UCF STIG Viewer Logo

Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors.


Overview

Finding ID Version Rule ID IA Controls Severity
V-48243 SOL-11.1-040130 SV-61115r2_rule Medium
Description
Cryptographic hashes provide quick password authentication while not actually storing the password.
STIG Date
Solaris 11 SPARC Security Technical Implementation Guide 2017-01-27

Details

Check Text ( None )
None
Fix Text (F-51851r1_fix)
The root role is required.

Configure the system to disallow the use of UNIX encryption and enable SHA256 as the default encryption hash.

# pfedit /etc/security/policy.conf

Check that the lines:
CRYPT_DEFAULT=5
CRYPT_ALOGRITHMS_ALLOW=5,6

exist and are not commented out.