UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must require authentication upon booting into single-user and maintenance modes.


Overview

Finding ID Version Rule ID IA Controls Severity
V-756 GEN000020 SV-36755r1_rule IAIA-1 IAIA-2 Medium
Description
If the system does not require valid root authentication before it boots into single-user or maintenance mode, anyone who invokes single-user or maintenance mode is granted privileged access to all files on the system.
STIG Date
Solaris 9 SPARC Security Technical Implementation Guide 2013-01-10

Details

Check Text ( C-35838r1_chk )
This can be checked in the /etc/rcS file (on Solaris 5.X systems) to check if the system runs sulogin, or an equivalent, when booting into single-user mode by performing more /etc/rcS/sulogin. Alternatively, perform grep sulogin /etc/rcS.

NOTE: The file may be in /sbin.

The last resort, if it is not a production system, is to boot the system to single-user mode by pressing stop a, and typing boot -s, at the > or ok prompt. If the system enters single-user mode and no password is required, this is a finding.

NOTE: This is a default on Solaris 5.5.1 and later.
Fix Text (F-31079r1_fix)
Edit /etc/rcS and set sulogin be run for single-user mode.

NOTE: This is a default on Solaris 5.5.1 and later. Â