UCF STIG Viewer Logo

The system must enforce compliance of the entire password during authentication.


Overview

Finding ID Version Rule ID IA Controls Severity
V-226458 GEN000585 SV-226458r603265_rule Medium
Description
Some common password hashing schemes only process the first eight characters of a user's password, which reduces the effective strength of the password.
STIG Date
Solaris 10 SPARC Security Technical Implementation Guide 2020-12-04

Details

Check Text ( C-36379r602740_chk )
Verify no password hash in /etc/passwd or /etc/shadow begins with a character other than an underscore (_) or dollar sign ($).

# cut -d ':' -f2 /etc/passwd | egrep -v '^[*!$_]'
# cut -d ':' -f2 /etc/shadow | egrep -v '^[*!$_]'

If any unlocked password hash is present without an initial underscore (_) or dollar sign ($) character, this is a finding.
Fix Text (F-36343r602741_fix)
Edit /etc/security/policy.conf and add or change the CRYPT_DEFAULT setting to something other than __unix__, such as 6. Allowable values for CRYPT_DEFAULT may be found in the /etc/security/crypt.conf file.

Change any passwords using non-compliant hashes.