Skip to content

Commit

Permalink
Update set_password_hashing_algorithm_passwordauth for RHEL 10 STIG
Browse files Browse the repository at this point in the history
  • Loading branch information
Mab879 committed Dec 20, 2024
1 parent ed46c2a commit f3e1cc9
Showing 1 changed file with 27 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
srg_requirement: |-
{{{ full_name }}} pam_unix.so module must be configured in the password-auth file to use a FIPS 140-3 approved cryptographic hashing algorithm for system authentication.
fixtext: |-
Configure {{{ full_name }}} to use a FIPS 140-3 approved cryptographic hashing algorithm for system authentication.
Edit/modify the following line in the "/etc/pam.d/password-auth" file to include the yescrypt option for pam_unix.so:
password sufficient pam_unix.so yescrypt
checktext: |-
Verify that the pam_unix.so module is configured to use yescrypt in /etc/pam.d/password-auth with the following command:
$ grep "^password.*pam_unix.so.*yescrypt" /etc/pam.d/password-auth
password sufficient pam_unix.so yescrypt
If "yescrypt" is missing, or the line is commented out, this is a finding.
vuldiscussion: |-
Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and; therefore, cannot be relied upon to provide confidentiality or integrity, and DOD data may be compromised.
{{{ full_name }}} systems utilizing encryption are required to use FIPS-compliant mechanisms for authenticating to cryptographic modules.
FIPS 140-3 is the current standard for validating that mechanisms used to access cryptographic modules utilize authentication that meets DOD requirements. This allows for Security Levels 1, 2, 3, or 4 for use on a general-purpose computing system.

0 comments on commit f3e1cc9

Please sign in to comment.