Solaris 10 SPARC Security Technical Implementation Guide
Open a previous version of this SCAP benchmark.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- GEN000460
- Vuln IDs
- V-220021
- Rule IDs
- SV-220021r505925_rule
Fix: F-21729r482727_fix
Set RETRIES to 3 in the /etc/default/login file. #vi /etc/default/login Set LOCK_AFTER_RETRIES to YES in the /etc/security/policy.conf file. #vi /etc/security/policy.conf
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- GEN000480
- Vuln IDs
- V-220022
- Rule IDs
- SV-220022r505925_rule
Fix: F-21730r482730_fix
Edit the /etc/default/login file and set SLEEPTIME to 4.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000880
- Vuln IDs
- V-220025
- Rule IDs
- SV-220025r505925_rule
Fix: F-21733r482793_fix
Remove or change the UID of accounts other than root that have UID 0.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- GEN001300
- Vuln IDs
- V-220028
- Rule IDs
- SV-220028r505925_rule
Fix: F-21736r482877_fix
Change the mode of library files to 0755 or less permissive. Procedure (example): # chmod 0755 /path/to/library-file NOTE: Library files should have an extension of .a or .so, possibly followed by a version number.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN001780
- Vuln IDs
- V-220034
- Rule IDs
- SV-220034r505925_rule
Fix: F-21742r483042_fix
Edit /etc/profile or another global initialization script and add the mesg -n command.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003810
- Vuln IDs
- V-220038
- Rule IDs
- SV-220038r505925_rule
Fix: F-21746r485036_fix
Disable the portmap service. # svcadm disable network/rpc/bind
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- GEN003820
- Vuln IDs
- V-220039
- Rule IDs
- SV-220039r505925_rule
Fix: F-21747r485042_fix
Disable the remote shell service and restart inetd. Procedure: # svcadm disable network/shell # svcadm refresh inetd
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- GEN003830
- Vuln IDs
- V-220040
- Rule IDs
- SV-220040r505925_rule
Fix: F-21748r485048_fix
Disable the rlogind service. # svcadm disable rlogin # svcadm refresh inetd
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-001941
- Version
- GEN005500
- Vuln IDs
- V-220055
- Rule IDs
- SV-220055r505925_rule
Fix: F-21763r485289_fix
Edit the configuration file and modify the Protocol line to look like: Protocol 2 Reload sshd: kill -HUP <PID of sshd>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006620
- Vuln IDs
- V-220065
- Rule IDs
- SV-220065r505925_rule
Fix: F-21773r485514_fix
Edit the /etc/hosts.allow and /etc/hosts.deny files to configure access restrictions.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00020
- Vuln IDs
- V-226405
- Rule IDs
- SV-226405r505925_rule
Fix: F-28554r482571_fix
Edit /etc/rmmount.conf and add the nosuid mount option to the configuration.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00060
- Vuln IDs
- V-226407
- Rule IDs
- SV-226407r505925_rule
Fix: F-28556r482577_fix
Change the owner of the /etc/security/audit_user file to root. # chown root /etc/security/audit_user
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00080
- Vuln IDs
- V-226408
- Rule IDs
- SV-226408r505925_rule
Fix: F-28557r482580_fix
Change the group owner of the audit_user file to root, bin, or sys. Example: # chgrp root /etc/security/audit_user
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- GEN000000-SOL00100
- Vuln IDs
- V-226409
- Rule IDs
- SV-226409r505925_rule
Fix: F-28558r482583_fix
Change the mode of the audit_user file to 0640. # chmod 0640 /etc/security/audit_user
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000032
- Version
- GEN000000-SOL00220
- Vuln IDs
- V-226414
- Rule IDs
- SV-226414r505925_rule
Fix: F-28563r482604_fix
Create the /usr/aset/userlist file and populate it with a list of authorized users.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00240
- Vuln IDs
- V-226415
- Rule IDs
- SV-226415r505925_rule
Fix: F-28564r482607_fix
Use the chmod command to change the owner of the /usr/aset/userlist file. # chown root /usr/aset/userlist
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00250
- Vuln IDs
- V-226416
- Rule IDs
- SV-226416r505925_rule
Fix: F-28565r482610_fix
Change the group ownership of the file. # chgrp root /usr/aset/userlist
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00260
- Vuln IDs
- V-226417
- Rule IDs
- SV-226417r505925_rule
Fix: F-28566r482613_fix
Change the mode of the /usr/aset/userlist file to 0600. # chmod 0600 /usr/aset/userlist
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- GEN000000-SOL00400
- Vuln IDs
- V-226420
- Rule IDs
- SV-226420r505925_rule
Fix: F-28569r503799_fix
Edit /etc/dfs/dfstab and add the log option to all exported filesystems. Run the shareall command for the changes to take effect. NFS version 2 or 3 must be forced by updating the NFS_SERVER_VERSMAX variable appropriately in /etc/default/nfs and restarting the NFS daemon.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- GEN000000-SOL00440
- Vuln IDs
- V-226422
- Rule IDs
- SV-226422r505925_rule
Fix: F-28571r482628_fix
Change the default GID of non-root accounts to a valid GID other than 0.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00540
- Vuln IDs
- V-226423
- Rule IDs
- SV-226423r505925_rule
Fix: F-28572r482631_fix
Change the ownership of the files and directories. # chown -R root /etc/zones
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00560
- Vuln IDs
- V-226424
- Rule IDs
- SV-226424r505925_rule
Fix: F-28573r482634_fix
Change the group ownership of the files and directories. # chgrp -R sys /etc/zones # chgrp root /etc/zones/*.xml # chgrp bin /etc/zones/SUN*.xml
