STIGQter STIGQter: STIG Summary: SUSE Linux Enterprise Server 15 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 23 Apr 2021:

The SUSE operating system must employ FIPS 140-2 approved cryptographic hashing algorithm for system authentication (system-auth).

DISA Rule

SV-234824r622137_rule

Vulnerability Number

V-234824

Group Title

SRG-OS-000120-GPOS-00061

Rule Version

SLES-15-010250

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the SUSE operating system to require "pam_unix.so auth" to use SHA512.

Edit "/etc/pam.d/common-auth" and edit the line containing "pam_unix.so" to contain the option "sha512" after the third column.

Check Contents

Verify the SUSE operating system requires that "pam_unix.so auth" is configured to use SHA512

Check the algorithms used to hash system passwords with the command:

> grep pam_unix.so /etc/pam.d/common-auth
auth required pam_unix.so sha512 try_first_pass

If the command does not return anything, the returned line is commented out, or has a second column value different from "required", or does not contain "sha512", this is a finding.

Vulnerability Number

V-234824

Documentable

False

Rule Version

SLES-15-010250

Severity Override Guidance

Verify the SUSE operating system requires that "pam_unix.so auth" is configured to use SHA512

Check the algorithms used to hash system passwords with the command:

> grep pam_unix.so /etc/pam.d/common-auth
auth required pam_unix.so sha512 try_first_pass

If the command does not return anything, the returned line is commented out, or has a second column value different from "required", or does not contain "sha512", this is a finding.

Check Content Reference

M

Target Key

5274

Comments