SV-230237r627750_rule
V-230237
SRG-OS-000120-GPOS-00061
RHEL-08-010160
CAT II
10
Configure RHEL 8 to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
Edit/modify the following line in the file "/etc/pam.d/password-auth" and "/etc/pam.d/system-auth" files to include the sha512 option for pam_unix.so:
password sufficient pam_unix.so sha512 rounds=5000 shadow remember=5
Verify that pam_unix.so auth is configured to use sha512.
Check that pam_unix.so auth is configured to use sha512 in both /etc/pam.d/password-auth and /etc/pam.d/system-auth with the following command:
$ sudo grep password /etc/pam.d/password-auth | grep pam_unix
password sufficient pam_unix.so sha512 rounds=5000
$ sudo grep password /etc/pam.d/system-auth | grep pam_unix
password sufficient pam_unix.so sha512 rounds=5000
If "sha512" is not an option in both outputs, or is commented out, this is a finding.
V-230237
False
RHEL-08-010160
Verify that pam_unix.so auth is configured to use sha512.
Check that pam_unix.so auth is configured to use sha512 in both /etc/pam.d/password-auth and /etc/pam.d/system-auth with the following command:
$ sudo grep password /etc/pam.d/password-auth | grep pam_unix
password sufficient pam_unix.so sha512 rounds=5000
$ sudo grep password /etc/pam.d/system-auth | grep pam_unix
password sufficient pam_unix.so sha512 rounds=5000
If "sha512" is not an option in both outputs, or is commented out, this is a finding.
M
2921