STIGQter STIGQter: STIG Summary: Oracle Linux 6 Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The system must require authentication upon booting into single-user and maintenance modes.

DISA Rule

SV-208844r603263_rule

Vulnerability Number

V-208844

Group Title

SRG-OS-000080

Rule Version

OL6-00-000069

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Single-user mode is intended as a system recovery method, providing a single user root access to the system by providing a boot option at startup. By default, no authentication is performed if single-user mode is selected.

To require entry of the root password even if the system is started in single-user mode, add or correct the following line in the file "/etc/sysconfig/init":

SINGLE=/sbin/sulogin

Check Contents

To check if authentication is required for single-user mode, run the following command:

$ grep SINGLE /etc/sysconfig/init

The output should be the following:

SINGLE=/sbin/sulogin

If the output is different, this is a finding.

Vulnerability Number

V-208844

Documentable

False

Rule Version

OL6-00-000069

Severity Override Guidance

To check if authentication is required for single-user mode, run the following command:

$ grep SINGLE /etc/sysconfig/init

The output should be the following:

SINGLE=/sbin/sulogin

If the output is different, this is a finding.

Check Content Reference

M

Target Key

2928

Comments