HP-UX 11.31 Security Technical Implementation Guide
Open a previous version of this SCAP benchmark.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- GEN000400
- Vuln IDs
- V-763
- Rule IDs
- SV-38444r1_rule
Fix: F-31504r1_fix
Edit /etc/issue and add one of the DoD login banners (based on the character limitations imposed by the system). DoD Login Banners: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." OR "I've read & consent to terms in IS user agreem't."
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- GEN000460
- Vuln IDs
- V-766
- Rule IDs
- SV-38445r2_rule
Fix: F-31506r2_fix
For Trusted Mode: Use the SAM/SMH interface or edit the /tcb/files/auth/system/default file and update the u_maxtries attribute. See the below example: :u_maxtries#3: If manually editing the file, save any change(s) before exiting the editor. For SMSE: Note: There may be additional package/bundle updates that must be installed to support attributes in the /etc/default/security file. Use the SAM/SMH interface (/etc/default/security file) and/or the userdbset command (/var/adm/userdb/* files) to update the attribute. See the below example: AUTH_MAXTRIES=2 Note: Never use a text editor to modify any /var/adm/userdb database file. The database contains checksums and other binary data, and editors (vi included) do not follow the file locking conventions that are used to control access to the database. If manually editing the /etc/default/security file, save any change(s) before exiting the editor.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- GEN000480
- Vuln IDs
- V-768
- Rule IDs
- SV-38446r3_rule
Fix: F-31507r2_fix
For Trusted Mode: Use the SAM/SMH interface to ensure that the t_logdelay setting is 4. For SMSE: There is no fix, however, there are attack mitigations to minimize risk (see mitigations).
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- GEN000560
- Vuln IDs
- V-770
- Rule IDs
- SV-38448r2_rule
Fix: F-31509r2_fix
For Trusted Mode: Use the System Administration Manager (SAM) or the System Management Homepage (SMH) to disable null passwords and immediately expire the password for any account with a null password, forcing the user to create a password on the very next login. Alternatively, the account may also be disabled. Protected password database files are maintained in the /tcb/files/auth hierarchy. This directory contains other directories each named with a single letter from the alphabet. User authentication profiles are stored in these directories based on the first letter of the user account name. Verify that SAM/SMH has now disabled null passwords for all accounts. # grep “:u_nullpw@:” /tcb/files/auth/[a-z,A-Z] For SMSE: Use the SAM/SMH interface (/etc/default/security file) and/or the userdbset command (/var/adm/userdb/* files) to update the attribute(s). See the below example: LOGIN_POLICY_STRICT=1 ALLOW_NULL_PASSWORD=0 Note: Never use a text editor to modify any /var/adm/userdb database file. The database contains checksums and other binary data, and editors (vi included) do not follow the file locking conventions that are used to control access to the database. If manually editing the /etc/default/security file, save any change(s) before exiting the editor. Use the System Administration Manager (SAM) or the System Management Homepage (SMH) to immediately expire the password for any account with a null password, forcing the user to create a password on the very next login. Alternatively, the account may also be disabled.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000880
- Vuln IDs
- V-773
- Rule IDs
- SV-38449r1_rule
Fix: F-31528r1_fix
Remove or change the UID of accounts other than root that have UID 0.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN000900
- Vuln IDs
- V-774
- Rule IDs
- SV-34829r1_rule
Fix: F-31529r1_fix
The root home directory should be something other than / (such as /roothome). # mkdir /rootdir # chown root /rootdir # chgrp root /rootdir # chmod 700 /rootdir # cp -r /.??* /rootdir/. Edit the passwd file and change the root home directory to /rootdir. The cp -r /.??* command copies all files and subdirectories of file names that begin with "." into the new root directory, which preserves the previous root environment. Ensure you are in the "/" directory when executing the "cp" command.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN000920
- Vuln IDs
- V-775
- Rule IDs
- SV-38450r1_rule
Fix: F-31530r1_fix
The root home directory will have permissions of 0700. Do not change the protections of the / directory. Use the following command to change protections for the root home directory: # chmod 0700 /rootdir.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000940
- Vuln IDs
- V-776
- Rule IDs
- SV-38451r3_rule
Fix: F-31531r2_fix
Edit the root user's local initialization files and remove any relative path entries that have not been documented with the ISSO. Edit the root user’s local initialization files and remove any empty entry that is defined.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000960
- Vuln IDs
- V-777
- Rule IDs
- SV-38452r1_rule
Fix: F-31532r1_fix
For each world-writable path in root's executable search path, do one of the following: 1. Remove the world-writable permission on the directory. Procedure: # chmod o-w <path> 2. Remove the world-writable directory from the executable search path. Procedure: Identify and edit the initialization file referencing the world-writable directory and remove it from the PATH variable.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- GEN000980
- Vuln IDs
- V-778
- Rule IDs
- SV-38453r2_rule
Fix: F-31533r3_fix
If the /etc/securetty file does not exist, create the file containing only the word console and ensure correct file properties. # echo “console” > /etc/securetty
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN000380
- Vuln IDs
- V-781
- Rule IDs
- SV-38455r1_rule
Fix: F-31511r2_fix
Add a group to the system (edit /etc/group) for each GID referenced without a corresponding group.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001180
- Vuln IDs
- V-786
- Rule IDs
- SV-38458r1_rule
Fix: F-31556r1_fix
Change the mode of the network services daemon. # chmod 0755 <path>/<daemon>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001800
- Vuln IDs
- V-788
- Rule IDs
- SV-38459r1_rule
Fix: F-31701r1_fix
Change the mode of skeleton files with incorrect mode. # chmod 0444 <skeleton file>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001320
- Vuln IDs
- V-789
- Rule IDs
- SV-38460r1_rule
Fix: F-31558r1_fix
Change the ownership of NIS/NIS+/yp files to root, sys, or bin. Consult vendor documentation to determine the location of the files. Procedure (example): # chown root <filename>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001360
- Vuln IDs
- V-791
- Rule IDs
- SV-38462r1_rule
Fix: F-31560r1_fix
Change the mode of NIS/NIS+/yp command files to 0755 or less permissive. Procedure (example): # chmod 0755 <filename>
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- GEN001220
- Vuln IDs
- V-795
- Rule IDs
- SV-38466r1_rule
Fix: F-31564r1_fix
Change the owner of system files, programs, and directories to a system account. Procedure: # chown root <path>/<system file> (A different system user may be used in place of root.)
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- GEN001240
- Vuln IDs
- V-796
- Rule IDs
- SV-38467r1_rule
Fix: F-31565r1_fix
Change the group owner of system files to a system group. Procedure: # chgrp root <path>/<system file> (System groups other than root may be used.)
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001400
- Vuln IDs
- V-797
- Rule IDs
- SV-38468r2_rule
Fix: F-31585r2_fix
For Trusted Mode: # chown root /tcb # chown root /tcb/files /tcb/files/auth # chown root /tcb/files/auth/[a-z]/* For SMSE: # chown root /etc/shadow
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001380
- Vuln IDs
- V-798
- Rule IDs
- SV-38469r1_rule
Fix: F-31586r1_fix
Change the mode of the passwd file to 0444. # chmod 0444 /etc/passwd Document all changes.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001420
- Vuln IDs
- V-800
- Rule IDs
- SV-38470r2_rule
Fix: F-31587r3_fix
For Trusted Mode: # chmod 0555 /tcb # chmod 0771 /tcb/files /tcb/files/auth # chmod 0664 /tcb/files/auth/[a-z]/* For SMSE: # chmod 0400 /etc/shadow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN002560
- Vuln IDs
- V-808
- Rule IDs
- SV-38475r1_rule
Fix: F-31745r1_fix
Edit local and global initialization files containing umask and change them to use 077 instead of the current value.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000178
- Version
- GEN002640
- Vuln IDs
- V-810
- Rule IDs
- SV-27264r2_rule
Fix: F-31746r2_fix
For Trusted Mode and SMSE: Use the System Administration Manager (SAM) or the System Management Homepage (SMH) to lock/disable or remove any enabled default system accounts.
- RMF Control
- AU-2
- Severity
- M
- CCI
- CCI-000126
- Version
- GEN002720
- Vuln IDs
- V-814
- Rule IDs
- SV-38479r1_rule
Fix: F-31765r1_fix
Edit /etc/rc.config.d/auditing and add -e open to the end of the AUDEVENT_ARGS1 parameter.
- RMF Control
- AU-2
- Severity
- M
- CCI
- CCI-000126
- Version
- GEN002740
- Vuln IDs
- V-815
- Rule IDs
- SV-38480r1_rule
Fix: F-31766r1_fix
Edit /etc/rc.config.d/auditing and add -e delete to the end of the AUDEVENT_ARGS1 parameter.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-000347
- Version
- GEN002760
- Vuln IDs
- V-816
- Rule IDs
- SV-38481r1_rule
Fix: F-31767r1_fix
Edit /etc/rc.config.d/auditing and add -e admin and -e removable to the end of the AUDEVENT_ARGS1 parameter.
- RMF Control
- AU-2
- Severity
- M
- CCI
- CCI-000126
- Version
- GEN002800
- Vuln IDs
- V-818
- Rule IDs
- SV-38482r1_rule
Fix: F-31768r1_fix
Edit /etc/rc.config.d/auditing and add -e login to the end of the AUDEVENT_ARGS1 parameter.
