STIGQter STIGQter: STIG Summary: Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The Ubuntu operating system must encrypt all stored passwords with a FIPS 140-2 approved cryptographic hashing algorithm.

DISA Rule

SV-219176r610963_rule

Vulnerability Number

V-219176

Group Title

SRG-OS-000073-GPOS-00041

Rule Version

UBTU-18-010104

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Ubuntu operating system to encrypt all stored passwords.

Edit/Modify the following line in the "/etc/login.defs" file and set "ENCRYPT_METHOD" to SHA512.

ENCRYPT_METHOD SHA512

Check Contents

Verify that the shadow password suite configuration is set to encrypt password with a FIPS 140-2 approved cryptographic hashing algorithm.

Check the hashing algorithm that is being used to hash passwords with the following command:

# cat /etc/login.defs | grep -i crypt

ENCRYPT_METHOD SHA512

If "ENCRYPT_METHOD" does not equal SHA512 or greater, this is a finding.

Vulnerability Number

V-219176

Documentable

False

Rule Version

UBTU-18-010104

Severity Override Guidance

Verify that the shadow password suite configuration is set to encrypt password with a FIPS 140-2 approved cryptographic hashing algorithm.

Check the hashing algorithm that is being used to hash passwords with the following command:

# cat /etc/login.defs | grep -i crypt

ENCRYPT_METHOD SHA512

If "ENCRYPT_METHOD" does not equal SHA512 or greater, this is a finding.

Check Content Reference

M

Target Key

4055

Comments