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00580
- Vuln IDs
- V-226425
- Rule IDs
- SV-226425r505925_rule
Fix: F-28574r482637_fix
Change the mode of the file or directory. # chmod 0644 <file> For directories: # chmod 0755 <directory>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000241
- Vuln IDs
- V-226435
- Rule IDs
- SV-226435r505925_rule
Fix: F-28584r482670_fix
Determine the type of zone that you are currently securing. # zonename If the command output is not "global", then NTP must be disabled. # svcadm disable ntp If the output from "zonename" is "global", then NTP must be enabled. # svcadm enable ntp
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000250
- Vuln IDs
- V-226438
- Rule IDs
- SV-226438r505925_rule
Fix: F-28587r482679_fix
Change the owner of the NTP configuration file to root. # chown root /etc/inet/ntp.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000251
- Vuln IDs
- V-226439
- Rule IDs
- SV-226439r505925_rule
Fix: F-28588r482682_fix
Change the group owner of the NTP configuration file. Procedure: # chgrp root /etc/inet/ntp.conf
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN000252
- Vuln IDs
- V-226440
- Rule IDs
- SV-226440r505925_rule
Fix: F-28589r482685_fix
Change the mode of the NTP configuration file to 0640 or less permissive. # chmod 0640 /etc/inet/ntp.conf
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN000380
- Vuln IDs
- V-226447
- Rule IDs
- SV-226447r505925_rule
Fix: F-28596r482709_fix
Add a group to the system for each GID referenced that does not have a corresponding group. #/usr/sbin/groupadd < group >
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- GEN000560
- Vuln IDs
- V-226456
- Rule IDs
- SV-226456r505925_rule
Fix: F-28605r482745_fix
Remove, lock, or configure a password for any account with a blank password.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- GEN000580
- Vuln IDs
- V-226457
- Rule IDs
- SV-226457r505925_rule
Fix: F-28606r482748_fix
Edit /etc/default/passwd and set the PASSLENGTH variable to 15 or greater.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- GEN000595
- Vuln IDs
- V-226460
- Rule IDs
- SV-226460r505925_rule
Fix: F-28609r503826_fix
If the /etc/security/crypt.conf file does not support FIPS 140-2 approved cryptographic hashing algorithms, upgrade to at least the Solaris 10 8/07 release. Edit the /etc/security/policy.conf file. # vi /etc/security/policy.conf Uncomment or add the CRYPT_ALGORITHMS_ALLOW line and set it to "5,6". Update the CRYPT_DEFAULT default line to be equal to 5 or 6. The following lines are acceptable. CRYPT_ALGORITHMS_ALLOW=5,6 CRYPT_DEFAULT=6 Update passwords for all accounts with non-compliant password hashes.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- GEN000750
- Vuln IDs
- V-226467
- Rule IDs
- SV-226467r505925_rule
Fix: F-28616r482778_fix
Edit /etc/default/passwd and set or add a MINDIFF setting equal to or greater than 8.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- GEN000800
- Vuln IDs
- V-226469
- Rule IDs
- SV-226469r505925_rule
Fix: F-28618r482787_fix
Edit /etc/default/passwd and set HISTORY to 5.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN000900
- Vuln IDs
- V-226471
- Rule IDs
- SV-226471r505925_rule
Fix: F-28620r503829_fix
The root home directory should be something other than / (such as /rootdir). Procedure: # mkdir /rootdir # chown root /rootdir # chgrp root /rootdir # chmod 700 /rootdir # cp -r /.??* /rootdir Edit the passwd file and change the root home directory to /rootdir. The cp -r /.??* command copies all files and subdirectories of file names beginning with "." into the new root directory, which preserves the previous root environment. The cp command must be executed from the / directory.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- GEN000920
- Vuln IDs
- V-226472
- Rule IDs
- SV-226472r505925_rule
Fix: F-28621r482799_fix
The root home directory will have permissions of 0700. Do not change the protections of the / directory. Use the following command to change protections for the root home directory. # chmod 0700 /rootdir.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000940
- Vuln IDs
- V-226474
- Rule IDs
- SV-226474r505925_rule
Fix: F-28623r503832_fix
Edit the root user's local initialization files. Remove any empty path entries. Remove any relative path entries that have not been documented with the ISSO. Edit the root user's local initialization files and remove any empty entry that is defined.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000945
- Vuln IDs
- V-226475
- Rule IDs
- SV-226475r505925_rule
Fix: F-28624r482808_fix
Edit the root user initialization files and remove any definition of LD_LIBRARY_PATH.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000950
- Vuln IDs
- V-226476
- Rule IDs
- SV-226476r505925_rule
Fix: F-28625r482811_fix
Edit the root user initialization files and remove any definition of LD_PRELOAD.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- GEN000980
- Vuln IDs
- V-226477
- Rule IDs
- SV-226477r505925_rule
Fix: F-28626r482817_fix
Edit the /etc/default/login file and uncomment the line containing /dev/console if it is commented out.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- GEN001120
- Vuln IDs
- V-226483
- Rule IDs
- SV-226483r505925_rule
Fix: F-28632r482835_fix
Edit the configuration file and set the PermitRootLogin option to no.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- GEN001240
- Vuln IDs
- V-226492
- Rule IDs
- SV-226492r505925_rule
Fix: F-28641r482862_fix
Change the group owner of system files to a system group. Procedure: # chgrp root /path/to/system/file (System groups other than root may be used.)
