STIGQter STIGQter: STIG Summary: Solaris 11 X86 Security Technical Implementation Guide Version: 1 Release: 20 Benchmark Date: 24 Jan 2020: The system must prevent the use of dictionary words for passwords.

DISA Rule

SV-60925r1_rule

Vulnerability Number

V-48053

Group Title

SRG-OS-999999

Rule Version

SOL-11.1-040190

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

The root role is required.

# pfedit /etc/default/passwd

Insert the lines:

DICTIONLIST=/usr/share/lib/dict/words
DICTIONDBDIR=/var/passwd

Generate the password dictionary by running the mkpwdict command.

# mkpwdict -s /usr/share/lib/dict/words

Check Contents

Check /etc/default/passwd for dictionary check configuration.

# grep ^DICTION /etc/default/passwd

If the DICTIONLIST or DICTIONDBDIR settings are not present and are not set to:

DICTIONLIST=/usr/share/lib/dict/words
DICTIONDBDIR=/var/passwd

this is a finding.

Determine if the target files exist.

# ls -l /usr/share/lib/dict/words /var/passwd

If the files defined by DICTIONLIST or DICTIONBDIR are not present or are empty, this is a finding.

Vulnerability Number

V-48053

Documentable

False

Rule Version

SOL-11.1-040190

Severity Override Guidance

Check /etc/default/passwd for dictionary check configuration.

# grep ^DICTION /etc/default/passwd

If the DICTIONLIST or DICTIONDBDIR settings are not present and are not set to:

DICTIONLIST=/usr/share/lib/dict/words
DICTIONDBDIR=/var/passwd

this is a finding.

Determine if the target files exist.

# ls -l /usr/share/lib/dict/words /var/passwd

If the files defined by DICTIONLIST or DICTIONBDIR are not present or are empty, this is a finding.

Check Content Reference

M

Target Key

2108

Comments