- RMF Control
- AU-2
- Severity
- M
- CCI
- CCI-000126
- Version
- GEN002820
- Vuln IDs
- V-819
- Rule IDs
- SV-38483r1_rule
Fix: F-31769r1_fix
Edit /etc/rc.config.d/auditing and add -e moddac to the end of the AUDEVENT_ARGS1 parameter.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003720
- Vuln IDs
- V-821
- Rule IDs
- SV-35067r1_rule
Fix: F-30239r1_fix
Change the ownership of the inetd.conf file to root or bin. # chown root <file or directory>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003740
- Vuln IDs
- V-822
- Rule IDs
- SV-35072r1_rule
Fix: F-30242r1_fix
Change the mode of the (x)inetd.conf file. # chmod 0440 <file>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003760
- Vuln IDs
- V-823
- Rule IDs
- SV-35077r1_rule
Fix: F-30246r1_fix
Change the ownership of the services file to root or bin. # chown root /etc/services
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003780
- Vuln IDs
- V-824
- Rule IDs
- SV-35078r1_rule
Fix: F-30247r1_fix
Change the mode of the services file to 0444 or less permissive. # chmod 0444 /etc/services
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN001780
- Vuln IDs
- V-825
- Rule IDs
- SV-38484r1_rule
Fix: F-31702r1_fix
Edit /etc/profile or another global initialization script, and add the mesg -n command.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003900
- Vuln IDs
- V-827
- Rule IDs
- SV-35140r1_rule
Fix: F-30292r1_fix
Remove the "+" entries from the hosts.lpd (or equivalent) file.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003920
- Vuln IDs
- V-828
- Rule IDs
- SV-35143r1_rule
Fix: F-30294r1_fix
Change the owner of the /etc/hosts.lpd file (or equivalent) to root, lp, or another privileged UID. # chown root <print service configuration file>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003940
- Vuln IDs
- V-829
- Rule IDs
- SV-35148r1_rule
Fix: F-30299r1_fix
Change the mode of the /etc/hosts.lpd file (or equivalent) to 0644 or less permissive. Procedure: # chmod 0644 <print service configuration file>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN004360
- Vuln IDs
- V-831
- Rule IDs
- SV-35161r1_rule
Fix: F-30308r1_fix
Change the owner of the /etc/mail/aliases file (or equivalent) to root. # chown root /etc/mail/aliases
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN004380
- Vuln IDs
- V-832
- Rule IDs
- SV-35165r1_rule
Fix: F-30311r1_fix
Change the mode of the aliases file (or equivalent) to 0644. # chmod 0644 /etc/mail/aliases
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-000225
- Version
- GEN004400
- Vuln IDs
- V-833
- Rule IDs
- SV-35169r1_rule
Fix: F-30312r1_fix
Edit the /etc/mail/aliases file Locate the entries executing a program. They will appear similar to the following line: alias: "|/usr/local/bin/ls" (or some other program name) Ensure root owns the programs and the directory(ies) they reside in by using the chown command to change owner to root. For a directory entry: # chown root <entry> For a file entry (change BOTH the directory and file, where/as necessary: # chown root <entry> # chown root `dirname <entry>`
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN004420
- Vuln IDs
- V-834
- Rule IDs
- SV-35043r1_rule
Fix: F-31930r1_fix
Use the chmod command to change the access permissions for files executed from the aliases file. For example: # chmod 0755 <path/file>
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN004440
- Vuln IDs
- V-835
- Rule IDs
- SV-35047r1_rule
Fix: F-31932r1_fix
Edit the sendmail.cf file, locate the entry (and where necessary uncomment it and/or create it) and modify/set it to 9.
- RMF Control
- AU-2
- Severity
- M
- CCI
- CCI-000126
- Version
- GEN004460
- Vuln IDs
- V-836
- Rule IDs
- SV-35051r1_rule
Fix: F-31933r1_fix
Edit the syslog.conf file and add a configuration line specifying an appropriate destination for critical "mail" syslogs, for example: mail.crit /var/adm/messages mail.* /var/adm/messages *.* /var/adm/messages *.crit /var/adm/messages
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN004480
- Vuln IDs
- V-837
- Rule IDs
- SV-35053r1_rule
Fix: F-31934r1_fix
Change the ownership of the sendmail log file. # chown root <sendmail log file>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN004500
- Vuln IDs
- V-838
- Rule IDs
- SV-35058r1_rule
Fix: F-31935r1_fix
Change the mode of the SMTP service log file. # chmod 0644 <sendmail log file>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN004880
- Vuln IDs
- V-840
- Rule IDs
- SV-35102r1_rule
Fix: F-31950r1_fix
Create a /etc/ftpd/ftpusers (or equivalent) file containing a list of /etc/passwd accounts not authorized for FTP.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN004920
- Vuln IDs
- V-842
- Rule IDs
- SV-38485r1_rule
Fix: F-31952r1_fix
Change the owner of the ftpusers file to root. # chown root /etc/ftpd/ftpusers
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN004940
- Vuln IDs
- V-843
- Rule IDs
- SV-38486r1_rule
Fix: F-31954r1_fix
Change the mode of the ftpusers file to 0640. # chmod 0640 /etc/ftpd/ftpusers
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- GEN005080
- Vuln IDs
- V-847
- Rule IDs
- SV-35110r1_rule
Fix: F-31960r1_fix
Edit /etc/inetd.conf and add one path argument, representing the TFTP root directory, to the tftpd command.
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-000225
- Version
- GEN005100
- Vuln IDs
- V-848
- Rule IDs
- SV-35155r1_rule
Fix: F-31961r1_fix
Change the mode of the TFTP daemon. # chmod 0755 /usr/lbin/tftpd
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005120
- Vuln IDs
- V-849
- Rule IDs
- SV-35157r1_rule
Fix: F-31962r1_fix
Create a tftp user account if none exists. Assign a non-login shell to the tftp user account, such as /usr/bin/false. Assign/create the tftp user account home directory where/as necessary. Ensure the home directory is owned by the tftp user.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001435
- Version
- GEN006400
- Vuln IDs
- V-867
- Rule IDs
- SV-38487r1_rule
Fix: F-32102r1_fix
Disable the use of NIS. Possible replacements are NIS+ and LDAP-UX.
- RMF Control
- AC-6
- Severity
- L
- CCI
- CCI-000225
- Version
- GEN001440
- Vuln IDs
- V-899
- Rule IDs
- SV-38488r2_rule
Fix: F-31588r2_fix
For Trusted Mode: Determine why the user is not assigned a home directory. Possible actions include: account deletion or disablement. If the account is determined to be valid, manually create the home directory if required (mkdir directoryname, copy the skeleton files into the directory, chown account name for the new directory and the skeleton files) and assign to the user in the /etc/passwd file or take corrective action via the HP SMH/SAM utility. For SMSE: Note: There may be additional package/bundle updates that must be installed to support attributes in the /etc/default/security file. Determine why the user is not assigned a home directory. Possible actions include: account deletion or disablement. If the account is determined to be valid, manually create the home directory if required (mkdir directoryname, copy the skeleton files into the directory, chown account name for the new directory and the skeleton files) and assign to the user in the /etc/passwd file or take corrective action via the HP SMH/SAM utility. Additionally, use the SAM/SMH interface (/etc/default/security file) and/or the userdbset command (/var/adm/userdb/* files) to update the ABORT_LOGIN_ON_MISSING_HOMEDIR attribute. See the below example: ABORT_LOGIN_ON_MISSING_HOMEDIR=1 Note: Never use a text editor to modify any /var/adm/userdb database file. The database contains checksums and other binary data, and editors (vi included) do not follow the file locking conventions that are used to control access to the database. If manually editing the /etc/default/security file, save any change(s) before exiting the editor.
- RMF Control
- AC-6
- Severity
- L
- CCI
- CCI-000225
- Version
- GEN001460
- Vuln IDs
- V-900
- Rule IDs
- SV-38489r2_rule
Fix: F-31589r2_fix
Determine why the user home directory does not exist. Possible actions include: account deletion or disablement. If the account is determined to be valid, create the home directory either manually (mkdir directoryname, copy the skeleton files into the directory, chown account name for the new directory and the skeleton files) or via the HP SMH/SAM utility.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001880
- Vuln IDs
- V-905
- Rule IDs
- SV-38493r1_rule
Fix: F-31704r1_fix
Ensure user startup files have permissions of 0740 or more restrictive. Examine each user's home directory and verify all file names beginning with "." have access permissions of 0740 or more restrictive. If they do not, use the chmod command to correct the vulnerability. Procedure: # chmod 0740 .filename NOTE: The period is part of the file name and is required.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001600
- Vuln IDs
- V-907
- Rule IDs
- SV-38495r3_rule
Fix: F-31594r2_fix
Edit the run control script and remove the relative path entries from the executable search path variable that are not documented with the ISSO. Edit the run control script and remove any empty entry that is defined.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- GEN002000
- Vuln IDs
- V-913
- Rule IDs
- SV-38499r1_rule
Fix: F-31706r1_fix
Remove the .netrc file(s). Procedure: # rm .netrc
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN002120
- Vuln IDs
- V-916
- Rule IDs
- SV-34952r1_rule
Fix: F-31748r1_fix
Create /etc/shells file containing a list of valid system shells. Consult vendor documentation for an appropriate list of system shells. Procedure: Typical installed shells include: /sbin/sh /usr/bin/sh /usr/bin/rsh /usr/bin/ksh /usr/bin/rksh /usr/bin/csh /usr/bin/keysh # echo "/sbin/sh" >> /etc/shells (Repeat as necessary for all existing shell programs.)
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN002140
- Vuln IDs
- V-917
- Rule IDs
- SV-34953r1_rule
Fix: F-31749r1_fix
Use the chsh utility or edit the /etc/passwd file and correct the error by changing the default shell of the account in error to an acceptable shell name contained in the /etc/shells file. Alternatively, use the HP SMH to change the /etc/passwd shell entry.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN002200
- Vuln IDs
- V-921
- Rule IDs
- SV-38501r1_rule
Fix: F-31750r1_fix
Change the ownership of any system shell not owned by root or bin: # chown root <path/shell>
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-000225
- Version
- GEN002220
- Vuln IDs
- V-922
- Rule IDs
- SV-38502r1_rule
Fix: F-31751r1_fix
Change the mode of the shell. # chmod 0755 <shell>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN002280
- Vuln IDs
- V-924
- Rule IDs
- SV-38505r2_rule
Fix: F-31753r1_fix
Remove the world-writable permission from the device file(s). # chmod o-w <device file> Document all changes.
