What's New in the Solaris 9 8/03 Operating Environment

Security Enhancements

Auditing Enhancements

Enhancements to the audit features in this Solaris release reduce noise in the trail, and enable administrators to use XML scripting to parse the trail. These enhancements include the following:

For further information, see the System Administration Guide: Security Services.

Smart Card Terminal Interfaces

Solaris smart card interfaces are a set of public interfaces for Smart Card Terminals. See Smart Card Terminal Interfaces.

Internet Key Exchange (IKE) Hardware Acceleration

Public-key operations in IKE can be accelerated by a SunTM Crypto Accelerator 1000 card. The operations are offloaded to the card. The offloading accelerates encryption and reduces demands on operating system resources.

For information about IKE, see the IPsec and IKE Administration Guide.

Enhanced crypt() Function

Password encryption protects passwords from being read by intruders. Three strong password encryption modules are now available in the software:

For information on how to protect your user passwords with these new encryption modules, see the System Administration Guide: Security Services. For information on the strength of the modules, see the crypt_bsdbf(5), crypt_bsdmd5(5), and crypt_sunmd5(5) man pages.

Password Management Feature in pam_ldap

The pam_ldap password management feature strengthens the overall security of the LDAP Naming Service when used in conjunction with the Sun ONE Directory Server (formerly iPlanet Directory Server). Specifically, the password management feature does the following:

For further information on Solaris naming and directory services, see the System Administration Guide: Naming and Directory Services (DNS, NIS, and LDAP). For information about Solaris security features, see the System Administration Guide: Security Services.

Pluggable Authentication Module (PAM) Enhancement

The PAM framework was expanded by including a new control flag. The new control flag provides the ability to skip additional stack processing. This skipping is enabled if the current service module is successful and if no failure occurred on the previous mandatory modules.

For more information about this change, see the System Administration Guide: Security Services.