Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-216333 | SOL-11.1-040130 | SV-216333r1016276_rule | Medium |
| Description |
| Cryptographic hashes provide quick password authentication while not actually storing the password. |
| STIG | Date |
| Solaris 11 SPARC Security Technical Implementation Guide | 2025-05-05 |
Details
| Check Text (C-17569r986404_chk) |
| Determine which cryptographic algorithms are configured. # grep ^CRYPT /etc/security/policy.conf If the command output does not include the lines, this is a finding. CRYPT_DEFAULT=6 CRYPT_ALGORITHMS_ALLOW=5,6 |
| Fix Text (F-17567r986405_fix) |
| The root role is required. Configure the system to disallow the use of UNIX encryption and enable SHA256 as the default encryption hash. # pfedit /etc/security/policy.conf Check that the following lines exist and are not commented out: CRYPT_DEFAULT=6 CRYPT_ALGORITHMS_ALLOW=5,6 |