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- GEN001260
- Vuln IDs
- V-226493
- Rule IDs
- SV-226493r505925_rule
Fix: F-28642r482865_fix
Change the mode of the system log file(s) to 0640 or less permissive. Procedure: # chmod "0640" /path/to/system-log-file NOTE: Do not confuse system log files with audit logs. Any subsystems that require less stringent permissions must be documented.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN001320
- Vuln IDs
- V-226498
- Rule IDs
- SV-226498r505925_rule
Fix: F-28647r482883_fix
Change the ownership of NIS/NIS+/yp files to root, bin, or sys. Procedure: # chown -R root /usr/lib/netsvc/yp /var/yp
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN001340
- Vuln IDs
- V-226499
- Rule IDs
- SV-226499r505925_rule
Fix: F-28648r482886_fix
Change the group owner of the NIS files to root, bin, or sys. Procedure: # chgrp -R root /usr/lib/netsvc/yp /var/yp
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN001360
- Vuln IDs
- V-226500
- Rule IDs
- SV-226500r505925_rule
Fix: F-28649r482889_fix
Change the mode of NIS/NIS+/yp command files to 0755 or less permissive. Procedure: # chmod -R 0755 /usr/lib/netsvc/yp /var/yp
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001362
- Vuln IDs
- V-226502
- Rule IDs
- SV-226502r505925_rule
Fix: F-28651r482895_fix
Change the owner of the /etc/resolv.conf file to root. # chown root /etc/resolv.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001363
- Vuln IDs
- V-226503
- Rule IDs
- SV-226503r505925_rule
Fix: F-28652r482898_fix
Change the group owner of the /etc/resolv.conf file to root, bin, or sys. Procedure: # chgrp root /etc/resolv.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001364
- Vuln IDs
- V-226504
- Rule IDs
- SV-226504r505925_rule
Fix: F-28653r482901_fix
Change the mode of the /etc/resolv.conf file to 0644 or less permissive. # chmod 0644 /etc/resolv.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001366
- Vuln IDs
- V-226506
- Rule IDs
- SV-226506r505925_rule
Fix: F-28655r482907_fix
Change the owner of the /etc/hosts file to root. # chown root /etc/hosts
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001367
- Vuln IDs
- V-226507
- Rule IDs
- SV-226507r505925_rule
Fix: F-28656r482910_fix
Change the group owner of the /etc/hosts file to root, sys, or bin. Procedure: # chgrp root /etc/hosts
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001368
- Vuln IDs
- V-226508
- Rule IDs
- SV-226508r505925_rule
Fix: F-28657r482913_fix
Change the mode of the /etc/hosts file to 0644 or less permissive. # chmod 0644 /etc/hosts
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001371
- Vuln IDs
- V-226510
- Rule IDs
- SV-226510r505925_rule
Fix: F-28659r482919_fix
Change the owner of the /etc/nsswitch.conf file to root. # chown root /etc/nsswitch.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001372
- Vuln IDs
- V-226511
- Rule IDs
- SV-226511r505925_rule
Fix: F-28660r482922_fix
Change the group owner of the /etc/nsswitch.conf file to root, bin, or sys. Procedure: # chgrp root /etc/nsswitch.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001373
- Vuln IDs
- V-226512
- Rule IDs
- SV-226512r505925_rule
Fix: F-28661r482925_fix
Change the mode of the /etc/nsswitch.conf file to 0644 or less permissive. Procedure: # chmod 0644 /etc/nsswitch.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001378
- Vuln IDs
- V-226514
- Rule IDs
- SV-226514r505925_rule
Fix: F-28663r482931_fix
Change the owner of the /etc/passwd file to root. # chown root /etc/passwd
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001379
- Vuln IDs
- V-226515
- Rule IDs
- SV-226515r505925_rule
Fix: F-28664r482934_fix
Change the group owner of the /etc/passwd file to root, bin, or sys. Procedure: # chgrp root /etc/passwd
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN001380
- Vuln IDs
- V-226516
- Rule IDs
- SV-226516r505925_rule
Fix: F-28665r482937_fix
Change the mode of the passwd file to 0644. Procedure: # chmod 0644 /etc/passwd Document all changes.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001391
- Vuln IDs
- V-226518
- Rule IDs
- SV-226518r505925_rule
Fix: F-28667r482943_fix
Change the owner of the /etc/group file to root. # chown root /etc/group
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001392
- Vuln IDs
- V-226519
- Rule IDs
- SV-226519r505925_rule
Fix: F-28668r482946_fix
Change the group owner of the /etc/group file. Procedure: # chgrp root /etc/group
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001393
- Vuln IDs
- V-226520
- Rule IDs
- SV-226520r505925_rule
Fix: F-28669r482949_fix
Change the mode of the /etc/group file to 0644 or less permissive. # chmod 0644 /etc/group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN001400
- Vuln IDs
- V-226522
- Rule IDs
- SV-226522r505925_rule
Fix: F-28671r482955_fix