- RMF Control
- AC-6
- Severity
- L
- CCI
- CCI-000225
- Version
- GEN005760
- Vuln IDs
- V-929
- Rule IDs
- SV-35184r1_rule
Fix: F-33232r1_fix
# chmod 0644 /etc/dfs/dfstab
- RMF Control
- AC-14
- Severity
- M
- CCI
- CCI-000062
- Version
- GEN005820
- Vuln IDs
- V-932
- Rule IDs
- SV-35199r1_rule
Fix: F-33237r1_fix
Edit /etc/dfs/sharetab and set the anon=-1 option for shares without it. Re-export the file systems.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005840
- Vuln IDs
- V-933
- Rule IDs
- SV-35201r1_rule
Fix: F-33239r1_fix
Edit /etc/dfs/dfstab and add ro and/or rw options (as appropriate) that specify a list of hosts or networks which are permitted access. Re-share the file systems via the following commands: # unshare <the file system entry that was modified> # share <the file system entry that was modified>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005880
- Vuln IDs
- V-935
- Rule IDs
- SV-35202r1_rule
Fix: F-33243r1_fix
Edit /etc/dfs/dfstab and remove the root= option for all shares. Re-share the file systems.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005900
- Vuln IDs
- V-936
- Rule IDs
- SV-35204r1_rule
Fix: F-30338r1_fix
Edit /etc/fstab and add the nosuid option for all NFS file systems. Remount the NFS file systems to make the change take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006580
- Vuln IDs
- V-940
- Rule IDs
- SV-35198r1_rule
Fix: F-30334r1_fix
Edit /etc/inetd.conf and use tcpd to wrap active services.
- RMF Control
- AU-2
- Severity
- M
- CCI
- CCI-000126
- Version
- GEN006600
- Vuln IDs
- V-941
- Rule IDs
- SV-35206r2_rule
Fix: F-32112r1_fix
Configure the access restriction program to log every access attempt. Ensure the implementation instructions for TCP_WRAPPERS are followed so logging of system access attempts is logged into the system log files. If an alternate application is used, it must support this function.
- RMF Control
- CM-2
- Severity
- M
- CCI
- CCI-000293
- Version
- GEN000000-HPUX0020
- Vuln IDs
- V-960
- Rule IDs
- SV-38681r2_rule
Fix: F-33047r2_fix
SAM/SMH must be used to convert standard mode HP-UX to Trusted Mode (optional for SMSE). For Trusted Mode only: The following command may be used to “manually” convert from Standard Mode to Trusted Mode (note that its use is not vendor supported): # tsconvert -c For SMSE only: The following command may be used to “manually” create the /etc/shadow file with information from the /etc/passwd file (use of this commend is vendor supported). # pwconv Note that additional software bundles and/or patches may be required in order to completely convert a standard mode system to SMSE.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN000000-HPUX0080
- Vuln IDs
- V-965
- Rule IDs
- SV-965r2_rule
Fix: F-1119r2_fix
Change the group-owner of the /etc/securetty to root, bin, or sys. Example: # chgrp root /etc/securetty
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN000000-HPUX0060
- Vuln IDs
- V-966
- Rule IDs
- SV-38682r1_rule
Fix: F-1120r2_fix
Change the owner of the /etc/securetty file to root. # chown root /etc/securetty
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN000000-HPUX0100
- Vuln IDs
- V-967
- Rule IDs
- SV-967r2_rule
Fix: F-1121r2_fix
Change the mode of the /etc/securetty file to 0640. Example: # chmod 0640 /etc/securetty
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN002960
- Vuln IDs
- V-974
- Rule IDs
- SV-38541r1_rule
Fix: F-31770r1_fix
Create /var/adm/cron/cron.allow and/or /var/adm/cron/cron.deny with appropriate local content.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN002980
- Vuln IDs
- V-975
- Rule IDs
- SV-38542r1_rule
Fix: F-31771r1_fix
Change the mode of the cron.allow file to 0600. Procedure: # chmod 0600 /var/adm/cron/cron.allow
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003080
- Vuln IDs
- V-978
- Rule IDs
- SV-38545r1_rule
Fix: F-31790r1_fix
Change the mode of the crontab files. # chmod 0600 /var/spool/cron/crontabs/*
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003100
- Vuln IDs
- V-979
- Rule IDs
- SV-38546r1_rule
Fix: F-1133r2_fix
Change the mode of crontab directories to 0755.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003120
- Vuln IDs
- V-980
- Rule IDs
- SV-38547r1_rule
Fix: F-31792r1_fix
Change the mode of the crontab directory. # chown root /var/spool/cron/crontabs
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003140
- Vuln IDs
- V-981
- Rule IDs
- SV-38548r1_rule
Fix: F-31793r1_fix
Change the group owner of the crontab directories to root, sys, bin or other. # chown root /var/spool/cron/crontabs
- RMF Control
- AU-2
- Severity
- M
- CCI
- CCI-000126
- Version
- GEN003160
- Vuln IDs
- V-982
- Rule IDs
- SV-38549r1_rule
Fix: F-31794r1_fix
Enable cron/logging on the system via: # /sbin/init.d/cron stop # mv <current cron log> <to a new location and new name> # /sbin/init.d/cron start # more /var/adm/cron/log Cron automatically handles its own logging function and (at least) the Start Time should be visible at the beginning of the new log file /var/adm/cron/log.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003180
- Vuln IDs
- V-983
- Rule IDs
- SV-38550r1_rule
Fix: F-31795r1_fix
Change the mode of the cron log file. # chmod 0600 /var/adm/cron/log
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003280
- Vuln IDs
- V-984
- Rule IDs
- SV-35033r1_rule
Fix: F-31796r1_fix
Create at.allow and/or at.deny files containing appropriate lists of users to be allowed or denied access to the at facility supported by the cron daemon.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003300
- Vuln IDs
- V-985
- Rule IDs
- SV-38551r1_rule
Fix: F-31797r1_fix
Add appropriate users to the at.deny file, or remove the empty at.deny file if an at.allow file exists.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003320
- Vuln IDs
- V-986
- Rule IDs
- SV-38552r1_rule
Fix: F-31799r1_fix
Remove the default accounts (such as bin, sys, adm, and others) from the at.allow file.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003340
- Vuln IDs
- V-987
- Rule IDs
- SV-38553r1_rule
Fix: F-31800r1_fix
Change the mode of the at.allow file. # chmod 0600 /var/adm/cron/at.allow
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005320
- Vuln IDs
- V-994
- Rule IDs
- SV-35176r1_rule
Fix: F-31978r1_fix
Change the mode of the SNMP daemon configuration file to 0600. # chmod 0600 /etc/SnmpAgent.d/snmpd.conf
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005340
- Vuln IDs
- V-995
- Rule IDs
- SV-35178r1_rule
Fix: F-31979r1_fix
Change the mode of MIB files to 0640. # chmod 0640 <mib file>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- GEN006240
- Vuln IDs
- V-1023
- Rule IDs
- SV-38236r1_rule
Fix: F-32085r1_fix
Disable the INN server.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN006100
- Vuln IDs
- V-1027
- Rule IDs
- SV-35213r1_rule
Fix: F-32069r1_fix
Change the ownership of the smb.conf file. # chown root /etc/opt/samba/smb.conf
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN006140
- Vuln IDs
- V-1028
- Rule IDs
- SV-35221r1_rule
Fix: F-32071r1_fix
Change the mode of the smb.conf file to 0644 or less permissive. # chmod 0644 /etc/opt/samba/smb.conf
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN006220
- Vuln IDs
- V-1030
- Rule IDs
- SV-35107r1_rule
Fix: F-32079r1_fix
Edit the smb.conf file and set the hosts option to permit only authorized hosts access Samba. An example might be: hosts allow = 127.0.0.1 192.168.2.0/24 192.168.3.0/24 hosts deny = 0.0.0.0/0 The above will only allow SMB connections from the localhost and from the two private networks 192.168.2 and 192.168.3. All other connections will be refused as soon as the client sends its first packet.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- GEN001120
- Vuln IDs
- V-1047
- Rule IDs
- SV-38207r1_rule
Fix: F-24426r1_fix
Edit the configuration file and set the PermitRootLogin option to no.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN006120
- Vuln IDs
- V-1056
- Rule IDs
- SV-35219r1_rule
Fix: F-30350r1_fix
Change the group owner of the "smb.conf" file. # chgrp root /etc/samba/smb.conf
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN001080
- Vuln IDs
- V-1062
- Rule IDs
- SV-38208r1_rule
Fix: F-31538r1_fix
Change the root account's shell to one present on the / file system.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- GEN000500
- Vuln IDs
- V-4083
- Rule IDs
- SV-38416r2_rule
Fix: F-31513r2_fix
Configure the CDE lock manager to lock your screen after a certain amount of inactive time. To configure the CDE lock manager to lock the screen after 15 minutes of inactive time, enter the following commands (ensure to NOT overwrite an existing file): # cp /usr/dt/config/C/sys.resources /etc/dt/config/C/sys.resources # vi /etc/dt/config/C/sys.resources Locate and add/uncomment/change the line to N=15 dtsession*lockTimeout: <N> dtsession*lockTimeout: 15 Log out of CDE and log back in to verify the timeout is in effect.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- GEN000800
- Vuln IDs
- V-4084
- Rule IDs
- SV-38417r2_rule
Fix: F-31540r2_fix
For Trusted Mode: Use the SAM/SMH interface or edit the /etc/default/security file and update the PASSWORD_HISTORY_DEPTH attribute. See the below example: PASSWORD_HISTORY_DEPTH=5 If manually editing the file, save any change(s) before exiting the editor. For SMSE: Note: There may be additional package/bundle updates that must be installed to support attributes in the /etc/default/security file. Use the SAM/SMH interface (/etc/default/security file) and/or the userdbset command (/var/adm/userdb/* files) to update the PASSWORD_HISTORY_DEPTH attribute. See the below example: PASSWORD_HISTORY_DEPTH=5 Note: Never use a text editor to modify any /var/adm/userdb database file. The database contains checksums and other binary data, and editors (vi included) do not follow the file locking conventions that are used to control access to the database. If manually editing the /etc/default/security file, save any change(s) before exiting the editor.
