' /etc/login.defs && sudo sed -i 's/^.*ENCRYPT_METHOD.*/ENCRYPT_METHOD SHA512/' /etc/login.defs || sudo echo 'ENCRYPT_METHOD SHA512' >> /etc/login.defs

Lock all interactive user accounts not using SHA512 hashing until the passwords can be regenerated.

Check Contents

Verify the SUSE operating system requires the shadow password suite configuration be set to encrypt interactive user passwords using a strong cryptographic hash.

Check that the interactive user account passwords are using a strong password hash with the following command:

# sudo cut -d: -f2 /etc/shadow

$6$kcOnRq/5$NUEYPuyL.wghQwWssXRcLRFiiru7f5JPV6GaJhNC2aK5F3PZpE/BCCtwrxRc/AInKMNX3CdMw11m9STiql12f/

Password hashes "!" or "*" indicate inactive accounts not available for logon and are not evaluated.

If any interactive user password hash does not begin with "$6", this is a finding.

Vulnerability Number

V-77099

Documentable

False

Rule Version

SLES-12-010220

Severity Override Guidance

Verify the SUSE operating system requires the shadow password suite configuration be set to encrypt interactive user passwords using a strong cryptographic hash.

Check that the interactive user account passwords are using a strong password hash with the following command:

# sudo cut -d: -f2 /etc/shadow

$6$kcOnRq/5$NUEYPuyL.wghQwWssXRcLRFiiru7f5JPV6GaJhNC2aK5F3PZpE/BCCtwrxRc/AInKMNX3CdMw11m9STiql12f/

Password hashes "!" or "*" indicate inactive accounts not available for logon and are not evaluated.

If any interactive user password hash does not begin with "$6", this is a finding.

Check Content Reference

M

Target Key

2903

Comments