Change the ownership of the /etc/shadow file. # chown root /etc/shadow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001410
- Vuln IDs
- V-226523
- Rule IDs
- SV-226523r505925_rule
Fix: F-28672r482958_fix
Change the group owner of the /etc/shadow file. Procedure: # chgrp root /etc/shadow
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN001420
- Vuln IDs
- V-226524
- Rule IDs
- SV-226524r505925_rule
Fix: F-28673r482961_fix
Change the mode of the /etc/shadow (or equivalent) file. # chmod <mode> <file>
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN001440
- Vuln IDs
- V-226526
- Rule IDs
- SV-226526r505925_rule
Fix: F-28675r482967_fix
Assign a home directory to any user without one.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- GEN001470
- Vuln IDs
- V-226528
- Rule IDs
- SV-226528r505925_rule
Fix: F-28677r482973_fix
Migrate /etc/passwd password hashes to /etc/shadow. # pwconv
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001475
- Vuln IDs
- V-226529
- Rule IDs
- SV-226529r505925_rule
Fix: F-28678r482976_fix
Edit /etc/group and change the password field to an exclamation point (!) to lock the group password.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001600
- Vuln IDs
- V-226538
- Rule IDs
- SV-226538r505925_rule
Fix: F-28687r483009_fix
Edit the run control script and remove the relative path entries from the executable search path variable that are not documented with the ISSO. Edit the run control script and remove any empty entry that is defined.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001660
- Vuln IDs
- V-226542
- Rule IDs
- SV-226542r505925_rule
Fix: F-28691r483021_fix
Change the ownership of the run control script(s) with incorrect ownership. # chown root <run control script>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001680
- Vuln IDs
- V-226543
- Rule IDs
- SV-226543r505925_rule
Fix: F-28692r483024_fix
Change the group ownership of the run control script(s) with incorrect group ownership. Procedure: # chgrp root <run control script>
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN001800
- Vuln IDs
- V-226546
- Rule IDs
- SV-226546r505925_rule
Fix: F-28695r483045_fix
Change the mode of skeleton files with incorrect mode. # chmod 0644 <skeleton file>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001820
- Vuln IDs
- V-226548
- Rule IDs
- SV-226548r505925_rule
Fix: F-28697r483051_fix
Change the ownership of skeleton files with incorrect mode. # chown root <skeleton file>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001830
- Vuln IDs
- V-226549
- Rule IDs
- SV-226549r505925_rule
Fix: F-28698r483054_fix
Change the group owner of the skeleton file to root. Procedure: # chgrp <group> /etc/skel/[skeleton file]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001840
- Vuln IDs
- V-226550
- Rule IDs
- SV-226550r505925_rule
Fix: F-28699r503847_fix
Edit the global initialization file(s) with PATH variables containing relative paths and remove any relative path form the PATH variables that have not been documented with the ISSO. Edit the global initialization file(s) and remove any empty entry that is defined.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- GEN002040
- Vuln IDs
- V-226563
- Rule IDs
- SV-226563r505925_rule
Fix: F-28712r483099_fix
Remove the .rhosts, .shosts, hosts.equiv, and/or shosts.equiv files.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN002100
- Vuln IDs
- V-226565
- Rule IDs
- SV-226565r505925_rule
Fix: F-28714r483105_fix
Edit /etc/pam.conf and remove the reference(s) to the rhosts_auth module.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN002120
- Vuln IDs
- V-226566
- Rule IDs
- SV-226566r505925_rule
Fix: F-28715r503859_fix
Create a /etc/shells file containing a list of valid system shells. The list below contains the default shells from the shells(4) man page. Procedure (the command is 24 lines long): cat >/etc/shells <<EOF /bin/bash /bin/csh /bin/jsh /bin/ksh /bin/pfcsh /bin/pfksh /bin/pfsh /bin/sh /bin/tcsh /bin/zsh /sbin/jsh /sbin/sh /usr/bin/bash /usr/bin/csh /usr/bin/jsh /usr/bin/ksh /usr/bin/pfcsh /usr/bin/pfksh /usr/bin/pfsh /usr/bin/sh /usr/bin/tcsh /usr/bin/zsh EOF
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN002340
- Vuln IDs
- V-226577
- Rule IDs
- SV-226577r505925_rule
Fix: F-28726r483141_fix
Change the owner of the audio device. # chown root <audio device>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN002360
- Vuln IDs
- V-226578
- Rule IDs
- SV-226578r505925_rule
Fix: F-28727r483144_fix
Change the group owner of the audio device. Procedure: # chgrp system <audio device>
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- GEN002680
- Vuln IDs
- V-226590
- Rule IDs
- SV-226590r505925_rule
Fix: F-28739r483183_fix
Change the ownership of the audit log file(s). Procedure: # chown root <audit log file>
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- GEN002690
- Vuln IDs
- V-226591
- Rule IDs