- RMF Control
- AU-2
- Severity
- M
- CCI
- CCI-000126
- Version
- GEN000000-HPUX0040
- Vuln IDs
- V-4290
- Rule IDs
- SV-38429r2_rule
Fix: F-31485r2_fix
Edit the /etc/rc.config.d/auditing file and insert the following line: AUDOMON_ARGS=“-p 20, -t 1, -w 90” Restart auditing: # /sbin/init.d/auditing stop # /sbin/init.d/auditing start
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-001436
- Version
- GEN005500
- Vuln IDs
- V-4295
- Rule IDs
- SV-35209r1_rule
Fix: F-30340r1_fix
Edit the configuration file and modify the Protocol line entry to appear as follows: Protocol 2
- RMF Control
- CP-10
- Severity
- M
- CCI
- CCI-000553
- Version
- GEN003640
- Vuln IDs
- V-4304
- Rule IDs
- SV-35057r1_rule
Fix: F-30232r1_fix
Implement file system journaling for the root file system, or use a file system that uses other mechanisms to ensure file system consistency. If the root file system supports journaling, enable it. If the file system does not support journaling or another mechanism to ensure file system consistency, a migration to a different file system will be necessary.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001436
- Version
- GEN006060
- Vuln IDs
- V-4321
- Rule IDs
- SV-35208r1_rule
Fix: F-32067r1_fix
If there is no functional need for Samba and the daemon is running, disable the daemon by killing the process ID as noted from the output of ps -ef |grep smbd. The utility should also be removed or not installed if there is no functional requirement.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003200
- Vuln IDs
- V-4358
- Rule IDs
- SV-38430r1_rule
Fix: F-31803r1_fix
Change the mode of the cron.deny file. # chmod 0600 /var/adm/cron/cron.deny
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003240
- Vuln IDs
- V-4361
- Rule IDs
- SV-38432r1_rule
Fix: F-31807r1_fix
# chown root /var/adm/cron/cron.allow
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003400
- Vuln IDs
- V-4364
- Rule IDs
- SV-38433r1_rule
Fix: F-31808r1_fix
Change the mode of the at directory to 0755. # chmod 0755 <at directory>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003420
- Vuln IDs
- V-4365
- Rule IDs
- SV-38434r1_rule
Fix: F-31809r1_fix
Change the owner of the existing at directory to root, bin, or sys. # chown root <at directory> (Replace root with another system group and/or <at directory> with a different at directory as necessary.)
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003460
- Vuln IDs
- V-4367
- Rule IDs
- SV-34997r1_rule
Fix: F-30202r1_fix
Change the owner of the at.allow file. # chown root /var/adm/cron/at.allow
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003480
- Vuln IDs
- V-4368
- Rule IDs
- SV-34998r1_rule
Fix: F-30203r1_fix
Change the owner of the at.deny file. # chown root /usr/lib/cron/at.deny
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003980
- Vuln IDs
- V-4370
- Rule IDs
- SV-35154r1_rule
Fix: F-30305r1_fix
Change the group-owner of the traceroute command to root. See the following example: # chgrp root /usr/contrib/bin/traceroute
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN004000
- Vuln IDs
- V-4371
- Rule IDs
- SV-38435r1_rule
Fix: F-31919r1_fix
Change the mode of the traceroute command. # chmod 0700 /usr/contrib/bin/traceroute
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN004560
- Vuln IDs
- V-4384
- Rule IDs
- SV-38436r1_rule
Fix: F-31938r1_fix
Ensure Sendmail or its equivalent has been configured to mask the version information. If necessary, change the O SmtpGreetingMessage line in the /etc/sendmail.cf file as noted below: O SmtpGreetingMessage=$j Sendmail $v/$Z; $b change it to: O SmtpGreetingMessage= Mail Server Ready ; $b Then restart the Sendmail service.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN004580
- Vuln IDs
- V-4385
- Rule IDs
- SV-35061r1_rule
Fix: F-31939r1_fix
Remove .forward files from the system.
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-000225
- Version
- GEN005000
- Vuln IDs
- V-4387
- Rule IDs
- SV-35106r1_rule
Fix: F-31956r1_fix
Configure anonymous FTP accounts to use a non-functional shell. If necessary, edit the /etc/passwd file to remove any functioning shells associated with the FTP account and replace them with non-functioning shells, such as /dev/null.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005400
- Vuln IDs
- V-4393
- Rule IDs
- SV-38437r1_rule
Fix: F-31988r1_fix
Use the chown command to set the owner to bin. # chown bin /etc/syslog.conf
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005420
- Vuln IDs
- V-4394
- Rule IDs
- SV-35186r1_rule
Fix: F-30322r1_fix
Change the group owner of the /etc/syslog.conf file to root, bin, sys, or other. # chgrp root /etc/syslog.conf
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003260
- Vuln IDs
- V-4430
- Rule IDs
- SV-38439r1_rule
Fix: F-31810r1_fix
# chown root /var/adm/cron/cron.deny
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- GEN003820
- Vuln IDs
- V-4687
- Rule IDs
- SV-35130r1_rule
Fix: F-30282r1_fix
Edit /etc/inetd.conf and comment out the remshd service. Refresh the inetd service. # inetd -c
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-001435
- Version
- GEN003840
- Vuln IDs
- V-4688
- Rule IDs
- SV-35132r2_rule
Fix: F-30284r1_fix
Edit /etc/inetd.conf and comment out the line for the rexec daemon service. Restart the inetd service via the following command: # inetd -c
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN004660
- Vuln IDs
- V-4692
- Rule IDs
- SV-35076r1_rule
Fix: F-31943r1_fix
Edit the /etc/mail/sendmail.cf file and add or edit the following line: O PrivacyOptions=goaway Then restart the Sendmail service.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN004680
- Vuln IDs
- V-4693
- Rule IDs
- SV-35083r1_rule
Fix: F-31944r1_fix
If running Sendmail, add the line Opnovrfy to the Sendmail configuration file, usually located in /etc/mail/sendmail.cf. For other mail servers, contact the vendor for information on how to disable the verify command. Newer versions of Sendmail are available at http://www.sendmail.org or from ftp://ftp.cs.berkeley.edu/ucb/sendmail. Edit the /etc/mail/sendmail.cf file and add or edit (one of) the following line(s): O PrivacyOptions=novrfy O PrivacyOptions=goaway Then restart the Sendmail service.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001436
- Version
- GEN005280
- Vuln IDs
- V-4696
- Rule IDs
- SV-35171r1_rule
Fix: F-31973r1_fix
Edit /etc/inetd.conf and comment the uucp service entry. Restart the inetd service. # inetd -c
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001551
- Version
- GEN003860
- Vuln IDs
- V-4701
- Rule IDs
- SV-35136r1_rule
Fix: F-30288r1_fix
Edit /etc/inetd.conf and comment out the fingerd line. Restart the inetd service via the following command: # inetd -c
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- GEN000580
- Vuln IDs
- V-11947
- Rule IDs
- SV-27111r4_rule
Fix: F-24374r5_fix
For Trusted Mode: Use the SAM/SMH interface to set the system password length attribute “MIN_PASSWORD_LENGTH” to 15 or greater. For SMSE: Note: There may be additional package/bundle updates that must be installed to support attributes in the /etc/default/security file. Install the additional LongPassword11i3 and PHI11i3 product bundles where/as required. Use the SAM/SMH interface (/etc/default/security file) and/or the userdbset command (/var/adm/userdb/* files) to update the attribute(s). See the below example(s): CRYPT_ALGORITHMS_DEPRECATE=__unix__ CRYPT_DEFAULT=6 LONG_PASSWORD=1 MIN_PASSWORD_LENGTH=15 Note: The MIN_PASSWORD_LENGTH attribute must be set equal to or greater than 15. If the "vi" editor was used to update the /etc/default/security file, save the file before exiting the editor.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- GEN000600
- Vuln IDs
- V-11948
- Rule IDs
- SV-38244r2_rule
Fix: F-31541r2_fix
For Trusted Mode: Use the SAM/SMH interface or edit the /etc/default/security file and update the PASSWORD_MIN_UPPER_CASE_CHARS attribute. See the below example: PASSWORD_MIN_UPPER_CASE_CHARS=1 If manually editing the file, save any change(s) before exiting the editor. For SMSE: Note: There may be additional package/bundle updates that must be installed to support attributes in the /etc/default/security file. Use the SAM/SMH interface (/etc/default/security file) and/or the userdbset command (/var/adm/userdb/* files) to update the PASSWORD_MIN_UPPER_CASE_CHARS attribute. See the below example: PASSWORD_MIN_UPPER_CASE_CHARS=1 Note: Never use a text editor to modify any /var/adm/userdb database file. The database contains checksums and other binary data, and editors (vi included) do not follow the file locking conventions that are used to control access to the database. If manually editing the /etc/default/security file, save any change(s) before exiting the editor.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- GEN000620
- Vuln IDs
- V-11972
- Rule IDs
- SV-38245r2_rule
Fix: F-31542r2_fix
