UCF STIG Viewer Logo

Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors.


Overview

Finding ID Version Rule ID IA Controls Severity
V-216098 SOL-11.1-040130 SV-216098r986446_rule Medium
Description
Cryptographic hashes provide quick password authentication while not actually storing the password.
STIG Date
Solaris 11 X86 Security Technical Implementation Guide 2024-05-30

Details

Check Text ( C-17336r986444_chk )
Determine which cryptographic algorithms are configured.

# grep ^CRYPT /etc/security/policy.conf

If the command output does not include the lines below, this is a finding.

CRYPT_DEFAULT=6
CRYPT_ALGORITHMS_ALLOW=5,6
Fix Text (F-17334r986445_fix)
The root role is required.

Configure the system to disallow the use of UNIX encryption and enable SHA256 as the default encryption hash.

# pfedit /etc/security/policy.conf

Check that the following lines exist and are not commented out:

CRYPT_DEFAULT=6
CRYPT_ALGORITHMS_ALLOW=5,6