- SV-226591r505925_rule
Fix: F-28740r483186_fix
Change the group ownership of the audit log file(s). Procedure: # chgrp root <audit log file>
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- GEN002700
- Vuln IDs
- V-226592
- Rule IDs
- SV-226592r505925_rule
Fix: F-28741r483189_fix
Change the mode of the audit log directories/files. # chmod 0750 <audit directory> # chmod 0640 <audit file>
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001493
- Version
- GEN002715
- Vuln IDs
- V-226594
- Rule IDs
- SV-226594r505925_rule
Fix: F-28743r483195_fix
Change the owner of the audit tool executable to root. # chown root [audit tool executable]
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001493
- Version
- GEN002716
- Vuln IDs
- V-226595
- Rule IDs
- SV-226595r505925_rule
Fix: F-28744r483198_fix
Change the group-owner of the audit tool executable to root, bin, or sys. Procedure: # chgrp root <audit tool executable>
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001493
- Version
- GEN002717
- Vuln IDs
- V-226596
- Rule IDs
- SV-226596r505925_rule
Fix: F-28745r483201_fix
Change the mode of the audit tool executable to 0750, or less permissive. # chmod 0750 [audit tool executable]
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- GEN002720
- Vuln IDs
- V-226599
- Rule IDs
- SV-226599r505925_rule
Fix: F-28748r483210_fix
Edit /etc/security/audit_control and add the fr or -fr flags to the flags list. Load the new audit configuration. # auditconfig -conf
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- GEN002740
- Vuln IDs
- V-226601
- Rule IDs
- SV-226601r505925_rule
Fix: F-28750r483216_fix
Edit /etc/security/audit_control and add the fd to the flags list. Load the new audit configuration. # auditconfig -conf
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- GEN002760
- Vuln IDs
- V-226606
- Rule IDs
- SV-226606r505925_rule
Fix: F-28755r483231_fix
Edit /etc/security/audit_control and add am to the flags list. Load the new audit configuration. # auditconfig -conf
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- GEN002800
- Vuln IDs
- V-226607
- Rule IDs
- SV-226607r505925_rule
Fix: F-28756r483234_fix
Edit /etc/security/audit_control and add lo to the flags list and naflags list. Load the new audit configuration. # auditconfig -conf
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- GEN002820
- Vuln IDs
- V-226608
- Rule IDs
- SV-226608r505925_rule
Fix: F-28757r483237_fix
Edit /etc/security/audit_control and add fm to the flags list. Load the new audit configuration. # auditconfig -conf
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- GEN002825
- Vuln IDs
- V-226609
- Rule IDs
- SV-226609r505925_rule
Fix: F-28758r483240_fix
Edit /etc/security/audit_control and add the as flag to the flag parameter.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN002960
- Vuln IDs
- V-226612
- Rule IDs
- SV-226612r505925_rule
Fix: F-28761r483249_fix
Create /etc/cron.d/cron.allow and/or /etc/cron.d/cron.deny with appropriate content.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN002980
- Vuln IDs
- V-226613
- Rule IDs
- SV-226613r505925_rule
Fix: F-28762r483252_fix
Change the mode of the cron.allow file to 0600. Procedure: # chmod 0600 /etc/cron.d/cron.allow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003080
- Vuln IDs
- V-226620
- Rule IDs
- SV-226620r505925_rule
Fix: F-28769r483273_fix
Change the mode of the crontab files. # chmod 0600 /var/spool/cron/crontabs/*
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003100
- Vuln IDs
- V-226622
- Rule IDs
- SV-226622r505925_rule
Fix: F-28771r483279_fix
Change the mode of the crontab directory. # chmod 0755 /var/spool/cron/crontabs
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003120
- Vuln IDs
- V-226624
- Rule IDs
- SV-226624r505925_rule
Fix: F-28773r483285_fix
Change the owner of the crontab directory. # chown root /var/spool/cron/crontabs
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003140
- Vuln IDs
- V-226625
- Rule IDs
- SV-226625r505925_rule
Fix: F-28774r483288_fix
Change the group owner of the crontab directories to root, sys, or bin. Procedure: # chgrp root /var/spool/cron/crontabs
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- GEN003180
- Vuln IDs
- V-226627
- Rule IDs
- SV-226627r505925_rule
Fix: F-28776r483294_fix
Change the mode of the cron log file. # chmod 0600 /var/cron/log
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN003200
- Vuln IDs
- V-226629
- Rule IDs
- SV-226629r505925_rule
Fix: F-28778r483300_fix
Change the mode of the cron.deny file. # chmod 0600 /etc/cron.d/cron.deny
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003240
- Vuln IDs
- V-226632
- Rule IDs
- SV-226632r505925_rule
Fix: F-28781r483309_fix
# chown root /etc/cron.d/cron.allow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003250
- Vuln IDs
- V-226634
- Rule IDs
- SV-226634r505925_rule