For Trusted Mode: Use the SAM/SMH interface or edit the /etc/default/security file and update the PASSWORD_MIN_DIGIT_CHARS attribute. See the below example: PASSWORD_MIN_DIGIT_CHARS=1 If manually editing the file, save any change(s) before exiting the editor. For SMSE: Note: There may be additional package/bundle updates that must be installed to support attributes in the /etc/default/security file. Use the SAM/SMH interface (/etc/default/security file) and/or the userdbset command (/var/adm/userdb/* files) to update the PASSWORD_MIN_DIGIT_CHARS attribute. See the below example: PASSWORD_MIN_DIGIT_CHARS=1 Note: Never use a text editor to modify any /var/adm/userdb database file. The database contains checksums and other binary data, and editors (vi included) do not follow the file locking conventions that are used to control access to the database. If manually editing the /etc/default/security file, save any change(s) before exiting the editor.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- GEN000640
- Vuln IDs
- V-11973
- Rule IDs
- SV-38246r2_rule
Fix: F-31543r2_fix
For Trusted Mode: Use the SAM/SMH interface or edit the /etc/default/security file and update the PASSWORD_MIN_SPECIAL_CHARS attribute. See the below example: PASSWORD_MIN_SPECIAL_CHARS=1 If manually editing the file, save any change(s) before exiting the editor. For SMSE: Note: There may be additional package/bundle updates that must be installed to support attributes in the /etc/default/security file. Use the SAM/SMH interface (/etc/default/security file) and/or the userdbset command (/var/adm/userdb/* files) to update the PASSWORD_MIN_SPECIAL_CHARS attribute. See the below example: PASSWORD_MIN_SPECIAL_CHARS=1 Note: Never use a text editor to modify any /var/adm/userdb database file. The database contains checksums and other binary data, and editors (vi included) do not follow the file locking conventions that are used to control access to the database. If manually editing the /etc/default/security file, save any change(s) before exiting the editor.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001720
- Vuln IDs
- V-11981
- Rule IDs
- SV-38266r1_rule
Fix: F-31714r1_fix
Change the mode of the global initialization file(s) to 0444. # chmod 0444 <global initialization file>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001740
- Vuln IDs
- V-11982
- Rule IDs
- SV-38267r1_rule
Fix: F-31715r1_fix
Change the ownership of global initialization files with incorrect ownership. # chown bin <global initialization files>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001760
- Vuln IDs
- V-11983
- Rule IDs
- SV-38268r1_rule
Fix: F-31716r1_fix
Change the group ownership of the global initialization file(s) with incorrect group ownership. # chgrp root <global initialization file>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001820
- Vuln IDs
- V-11984
- Rule IDs
- SV-38269r1_rule
Fix: F-31717r1_fix
Change the ownership of skeleton files with incorrect mode. # chown bin <skeleton file>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001840
- Vuln IDs
- V-11985
- Rule IDs
- SV-38270r3_rule
Fix: F-31718r2_fix
Edit the global initialization file(s) with PATH variables containing relative paths and remove any relative path form the PATH variables that have not been documented with the ISSO. Edit the global initialization file(s) and remove any empty entry that is defined.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001900
- Vuln IDs
- V-11986
- Rule IDs
- SV-34915r3_rule
Fix: F-32917r2_fix
Edit the local initialization file and remove the relative path entries from the PATH variable that have not been documented with the ISSO. Edit the local initialization file and remove any empty entry that is defined.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- GEN002040
- Vuln IDs
- V-11988
- Rule IDs
- SV-38249r1_rule
Fix: F-31760r1_fix
Remove the .rhosts, .shosts, hosts.equiv, and/or shosts.equiv files.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN002100
- Vuln IDs
- V-11989
- Rule IDs
- SV-38264r2_rule
Fix: F-31761r1_fix
Edit /etc/pam.conf and comment/remove the "rcomds" line(s).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003060
- Vuln IDs
- V-11995
- Rule IDs
- SV-38251r1_rule
Fix: F-31812r1_fix
Remove default system accounts (such as bin, sys, adm, or others) from the cron.allow file if it exists, or add those accounts to the cron.deny file.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN003500
- Vuln IDs
- V-11996
- Rule IDs
- SV-35008r1_rule
Fix: F-31839r1_fix
Edit /etc/profile, ensure the ulimit command is present with the -c argument of the ulimit command set to 0.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003540
- Vuln IDs
- V-11999
- Rule IDs
- SV-35009r1_rule
Fix: F-31853r1_fix
# kctune executable_stack=0 The system will require a restart/reboot for the setting to take effect.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001551
- Version
- GEN003600
- Vuln IDs
- V-12002
- Rule IDs
- SV-38259r1_rule
Fix: F-31855r1_fix
Disable the IP source-routed forwarding feature. # ndd -set /dev/ip ip_forward_src_routed 0 Edit /etc/rc.config.d/nddconf and add/set: TRANSPORT_NAME[x] = ip NDD_NAME[x] = ip_forward_src_routed NDD_VALUE[x] = 0
- RMF Control
- SC-32
- Severity
- L
- CCI
- CCI-001208
- Version
- GEN003620
- Vuln IDs
- V-12003
- Rule IDs
- SV-35048r1_rule
Fix: F-31874r1_fix
Migrate the /home (or equivalent) path onto a separate file system.
- RMF Control
- CM-2
- Severity
- M
- CCI
- CCI-000305
- Version
- GEN003700
- Vuln IDs
- V-12005
- Rule IDs
- SV-35064r1_rule
Fix: F-31882r1_fix
Remove or disable the inetd startup scripts and kill the service.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN004540
- Vuln IDs
- V-12006
- Rule IDs
- SV-35059r2_rule
Fix: F-11266r3_fix
To disable the SMTP HELP command, remove or empty the Sendmail help file: /etc/mail/helpfile.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005040
- Vuln IDs
- V-12011
- Rule IDs
- SV-38263r1_rule
Fix: F-31958r1_fix
Edit the initialization files for the ftp user and set the umask to 077.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005180
- Vuln IDs
- V-12014
- Rule IDs
- SV-35162r1_rule
Fix: F-31965r1_fix
Change the mode of the .Xauthority files. # chmod 0600 .Xauthority
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005360
- Vuln IDs
- V-12019
- Rule IDs
- SV-35203r1_rule
Fix: F-31981r2_fix
Change the owner of the snmpd.conf file to bin. # chown bin /etc/SnmpAgent.d/snmpd.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005480
- Vuln IDs
- V-12021
- Rule IDs
- SV-35195r1_rule
Fix: F-31993r1_fix
Edit the /etc/rc.config.d/syslogd configuration startup script and add the -N option to the syslogd command. Restart the syslogd service via the following command(s): # /sbin/init.d/syslogd stop # /sbin/init.d/syslogd start
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005540
- Vuln IDs
- V-12022
- Rule IDs
- SV-35149r1_rule
Fix: F-32040r1_fix
Add appropriate IP restrictions for SSH to the /etc/hosts.deny and/or /etc/hosts.allow files.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005600
- Vuln IDs
- V-12023
- Rule IDs
- SV-35177r1_rule
Fix: F-32046r1_fix
Edit /etc/rc.config.d/nddconf and set the ip_forwarding option to 0.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006620
- Vuln IDs
- V-12030
- Rule IDs
- SV-35222r1_rule
Fix: F-32114r1_fix
Edit the <path>/hosts.allow and <path/hosts.deny files to configure access restrictions.
- RMF Control
- CM-2
- Severity
- M
- CCI
- CCI-000305
- Version
- GEN003865
- Vuln IDs
- V-12049
- Rule IDs
- SV-35138r2_rule
Fix: F-31909r1_fix
Remove the network analysis tool binary from the system. Consult vendor documentation for removing packaged software, or remove the binary directly via the following example: # rm -i <binary>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN000250
- Vuln IDs
- V-22294
- Rule IDs
- SV-38272r1_rule
Fix: F-31497r1_fix
Change the owner of the NTP configuration file. # chown root /etc/ntp.conf
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN000251
- Vuln IDs
- V-22295
- Rule IDs
- SV-38273r1_rule
Fix: F-31498r1_fix
Change the group-owner of the NTP configuration file. Procedure: # chgrp root /etc/ntp.conf
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN000252
- Vuln IDs
- V-22296
- Rule IDs
- SV-38274r1_rule
Fix: F-31499r1_fix
Change the mode of the NTP configuration file to 0640 or less permissive. # chmod 0640 /etc/ntp.conf
- RMF Control
- AC-10
- Severity
- L
- CCI
- CCI-000054
- Version
- GEN000450
- Vuln IDs
- V-22298
- Rule IDs
- SV-26319r2_rule
Fix: F-31517r2_fix
For Trusted Mode: Use the SAM/SMH interface (/etc/default/security file) to update attribute. See the below example: NUMBER_OF_LOGINS_ALLOWED=10 For SMSE: Note: There may be additional package/bundle updates that must be installed to support attributes in the /etc/default/security file. Use the SAM/SMH interface (/etc/default/security file) and/or the userdbset command (/var/adm/userdb/* files) to update attribute. See the below example: NUMBER_OF_LOGINS_ALLOWED=10 Note: Never use a text editor to modify any /var/adm/userdb database file. The database contains checksums and other binary data, and editors (vi included) do not follow the file locking conventions that are used to control access to the database. If manually editing the /etc/default/security file, save any change(s) before exiting the editor.
