This is not the latest version of the STIG. This is provided for archival purposes. See the latest STIG.

Ubuntu 22.04 LTS must store only encrypted representations of passwords.

STIG ID: UBTU-22-611055  |  SRG: SRG-OS-000073-GPOS-00041 |  Severity: medium (CAT II)  |  CCI: CCI-004062,CCI-000196 |  Vulnerability Id: V-260569

Vulnerability Discussion

Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements.

Check

Verify the Ubuntu operating stores only encrypted representations of passwords with the following command:

$ grep pam_unix.so /etc/pam.d/common-password
password [success=1 default=ignore] pam_unix.so obscure sha512 shadow remember=5 rounds=100000

If "sha512" is missing from the "pam_unix.so" line, this is a finding.

Fix

Configure Ubuntu 22.04 LTS to store encrypted representations of passwords.

Add or modify the following line in the "/etc/pam.d/common-password" file:

password [success=1 default=ignore] pam_unix.so obscure sha512 shadow remember=5 rounds=100000