Fix: F-28783r483315_fix
Change the group ownership of the file. Procedure: # chgrp root /etc/cron.d/cron.allow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003252
- Vuln IDs
- V-226635
- Rule IDs
- SV-226635r505925_rule
Fix: F-28784r483318_fix
Change the mode of the file. # chmod 0600 /etc/cron.d/at.deny
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003260
- Vuln IDs
- V-226858
- Rule IDs
- SV-226858r505925_rule
Fix: F-29008r484859_fix
Change the ownership of the cron.deny file to root, sys, or bin. # chown root /etc/cron.d/cron.deny
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003270
- Vuln IDs
- V-226859
- Rule IDs
- SV-226859r505925_rule
Fix: F-29009r484862_fix
Change the group ownership of the file to root, sys, or bin. Procedure: # chgrp root /etc/cron.d/cron.deny
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN003280
- Vuln IDs
- V-226860
- Rule IDs
- SV-226860r505925_rule
Fix: F-29010r484865_fix
Create at.allow and/or at.deny files containing appropriate lists of users to be allowed or denied access to the "at" daemon.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003300
- Vuln IDs
- V-226861
- Rule IDs
- SV-226861r505925_rule
Fix: F-29011r484868_fix
Add appropriate users to the at.deny file, or remove the empty at.deny file if an at.allow file exists.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN003340
- Vuln IDs
- V-226863
- Rule IDs
- SV-226863r505925_rule
Fix: F-29013r484874_fix
Change the mode of the at.allow file. # chmod 0600 /etc/cron.d/at.allow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003460
- Vuln IDs
- V-226871
- Rule IDs
- SV-226871r505925_rule
Fix: F-29021r484898_fix
Change the owner of the at.allow file. # chown root /etc/cron.d/at.allow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003470
- Vuln IDs
- V-226872
- Rule IDs
- SV-226872r505925_rule
Fix: F-29022r484901_fix
Change the group ownership of the file. Procedure: # chgrp root /etc/cron.d/at.allow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003480
- Vuln IDs
- V-226873
- Rule IDs
- SV-226873r505925_rule
Fix: F-29023r484904_fix
Change the owner of the at.deny file. # chown root /etc/cron.d/at.deny
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003490
- Vuln IDs
- V-226874
- Rule IDs
- SV-226874r505925_rule
Fix: F-29024r484907_fix
Change the group ownership of the at.deny file to root, bin, or sys. Procedure: # chgrp root /etc/cron.d/at.deny
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN003520
- Vuln IDs
- V-226882
- Rule IDs
- SV-226882r505925_rule
Fix: F-29032r484931_fix
Change the owner of the kernel core dump data directory to root. # chown root /var/crash
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003540
- Vuln IDs
- V-226886
- Rule IDs
- SV-226886r505925_rule
Fix: F-29036r503877_fix
This action applies to the global zone only. Determine the type of zone that you are currently securing. # zonename If the command output is "global", this action applies. Edit /etc/system and set the noexec_user_stack parameter to 1. Restart the system for the setting to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003580
- Vuln IDs
- V-226887
- Rule IDs
- SV-226887r505925_rule
Fix: F-29037r484946_fix
Edit /etc/default/inetinit and set the TCP_STRONG_ISS parameter to 2.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003606
- Vuln IDs
- V-226894
- Rule IDs
- SV-226894r505925_rule
Fix: F-29044r484967_fix
Edit /etc/ipf/ipf.conf and add rules to block outgoing source-routed packets, such as: block out log quick all with opt lsrr block out log quick all with opt ssrr Reload the IPF rules. Procedure: # ipf -Fa -A -f /etc/ipf/ipf.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003607
- Vuln IDs
- V-226895
- Rule IDs
- SV-226895r505925_rule
Fix: F-29045r484970_fix
Edit /etc/ipf/ipf.conf and add rules to block incoming source-routed packets, such as: block in log quick all with opt lsrr block in log quick all with opt ssrr Reload the IPF rules. Procedure: # ipf -Fa -A -f /etc/ipf/ipf.conf
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN003624
- Vuln IDs
- V-226902
- Rule IDs
- SV-226902r505925_rule
Fix: F-29052r484994_fix
Migrate the /tmp path onto a separate file system.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003640
- Vuln IDs
- V-226903
- Rule IDs
- SV-226903r505925_rule
Fix: F-29053r503883_fix
Implement file system journaling for the root file system, or use a file system using other mechanisms to ensure consistency. If the root file system supports journaling, enable it. If the file system does not support journaling or another mechanism to ensure consistency, a migration to a different file system will be necessary.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN003740
- Vuln IDs
- V-226909
- Rule IDs
- SV-226909r505925_rule
Fix: F-29059r485015_fix
Change the mode of the inetd.conf file. # chmod 0440 /etc/inet/inetd.conf