- RMF Control
- AC-9
- Severity
- L
- CCI
- CCI-000052
- Version
- GEN000452
- Vuln IDs
- V-22299
- Rule IDs
- SV-38302r1_rule
Fix: F-31518r1_fix
Edit the configuration file and modify the PrintLastLog line entry as follows: PrintLastLog yes
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- GEN000610
- Vuln IDs
- V-22305
- Rule IDs
- SV-38304r2_rule
Fix: F-31549r2_fix
For Trusted Mode: Use the SAM/SMH interface or edit the /etc/default/security file and update the PASSWORD_MIN_LOWER_CASE_CHARS attribute. See the below example: PASSWORD_MIN_LOWER_CASE_CHARS=1 If manually editing the file, save any change(s) before exiting the editor. For SMSE: Note: There may be additional package/bundle updates that must be installed to support attributes in the /etc/default/security file. Use the SAM/SMH interface (/etc/default/security file) and/or the userdbset command (/var/adm/userdb/* files) to update the PASSWORD_MIN_LOWER_CASE_CHARS attribute. See the below example: PASSWORD_MIN_LOWER_CASE_CHARS=1 Note: Never use a text editor to modify any /var/adm/userdb database file. The database contains checksums and other binary data, and editors (vi included) do not follow the file locking conventions that are used to control access to the database. If manually editing the /etc/default/security file, save any change(s) before exiting the editor.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-000009
- Version
- GEN000850
- Vuln IDs
- V-22308
- Rule IDs
- SV-26349r1_rule
Fix: F-31552r1_fix
Edit /etc/default/security and uncomment, set, or add the SU_ROOT_GROUP setting with a value of wheel or equivalent. If necessary, create a wheel group and add administrative users to the group.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000945
- Vuln IDs
- V-22310
- Rule IDs
- SV-38307r1_rule
Fix: F-31554r1_fix
Edit the root user initialization files and remove any definition of LD_LIBRARY_PATH and SHLIB_PATH.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000950
- Vuln IDs
- V-22311
- Rule IDs
- SV-38308r1_rule
Fix: F-31555r1_fix
Edit the root user initialization files and remove any definition of LD_PRELOAD.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001362
- Vuln IDs
- V-22319
- Rule IDs
- SV-38310r1_rule
Fix: F-31573r1_fix
As root, change the owner of the /etc/resolv.conf file to root. # chown root /etc/resolv.conf
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001363
- Vuln IDs
- V-22320
- Rule IDs
- SV-38311r1_rule
Fix: F-31574r1_fix
Change the group owner of the /etc/resolv.conf file to root, bin, sys, or other. Procedure: # chgrp root /etc/resolv.conf
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001364
- Vuln IDs
- V-22321
- Rule IDs
- SV-38312r1_rule
Fix: F-31575r1_fix
Change the mode of the /etc/resolv.conf file to 0644 or less permissive. # chmod 0644 /etc/resolv.conf
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001366
- Vuln IDs
- V-22323
- Rule IDs
- SV-38313r1_rule
Fix: F-31577r1_fix
Change the owner of the /etc/hosts file to root. # chown root /etc/hosts
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001367
- Vuln IDs
- V-22324
- Rule IDs
- SV-38314r1_rule
Fix: F-31578r1_fix
Change the group owner of the /etc/hosts file to root, sys, bin, or other. Procedure: # chgrp root /etc/hosts
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001368
- Vuln IDs
- V-22325
- Rule IDs
- SV-38315r1_rule
Fix: F-31579r1_fix
Change the mode of the /etc/hosts file to 0644 or less permissive. # chmod 0644 /etc/hosts
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001371
- Vuln IDs
- V-22327
- Rule IDs
- SV-38316r1_rule
Fix: F-31581r1_fix
Change the owner of the /etc/nsswitch.conf file to root. # chown root /etc/nsswitch.conf
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001372
- Vuln IDs
- V-22328
- Rule IDs
- SV-38317r1_rule
Fix: F-31582r1_fix
Change the group-owner of the /etc/nsswitch.conf file to root, bin, sys, or other. Procedure: # chgrp root /etc/nsswitch.conf
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001373
- Vuln IDs
- V-22329
- Rule IDs
- SV-38319r1_rule
Fix: F-31583r1_fix
Change the mode of the /etc/nsswitch.conf file to 0644 or less permissive. # chmod 0644 /etc/nsswitch.conf
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001378
- Vuln IDs
- V-22332
- Rule IDs
- SV-38335r1_rule
Fix: F-31602r1_fix
Change the owner of the /etc/passwd file to root. # chown root /etc/passwd
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001379
- Vuln IDs
- V-22333
- Rule IDs
- SV-38336r1_rule
Fix: F-31603r1_fix
Change the group owner of the /etc/passwd file to root, bin, sys, or other. Procedure: # chgrp root /etc/passwd
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001391
- Vuln IDs
- V-22335
- Rule IDs
- SV-38337r1_rule
Fix: F-31601r1_fix
Change the owner of the /etc/group file to bin. # chown bin /etc/group
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001392
- Vuln IDs
- V-22336
- Rule IDs
- SV-38338r1_rule
Fix: F-31652r1_fix
Change the group owner of the /etc/group file. Procedure: # chgrp root /etc/group
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001393
- Vuln IDs
- V-22337
- Rule IDs
- SV-38339r1_rule
Fix: F-31653r1_fix
Change the mode of the /etc/group file to 0444 or less permissive. # chmod 0444 /etc/group
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001410
- Vuln IDs
- V-22339
- Rule IDs
- SV-38340r2_rule
Fix: F-31655r2_fix
For Trusted Mode: # chgrp root /tcb #chgrp root /tcb/files /tcb/files/auth # chgrp root /tcb/files/auth/[a-z]/* For SMSE: # chgrp root /etc/shadow
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000201
- Version
- GEN001470
- Vuln IDs
- V-22347
- Rule IDs
- SV-38323r2_rule
Fix: F-31694r2_fix
Migrate /etc/passwd password hashes. For Trusted Mode: Use the System Administration Manager (SAM) or the System Management Homepage (SMH) to migrate from a non-SMSE Standard Mode to Trusted Mode. For SMSE Mode: Use the following command to create the shadow file. The command will then copy all encrypted passwords into the shadow file and replace the passwd file password entries with an “x”. # pwconv
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001475
- Vuln IDs
- V-22348
- Rule IDs
- SV-38341r1_rule
Fix: F-31696r1_fix
Edit /etc/group and change the password field to include an asterisk (*) as the first character to lock the group password.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001605
- Vuln IDs
- V-22354
- Rule IDs
- SV-38343r3_rule
Fix: F-31700r2_fix
Edit the run control script and remove any relative or empty path entry from the library search path variable that has not been documented with the ISSO. Edit the run control script and remove any empty entry that is defined.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001610
- Vuln IDs
- V-22355
- Rule IDs
- SV-38344r3_rule
Fix: F-31721r2_fix
Edit the run control script and remove any relative entries from the library preload variables that have not been documented with the ISSO. Edit the run control script and remove any empty entry that is defined.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN001830
- Vuln IDs
- V-22358
- Rule IDs
- SV-38347r1_rule
Fix: F-31725r1_fix
Change the group owner of the skeleton file to root, bin, sys, or other. # chgrp <group> /etc/skel/<skeleton file>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001845
- Vuln IDs
- V-22359
- Rule IDs
- SV-38348r3_rule
Fix: F-31727r2_fix
Edit the global initialization file and remove the relative path entries from the library search path variables that have not been documented with the ISSO. Edit the global initialization file and remove any empty entry that is defined.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001850
- Vuln IDs
- V-22360
- Rule IDs
- SV-38349r3_rule
Fix: F-31728r2_fix
Edit the global initialization file and remove the relative path entry from the library preload list variables that have not been documented with the ISSO. Edit the global initialization file(s) and remove any empty entry that is defined for the library preload list.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001901
- Vuln IDs
- V-22363
- Rule IDs
- SV-38351r3_rule
Fix: F-31732r2_fix
Edit the user's local initialization file(s) and remove any relative path entry from the library search LIBRARY_PATH and/or SHLIB_PATH variable(s) that have not been documented with the ISSO. Edit the user’s local initialization file(s) and remove any empty entry that is defined for the “LIBRARY_PATH” and/or “SHLIB_PATH” variable(s).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001902
- Vuln IDs
- V-22364
- Rule IDs
- SV-34928r3_rule
Fix: F-31733r2_fix
Edit the local initialization file and remove any relative/empty path entry from the library LD_PRELOAD variable that has not been documented with the ISSO. Edit the local initialization file and remove any empty entry that is defined for the “LD_PRELOAD” variable.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN002210
- Vuln IDs
- V-22365
- Rule IDs
- SV-38352r1_rule
Fix: F-31734r1_fix
Change the group owner of the shell to root, bin, sys, or other. Procedure: # chgrp root <shell>
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001493
- Version
- GEN002715
- Vuln IDs
- V-22370
- Rule IDs
- SV-26506r2_rule
Fix: F-31776r2_fix
As root, change the file ownership. # chown root <audit_tool_filename>
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001493
- Version
- GEN002716
- Vuln IDs
- V-22371
- Rule IDs
- SV-26509r2_rule
Fix: F-31777r2_fix
As root, change the file group ownership. # chgrp root <audit_tool_filename>
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001493
- Version
- GEN002717
- Vuln IDs
- V-22372
- Rule IDs
- SV-26512r2_rule
Fix: F-31778r2_fix
As root, change the file permissions. # chmod 0750 <audit tool executable>
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000143
- Version
- GEN002730
- Vuln IDs
- V-22375
- Rule IDs
- SV-29653r1_rule
Fix: F-31780r1_fix
Edit the AUDOMON_ARGS parameter of the /etc/rc.config.d/auditing file to include -w 90.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-000018
- Version
- GEN002750
- Vuln IDs
- V-22376
- Rule IDs
- SV-29670r1_rule
Fix: F-31782r1_fix
Edit /etc/rc.config.d/auditing and add -e admin to the end of the AUDEVENT_ARGS1 parameter.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-001403
- Version
- GEN002751
- Vuln IDs
- V-22377
- Rule IDs
- SV-29675r1_rule
Fix: F-31783r1_fix
Edit /etc/rc.config.d/auditing and add -e admin to the end of the AUDEVENT_ARGS1 parameter.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-001404
- Version
- GEN002752
- Vuln IDs
- V-22378
- Rule IDs
- SV-29676r1_rule
Fix: F-31784r1_fix
Edit /etc/rc.config.d/auditing and add -e admin to the end of the AUDEVENT_ARGS1 parameter.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-001405
