Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-216098 | SOL-11.1-040130 | SV-216098r1016291_rule | CCI-004062 | medium |
| Description | ||||
| Cryptographic hashes provide quick password authentication while not actually storing the password. | ||||
| STIG | Date | |||
| Solaris 11 X86 Security Technical Implementation Guide | 2025-05-05 | |||
Details
Check Text (C-216098r1016291_chk)
Determine which cryptographic algorithms are configured.
# grep ^CRYPT /etc/security/policy.conf
If the command output does not include the lines below, this is a finding.
CRYPT_DEFAULT=6
CRYPT_ALGORITHMS_ALLOW=5,6
Fix Text (F-17334r986445_fix)
The root role is required.
Configure the system to disallow the use of UNIX encryption and enable SHA256 as the default encryption hash.
# pfedit /etc/security/policy.conf
Check that the following lines exist and are not commented out:
CRYPT_DEFAULT=6
CRYPT_ALGORITHMS_ALLOW=5,6