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN003760
- Vuln IDs
- V-226911
- Rule IDs
- SV-226911r505925_rule
Fix: F-29061r485021_fix
Change the ownership of the services file to root or bin. Procedure: # chown root /etc/services
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003770
- Vuln IDs
- V-226912
- Rule IDs
- SV-226912r505925_rule
Fix: F-29062r485024_fix
Change the group-owner of the services file. Procedure: # chgrp root /etc/services
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN003780
- Vuln IDs
- V-226913
- Rule IDs
- SV-226913r505925_rule
Fix: F-29063r485027_fix
Change the mode of the services file to 0444 or less permissive. Procedure: # chmod 0444 /etc/services
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- GEN003825
- Vuln IDs
- V-226917
- Rule IDs
- SV-226917r505925_rule
Fix: F-29067r485045_fix
Remove the SUNWrcmdr package. Procedure: # pkgrm SUNWrcmdr
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- GEN003835
- Vuln IDs
- V-226918
- Rule IDs
- SV-226918r505925_rule
Fix: F-29068r485051_fix
Remove the SUNWrcmdr package. Procedure: # pkgrm SUNWrcmdr
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- GEN003840
- Vuln IDs
- V-226919
- Rule IDs
- SV-226919r505925_rule
Fix: F-29069r485054_fix
# svcadm disable rexec # svcadm refresh inetd
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- GEN003845
- Vuln IDs
- V-226920
- Rule IDs
- SV-226920r505925_rule
Fix: F-29070r485057_fix
Remove the SUNWrcmdr package. Procedure: # pkgrm SUNWrcmdr
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- GEN003850
- Vuln IDs
- V-226921
- Rule IDs
- SV-226921r505925_rule
Fix: F-29071r485060_fix
Disable the telnet daemon. # svcadm disable telnet # svcadm refresh inetd
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN003860
- Vuln IDs
- V-226922
- Rule IDs
- SV-226922r505925_rule
Fix: F-29072r485063_fix
Disable the finger service and restart inetd. Procedure: # svcadm disable finger # svcadm refresh inetd
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003960
- Vuln IDs
- V-226925
- Rule IDs
- SV-226925r505925_rule
Fix: F-29075r485082_fix
Change the owner of the traceroute command to root. Example procedure: # chown root /usr/sbin/traceroute
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003980
- Vuln IDs
- V-226926
- Rule IDs
- SV-226926r505925_rule
Fix: F-29076r485085_fix
Change the group-owner of the traceroute command to root. Procedure: # chgrp root /usr/sbin/traceroute
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN004360
- Vuln IDs
- V-226930
- Rule IDs
- SV-226930r505925_rule
Fix: F-29080r485097_fix
Change the owner of the /etc/mail/aliases file (or equivalent, such as /usr/lib/aliases) to root. Procedure: # chown root /etc/mail/aliases
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN004440
- Vuln IDs
- V-226936
- Rule IDs
- SV-226936r505925_rule
Fix: F-29086r485118_fix
Edit the sendmail.conf file, locate the "O L" or LogLevel entry and change it to 9.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- GEN004460
- Vuln IDs
- V-226937
- Rule IDs
- SV-226937r505925_rule
Fix: F-29087r485121_fix
Edit the syslog.conf file and add a configuration line specifying an appropriate destination for mail.crit syslogs.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN004880
- Vuln IDs
- V-226948
- Rule IDs
- SV-226948r505925_rule
Fix: F-29098r485172_fix
Create a /etc/ftpd/ftpusers file containing a list of accounts not authorized for FTP.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN004920
- Vuln IDs
- V-226950
- Rule IDs
- SV-226950r505925_rule
Fix: F-29100r485178_fix
Change the owner of the ftpusers file to root. # chown root /etc/ftpd/ftpusers
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN004930
- Vuln IDs
- V-226951
- Rule IDs
- SV-226951r505925_rule
Fix: F-29101r485181_fix
Change the group owner of the ftpusers file. Procedure: # chgrp root /etc/ftpusers
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN004940
- Vuln IDs
- V-226952
- Rule IDs
- SV-226952r505925_rule
Fix: F-29102r485184_fix
Change the mode of the ftpusers file to 0640. # chmod 0640 /etc/ftpd/ftpusers
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- GEN005000
- Vuln IDs
- V-226955
- Rule IDs
- SV-226955r505925_rule
Fix: F-29105r485193_fix
Configure anonymous FTP accounts to use a non-functional shell. If necessary, edit the /etc/passwd file to remove any functioning shells associated with the FTP account and replace them with non-functioning shells, such as, /dev/null.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- GEN005080
- Vuln IDs
- V-226958
- Rule IDs
- SV-226958r505925_rule
Fix: F-29108r485202_fix
Edit /etc/inet/inetd.conf and add the -s parameter to TFTPD. # inetconv OR Update the SMF entry for the TFTP daemon. # svccfg -s tftp/udp6 setprop inetd_start/exec = "astring:\"/usr/sbin/in.tftpd -s <other TFTPD options>\""