- Version
- GEN002753
- Vuln IDs
- V-22382
- Rule IDs
- SV-29679r1_rule
Fix: F-31785r1_fix
Edit /etc/rc.config.d/auditing and add -e admin to the end of the AUDEVENT_ARGS1 parameter.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003250
- Vuln IDs
- V-22391
- Rule IDs
- SV-34991r1_rule
Fix: F-31818r1_fix
Change the group ownership of the file. # chgrp root /var/adm/cron/cron.allow
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003252
- Vuln IDs
- V-22392
- Rule IDs
- SV-26557r1_rule
Fix: F-31819r1_fix
Change the mode of the file. # chmod 0600 /var/adm/cron/at.deny
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003270
- Vuln IDs
- V-22394
- Rule IDs
- SV-34993r1_rule
Fix: F-31821r1_fix
Change the group-owner of the cron.deny file. # chgrp root /var/adm/cron/cron.deny
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003430
- Vuln IDs
- V-22396
- Rule IDs
- SV-34995r1_rule
Fix: F-31829r1_fix
Change the group ownership of the file to root, bin, sys or other. # chgrp root /var/spool/cron/atjobs
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003470
- Vuln IDs
- V-22397
- Rule IDs
- SV-26571r1_rule
Fix: F-31835r1_fix
Change the group ownership of the file. # chgrp root /usr/lib/cron/at.allow
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003490
- Vuln IDs
- V-22398
- Rule IDs
- SV-26574r1_rule
Fix: F-31838r1_fix
Change the group ownership of the at.deny file to root, bin, sys, or other. # chgrp root /usr/lib/cron/at.deny
- RMF Control
- AC-6
- Severity
- L
- CCI
- CCI-000225
- Version
- GEN003521
- Vuln IDs
- V-22405
- Rule IDs
- SV-26611r1_rule
Fix: F-31849r1_fix
Change the group-owner of the kernel core dump data directory. # chgrp root /var/adm/crash
- RMF Control
- AC-6
- Severity
- L
- CCI
- CCI-000225
- Version
- GEN003522
- Vuln IDs
- V-22406
- Rule IDs
- SV-26615r1_rule
Fix: F-31850r1_fix
Change the group-owner of the kernel core dump data directory. # chmod 0700 /var/adm/crash
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001551
- Version
- GEN003602
- Vuln IDs
- V-22409
- Rule IDs
- SV-35022r1_rule
Fix: F-31859r1_fix
Disable ICMP Timestamp responses on the system. # ndd -set /dev/ip ip_respond_to_timestamp 0 Edit /etc/rc.config.d/nddconf and add/set: TRANSPORT_NAME[x]=ip NDD_NAME[x]=ip_respond_to_timestamp NDD_VALUE[x]=0
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001551
- Version
- GEN003603
- Vuln IDs
- V-22410
- Rule IDs
- SV-35025r1_rule
Fix: F-31860r1_fix
Configure the system to not respond to ICMP ECHO_REQUESTs sent to broadcast addresses. # ndd -set /dev/ip ip_respond_to_echo_broadcast 0 Edit /etc/rc.config.d/nddconf and add/set: TRANSPORT_NAME[x]=ip NDD_NAME[x]=ip_respond_to_echo_broadcast NDD_VALUE[x]=0
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001551
- Version
- GEN003604
- Vuln IDs
- V-22411
- Rule IDs
- SV-35026r1_rule
Fix: F-31861r1_fix
Configure the system to not respond to ICMP timestamp requests sent to broadcast addresses. # ndd -set /dev/ip ip_respond_to_timestamp_broadcast 0 Edit /etc/rc.config.d/nddconf and add/set: TRANSPORT_NAME[x]=ip NDD_NAME[x]=ip_respond_to_timestamp_broadcast NDD_VALUE[x]=0
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001551
- Version
- GEN003605
- Vuln IDs
- V-22412
- Rule IDs
- SV-35028r1_rule
Fix: F-31862r1_fix
Disable the IP source-routed forwarding feature. # ndd -set /dev/ip ip_forward_src_routed 0 Edit /etc/rc.config.d/nddconf and add/set: TRANSPORT_NAME[x] = ip NDD_NAME[x] = ip_forward_src_routed NDD_VALUE[x] = 0
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001551
- Version
- GEN003606
- Vuln IDs
- V-22413
- Rule IDs
- SV-29707r2_rule
Fix: F-31866r2_fix
Edit /etc/opt/ipf/ipf.conf and add rules to block outgoing source-routed packets, such as: block out log quick [all] | [from any to any] with opt lsrr block out log quick [all] | [from any to any] with opt ssrr Reload the IPF rules: # ipf -Fa -A -f /etc/opt/ipf/ipf.conf
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001551
- Version
- GEN003607
- Vuln IDs
- V-22414
- Rule IDs
- SV-29713r2_rule
Fix: F-31869r2_fix
Edit /etc/opt/ipf/ipf.conf and add rules to block incoming source-routed packets, such as: block in log quick [all] | [from any to any] with opt lsrr block in log quick [all] | [from any to any] with opt ssrr Reload the IPF rules. # ipf -Fa -A -f /etc/opt/ipf/ipf.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-001503
- Version
- GEN003609
- Vuln IDs
- V-22416
- Rule IDs
- SV-29719r1_rule
Fix: F-31870r1_fix
Edit /etc/opt/ipf/ipf.conf and add rules to block incoming IPv4 ICMP redirect messages, such as: block in quick proto icmp from any to any icmp-type redir Reload the IPF rules. Flush the rules from your ruleset using the -Fa option. The -A option specifies the active rules list. The -f option specifies the rules configuration file to be used: # ipf -Fa -A -f /etc/opt/ipf/ipf.conf
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001551
- Version
- GEN003610
- Vuln IDs
- V-22417
- Rule IDs
- SV-35038r1_rule
Fix: F-31865r1_fix
Configure the system to not send IPv4 ICMP redirect messages. # ndd -set /dev/ip ip_send_redirects 0 Edit /etc/rc.config.d/nddconf and add/set: TRANSPORT_NAME[x]=ip NDD_NAME[x]=ip_send_redirects NDD_VALUE[x]=0
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003730
- Vuln IDs
- V-22423
- Rule IDs
- SV-35069r1_rule
Fix: F-31884r1_fix
Change the group ownership of the inetd configuration file. # chgrp root <file or directory>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003750
- Vuln IDs
- V-22425
- Rule IDs
- SV-35074r1_rule
Fix: F-31888r1_fix
Change the mode of included xinetd configuration directories to 0755. # chmod 0755 <directory>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003770
- Vuln IDs
- V-22427
- Rule IDs
- SV-35080r1_rule
Fix: F-31893r1_fix
Change the group-owner of the services file. Procedure: # chgrp root /etc/services
- RMF Control
- CM-2
- Severity
- M
- CCI
- CCI-000305
- Version
- GEN003825
- Vuln IDs
- V-22431
- Rule IDs
- SV-35129r1_rule
Fix: F-31900r1_fix
Uninstall the remshd service from the system. # cat /etc/inetd.conf | grep -n remshd Edit the /etc/inetd.conf file and comment the line entry for remshd, then reconfigure inetd via: # inetd -c
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- GEN003830
- Vuln IDs
- V-22432
- Rule IDs
- SV-29697r1_rule
Fix: F-31902r1_fix
Edit /etc/inetd.conf and comment out the rlogind service. Restart the inetd service via the following command: # inetd -c
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN003930
- Vuln IDs
- V-22435
- Rule IDs
- SV-35144r1_rule
Fix: F-31913r1_fix
Change the group-owner of the hosts.lpd (or equivalent) file(s). # chgrp root /etc/hosts.lpd
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN004370
- Vuln IDs
- V-22438
- Rule IDs
- SV-35163r1_rule
Fix: F-31924r1_fix
Change the group-owner of the /etc/mail/aliases file. # chgrp root /etc/mail/aliases
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN004410
- Vuln IDs
- V-22440
- Rule IDs
- SV-38373r1_rule
Fix: F-31929r1_fix
Change the group ownership of the file referenced from /etc/mail/aliases. # chgrp root <file referenced from aliases>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN004930
- Vuln IDs
- V-22444
- Rule IDs
- SV-35104r1_rule
Fix: F-31953r1_fix
Change the group owner of the ftpusers file. # chgrp root /etc/ftpd/ftpusers
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005365
- Vuln IDs
- V-22451
- Rule IDs
- SV-26734r1_rule
Fix: F-31982r1_fix
Change the group ownership of the SNMP configuration file. # chgrp root /etc/SnmpAgent.d/snmpd.conf
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005390
- Vuln IDs
- V-22453
- Rule IDs
- SV-38376r1_rule
Fix: F-31985r1_fix
Change the permissions of the syslog configuration file. # chmod 0640 /etc/syslog.conf
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000136
- Version
- GEN005450
- Vuln IDs
- V-22455
- Rule IDs
- SV-35189r1_rule
Fix: F-31991r1_fix
Edit the syslog configuration file and add an appropriate remote syslog server.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- GEN005510
- Vuln IDs
- V-22461
- Rule IDs
- SV-35188r1_rule
Fix: F-32007r1_fix
Edit the configuration file and remove any ciphers that do not meet the following: 3des-ctr or aes-NNN-ctr (NNN=128, 192 or 256). If necessary, add the Ciphers entry with one or more of the above keyword values.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005511
- Vuln IDs
- V-22462
- Rule IDs
- SV-35193r1_rule
Fix: F-32008r1_fix
Edit the configuration file and remove any ciphers other than those with the "aes" prefix and the "-ctr" suffix.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- GEN005512
- Vuln IDs
- V-22463
- Rule IDs
- SV-35210r3_rule
Fix: F-32009r2_fix
Edit the SSH client configuration and remove any MACs that are not hmac-sha1 or a better hmac algorithm that is on the FIPS 140-2 approved list. If necessary, add a MACs line.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005521
- Vuln IDs
- V-22470
- Rule IDs
- SV-35052r1_rule
Fix: F-30228r1_fix
Edit the SSH daemon configuration and add the appropriate keyword directive(s) and space-separated user/group names. The keyword order of precedence is as follows: DenyUsers, AllowUsers, DenyGroups, AllowGroups
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005522
- Vuln IDs
- V-22471
- Rule IDs
- SV-35060r1_rule
Fix: F-30234r1_fix
Change the permissions for the SSH public host key files. # chmod 0644 /opt/ssh/etc/*key.pub
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005523
- Vuln IDs
- V-22472
- Rule IDs
- SV-35063r1_rule
Fix: F-30236r1_fix
Change the permissions for the SSH private host key files. # chmod 0600 /opt/ssh/etc/*key
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN005524
- Vuln IDs
- V-22473
- Rule IDs
- SV-35066r1_rule
Fix: F-30238r1_fix
Edit the SSH daemon configuration and delete the keyword entry or modify the entry as follows: GSSAPIAuthentication no
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN005525
- Vuln IDs
- V-22474
- Rule IDs
- SV-35068r1_rule
Fix: F-30241r1_fix
Edit the configuration file and set/add (if necessary) the GSSAPIAuthentication directive set to no.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN005526
- Vuln IDs
- V-22475
- Rule IDs
- SV-35075r1_rule
Fix: F-30245r1_fix
Edit the SSH daemon configuration and set (add if necessary) a KerberosAuthentication directive set to no.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005536
- Vuln IDs
- V-22485
- Rule IDs
- SV-35137r1_rule
Fix: F-30289r1_fix
Edit the SSH daemon configuration and add or edit the StrictModes setting value to yes.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005537
- Vuln IDs
- V-22486
- Rule IDs
- SV-35139r1_rule
Fix: F-30291r1_fix
