UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system boot loader must require authentication.


Overview

Finding ID Version Rule ID IA Controls Severity
V-208843 OL6-00-000068 SV-208843r603263_rule Medium
Description
Password protection on the boot loader configuration ensures users with physical access cannot trivially alter important bootloader settings. These include which kernel to use, and whether to enter single-user mode.
STIG Date
Oracle Linux 6 Security Technical Implementation Guide 2021-06-14

Details

Check Text ( C-9096r357509_chk )
To verify the boot loader password has been set and encrypted, run the following command:

# grep password /boot/grub/grub.conf

The output should show the following:

password --encrypted $6$[rest-of-the-password-hash]

If it does not, this is a finding.
Fix Text (F-9096r357510_fix)
The grub boot loader should have password protection enabled to protect boot-time settings. To do so, select a password and then generate a hash from it by running the following command:

# grub-crypt --sha-512

When prompted to enter a password, insert the following line into "/boot/grub/grub.conf" immediately after the header comments. (Use the output from "grub-crypt" as the value of [password-hash]):

password --encrypted [password-hash]