DISA STIGS Viewer

Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors.

Overview

Finding ID Version Rule ID IA Controls Severity
V-216098 SOL-11.1-040130 SV-216098r1016291_rule   Medium
Description
Cryptographic hashes provide quick password authentication while not actually storing the password.
STIG Date
Solaris 11 X86 Security Technical Implementation Guide 2024-11-25

Details

Check Text (C-17336r986444_chk)
Determine which cryptographic algorithms are configured.

# grep ^CRYPT /etc/security/policy.conf

If the command output does not include the lines below, this is a finding.

CRYPT_DEFAULT=6
CRYPT_ALGORITHMS_ALLOW=5,6
Fix Text (F-17334r986445_fix)
The root role is required.

Configure the system to disallow the use of UNIX encryption and enable SHA256 as the default encryption hash.

# pfedit /etc/security/policy.conf

Check that the following lines exist and are not commented out:

CRYPT_DEFAULT=6
CRYPT_ALGORITHMS_ALLOW=5,6