Edit the SSH daemon configuration and add or edit the UsePrivilegeSeparation setting value to yes.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005538
- Vuln IDs
- V-22487
- Rule IDs
- SV-35142r1_rule
Fix: F-30293r1_fix
Edit the SSH daemon configuration and add or edit the RhostsRSAAuthentication setting value to no. Note that the above guidance applies exclusively to Protocol(s) 1/1,2/2,1 only. If using Protocol 2 only, the check is not applicable and further action is not required.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005539
- Vuln IDs
- V-22488
- Rule IDs
- SV-35146r1_rule
Fix: F-30297r1_fix
Edit the SSH daemon configuration and add or edit the Compression setting value to no or delayed.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005610
- Vuln IDs
- V-22491
- Rule IDs
- SV-26811r1_rule
Fix: F-24054r1_fix
Disable IPv6 forwarding: # ndd -set /dev/ip6 ip6_forwarding 0 Edit /etc/rc.config.d/nddconf: TRANSPORT_NAME[index]=ip6 NDD_NAME[index]=ip6_forwarding NDD_VALUE[index]=0 Where: index is the next available integer value of the nddconf file. n is a number: either 1 to turn the feature ON or 0 to turn it OFF.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN005810
- Vuln IDs
- V-22496
- Rule IDs
- SV-35196r2_rule
Fix: F-30332r2_fix
Change the group owner of the share directory. # chgrp (root|bin|sys|other) <exported directory>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006225
- Vuln IDs
- V-22499
- Rule IDs
- SV-35109r1_rule
Fix: F-32081r1_fix
Edit the /etc/smb.conf file and change the security setting to user or another valid setting other than share, for example: security = user
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006230
- Vuln IDs
- V-22500
- Rule IDs
- SV-35111r1_rule
Fix: F-32083r1_fix
Edit the /etc/opt/samba/smb.conf file and change the encrypt passwords setting to yes, for example: encrypt passwords = yes
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006235
- Vuln IDs
- V-22501
- Rule IDs
- SV-35112r1_rule
Fix: F-32084r1_fix
Edit the /etc/opt/samba/smb.conf file and change the guest ok setting to no, for example: guest ok = no
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- GEN007020
- Vuln IDs
- V-22511
- Rule IDs
- SV-29988r1_rule
Fix: F-30357r1_fix
Configure the system to prevent the dynamic loading of the SCTP protocol handler. Preview the removal of SCTP: # swremove -p <SCTP software product> Remove: # swremove <SCTP software product>
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001551
- Version
- GEN007820
- Vuln IDs
- V-22547
- Rule IDs
- SV-26928r1_rule
Fix: F-24172r1_fix
Edit the /etc/rc.config.d/netconf* files and remove the tunnel configurations.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN007840
- Vuln IDs
- V-22548
- Rule IDs
- SV-26932r1_rule
Fix: F-24175r1_fix
Disable the DHCP client configuration. Edit /etc/rc.config.d/netconf and set the DHCP_ENABLE setting to 0.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001551
- Version
- GEN007860
- Vuln IDs
- V-22550
- Rule IDs
- SV-35241r1_rule
Fix: F-30359r1_fix
Add an IPF rule to block inbound IPv6 ICMP redirect packets. Edit /etc/opt/ipf/ipf6.conf and add a rule such as: block in quick proto icmpv6 from any to any icmpv6-type 137 Reload the IPF rules. # ipf -6 -Fa -A -f /etc/opt/ipf/ipf6.conf
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001551
- Version
- GEN007880
- Vuln IDs
- V-22551
- Rule IDs
- SV-26939r1_rule
Fix: F-24184r1_fix
Configure the system to not send IPv6 ICMP redirect messages. # ndd -set /dev/ip6 ip6_send_redirects 0 Edit /etc/rc.config.d/nddconf: TRANSPORT_NAME[index]=ip6 NDD_NAME[index]=ip6_send_redirects NDD_VALUE[index]=0 Where: index is the next available integer value of the nddconf file. n is a number: either 1 to turn the feature ON or 0 to turn it OFF.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- GEN008020
- Vuln IDs
- V-22557
- Rule IDs
- SV-38381r1_rule
Fix: F-32145r1_fix
Edit /etc/opt/ldapux/ldapux_client.conf and set # Perform the CERT check peer_cert_policy=CERT OR # Perform the CERT check PLUS peer_cert_policy=CNCERT
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN008140
- Vuln IDs
- V-22563
- Rule IDs
- SV-38386r1_rule
Fix: F-32152r1_fix
Change the ownership of the file and/or directory. # chown root <directory> # chown root <directory>/<file>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN008160
- Vuln IDs
- V-22564
- Rule IDs
- SV-38387r1_rule
Fix: F-32153r1_fix
Change the group ownership of LDAP client certificate directory/files to root, bin, sys, or other. # chgrp root <directory> # chgrp root <directory>/<file>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN008180
- Vuln IDs
- V-22565
- Rule IDs
- SV-38388r1_rule
Fix: F-32154r1_fix
Change the mode of the file and/or directory. # chmod 0755 <directory> # chmod 0644 <directory>/<file>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN008220
- Vuln IDs
- V-22567
- Rule IDs
- SV-38390r1_rule
Fix: F-32157r1_fix
Change the ownership of the file. # chown root <certfile>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN008240
- Vuln IDs
- V-22568
- Rule IDs
- SV-38391r1_rule
Fix: F-32158r1_fix
Change the group ownership of the LDAP client certificate file. # chgrp root <cert file>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN008260
- Vuln IDs
- V-22569
- Rule IDs
- SV-38392r1_rule
Fix: F-32159r1_fix
Change the permissions of the LDAP client certificate file. # chmod 0644 <cert file>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN008300
- Vuln IDs
- V-22571
- Rule IDs
- SV-38394r1_rule
Fix: F-32161r1_fix
Change the ownership of the file. # chown root <key file>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN008320
- Vuln IDs
- V-22572
- Rule IDs
- SV-38395r1_rule
Fix: F-32162r1_fix
Change the group owner of the LDAP client key file. # chgrp root <key file>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- GEN008340
- Vuln IDs
- V-22573
- Rule IDs
- SV-38396r1_rule
Fix: F-32163r1_fix
Change the mode of the file. # chmod 0600 <key file>
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN008440
- Vuln IDs
- V-22577
- Rule IDs
- SV-38377r1_rule
Fix: F-32167r1_fix
Stop and disable the autofs service. Edit /etc/rc.config.d/nfsconf and set the AUTOFS setting to 0. Restart the nfs.client service. # /usr/sbin/init.d/nfs.client stop # /usr/sbin/init.d/nfs.client start
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001118
- Version
- GEN008520
- Vuln IDs
- V-22582
- Rule IDs
- SV-38403r1_rule
Fix: F-32171r1_fix
Set IPF_START=1 in /etc/rc.config.d/ipfconf. Refresh/restart. # /sbin/init.d/ipfboot start
- RMF Control
- SI-2
- Severity
- L
- CCI
- CCI-001233
- Version
- GEN008820
- Vuln IDs
- V-22589
- Rule IDs
- SV-38405r1_rule
Fix: F-32179r1_fix
Configure the system package management tool to not automatically obtain updates.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- GEN000410
- Vuln IDs
- V-23732
- Rule IDs
- SV-38407r1_rule
Fix: F-31524r1_fix
Edit /etc/inetd.conf and add the -a /etc/ftpd/ftpaccess option to the ftp line, if it is not present. If the /etc/ftpd/ftpaccess does not exist, create it by copying the example configuration file. Edit the ftpaccess file and add or set the banner setting to a banner file, such as /etc/ftpd/banner_msg. Create the banner file and add one of the DoD login banners (based on the character limitations imposed by the system). DoD Login Banners: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." OR "I've read & consent to terms in IS user agreem't."
- RMF Control
- SC-32
- Severity
- L
- CCI
- CCI-001208
- Version
- GEN003621
- Vuln IDs
- V-23736
- Rule IDs
- SV-35050r1_rule
Fix: F-30227r1_fix
Migrate the /var path onto a separate file system.
- RMF Control
- SC-32
- Severity
- L
- CCI
- CCI-001208
- Version
- GEN003623
- Vuln IDs
- V-23738
- Rule IDs
- SV-35054r1_rule
Fix: F-30229r2_fix
Migrate the audit log path onto a separate filesystem. The following assumes that /var exists and that the new audit log mount point will be /var/.audit. Verify if auditing is running: # ps -ef | grep audomon | grep -v grep If auditing is running, issue the stop command: # /sbin/init.d/auditing stop Use SAM/SMH to: - Create a new Logical Volume (size to be determined based on local site requirements). - Create a VxFS file system on the new logical volume, paying special attention to site requirements such as Access Permissions, Allocation Policies, Mirroring considerations, large/no-large files and mount options such as suid/nosuid and ro/rw. Verify the /etc/fstab /var/.audit entry # more /etc/fstab Verify the current mounts: # mount Mount /var/.audit if not yet mounted: # mount -a Re-start the auditing subsystem: # /sbin/init.d/auditing start Verify that auditing is now running: # ps -ef | grep audomon | grep -v grep
- RMF Control
- SC-32
- Severity
- L
- CCI
- CCI-001208
- Version
- GEN003624
- Vuln IDs
- V-23739
- Rule IDs
- SV-35055r1_rule
Fix: F-30230r1_fix
Migrate the /tmp path onto a separate file system.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003601
- Vuln IDs
- V-23741
- Rule IDs
- SV-29690r1_rule
Fix: F-26884r1_fix
Set the tcp_syn_rcvd_max parameter to 1280. # ndd -set /dev/tcp tcp_syn_rcvd_max 1280 Edit /etc/rc.config.d/nddconf and add/set: TRANSPORT_NAME[x] = tcp NDD_NAME[x] = tcp_syn_rcvd_max NDD_VALUE[x] = 1280
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN007950
- Vuln IDs
- V-23972
- Rule IDs
- SV-29786r1_rule
Fix: F-32141r1_fix
Add an IPF rule to block inbound IPv6 ICMP ECHO_REQUEST packets sent to the all-hosts multicast address. Edit /etc/opt/ipf/ipf6.conf and add a rule such as: block in quick proto icmpv6 from any to ff02::1 icmpv6-type 128 Reload the IPF rules. # ipf -6 -Fa -A -f /etc/opt/ipf/ipf6.conf
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- GEN000402
- Vuln IDs
- V-24331
- Rule IDs
- SV-38411r1_rule
Fix: F-31526r1_fix
Configure the system to display one of the DoD login banners (based on the character limitations imposed by the system) prior to, or as part of, the graphical desktop environment login process. DoD Login Banners: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." OR "I've read & consent to terms in IS user agreem't."
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- GEN008050
- Vuln IDs
- V-24384
- Rule IDs
- SV-38414r1_rule
Fix: F-32147r1_fix
Consult vendor documentation for the procedures for configuring LDAP for authentication and account information. Remove any passwords from unencrypted LDAP configuration files.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- GEN003850
- Vuln IDs
- V-24386
- Rule IDs
- SV-35134r1_rule
Fix: F-30286r1_fix
Consult vendor documentation to determine the procedure to disable the telnet daemon. If the system uses inetd, edit /etc/inetd.conf and comment out the telnetd line. Restart the inetd service via the following command: # inetd -c