UCF STIG Viewer Logo

Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors.


Overview

Finding ID Version Rule ID IA Controls Severity
V-216333 SOL-11.1-040130 SV-216333r986406_rule Medium
Description
Cryptographic hashes provide quick password authentication while not actually storing the password.
STIG Date
Solaris 11 SPARC Security Technical Implementation Guide 2024-05-30

Details

Check Text ( C-17569r986404_chk )
Determine which cryptographic algorithms are configured.

# grep ^CRYPT /etc/security/policy.conf

If the command output does not include the lines, this is a finding.

CRYPT_DEFAULT=6
CRYPT_ALGORITHMS_ALLOW=5,6
Fix Text (F-17567r986405_fix)
The root role is required.

Configure the system to disallow the use of UNIX encryption and enable SHA256 as the default encryption hash.

# pfedit /etc/security/policy.conf

Check that the following lines exist and are not commented out:
CRYPT_DEFAULT=6
CRYPT_ALGORITHMS_ALLOW=5,6