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-002165
- Version
- GEN005100
- Vuln IDs
- V-226959
- Rule IDs
- SV-226959r505925_rule
Fix: F-29109r485205_fix
Change the mode of the TFTP daemon. Procedure: # chmod 0755 /usr/sbin/in.tftpd
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005180
- Vuln IDs
- V-226962
- Rule IDs
- SV-226962r505925_rule
Fix: F-29112r485217_fix
Change the mode of the .Xauthority files. Procedure: # chmod 0600 .Xauthority
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005390
- Vuln IDs
- V-226978
- Rule IDs
- SV-226978r505925_rule
Fix: F-29128r485265_fix
Change the permissions of the syslog configuration file. # chmod 0640 /etc/syslog.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005400
- Vuln IDs
- V-226980
- Rule IDs
- SV-226980r505925_rule
Fix: F-29130r485271_fix
Use the chown command to set the owner to root. # chown root /etc/syslog.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005420
- Vuln IDs
- V-226981
- Rule IDs
- SV-226981r505925_rule
Fix: F-29131r485274_fix
Change the group owner of the /etc/syslog.conf file to root, bin, or sys. Procedure: # chgrp root /etc/syslog.conf
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- GEN005501
- Vuln IDs
- V-226984
- Rule IDs
- SV-226984r505925_rule
Fix: F-29134r485292_fix
Edit the /etc/ssh/ssh_config file and add or edit a Protocol configuration line that does not allow versions less than 2.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005506
- Vuln IDs
- V-226987
- Rule IDs
- SV-226987r505925_rule
Fix: F-29137r503910_fix
Edit /etc/ssh/sshd_config and add or edit the "Ciphers" line. Only include ciphers that start with "3des" or "aes" and do not contain "cbc". For the list of available ciphers for the particular version of your software, consult the sshd_config manpage. Restart the SSH daemon.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005511
- Vuln IDs
- V-226990
- Rule IDs
- SV-226990r505925_rule
Fix: F-29140r485310_fix
Edit /etc/ssh/ssh_config and add or edit the "Ciphers" line. Only include ciphers that start with "3des" or "aes" and do not contain "cbc". For the list of available ciphers for the particular version of your software, consult the ssh_config manpage.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005522
- Vuln IDs
- V-226993
- Rule IDs
- SV-226993r505925_rule
Fix: F-29143r485319_fix
Change the permissions for the SSH public host key files. # chmod 0644 /etc/ssh/*key.pub
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005523
- Vuln IDs
- V-226994
- Rule IDs
- SV-226994r505925_rule
Fix: F-29144r485322_fix
Change the permissions for the SSH private host key files. # chmod 0600 /etc/ssh/*key
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN005524
- Vuln IDs
- V-226995
- Rule IDs
- SV-226995r505925_rule
Fix: F-29145r503913_fix
Edit the SSH daemon configuration and set (add if necessary) a GSSAPIAuthentication directive set to no.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN005525
- Vuln IDs
- V-226996
- Rule IDs
- SV-226996r505925_rule
Fix: F-29146r503916_fix
Edit the SSH client configuration and set (add if necessary) a GSSAPIAuthentication directive set to no.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005539
- Vuln IDs
- V-226999
- Rule IDs
- SV-226999r505925_rule
Fix: F-29149r485337_fix
Edit the SSH daemon configuration and add or edit the Compression setting value to no or delayed.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005540
- Vuln IDs
- V-227000
- Rule IDs
- SV-227000r505925_rule
Fix: F-29150r485340_fix
Add appropriate IP restrictions for SSH to the /etc/hosts.deny and/or /etc/hosts.allow files.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005740
- Vuln IDs
- V-227006
- Rule IDs
- SV-227006r505925_rule
Fix: F-29156r485364_fix
Change the owner of the dfstab file to root. Example: # chown root /etc/dfs/dfstab
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005750
- Vuln IDs
- V-227007
- Rule IDs
- SV-227007r505925_rule
Fix: F-29157r485367_fix
Change the group ownership of the NFS export configuration file. Procedure: # chgrp root /etc/dfs/dfstab
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN005760
- Vuln IDs
- V-227008
- Rule IDs
- SV-227008r505925_rule
Fix: F-29158r485370_fix
Change the permissions of the dfstab file to 664 or less permissive. # chmod 0644 /etc/dfs/dfstab
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- GEN006060
- Vuln IDs
- V-227017
- Rule IDs
- SV-227017r505925_rule
Fix: F-29167r485403_fix
If there is no functional need for Samba and the daemon is running, disable the daemon by killing the process ID as noted from the output of ps -ef |grep smbd. The utility should also be removed or not installed if there is no functional requirement.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006100
- Vuln IDs
- V-227018
- Rule IDs
- SV-227018r505925_rule
Fix: F-29168r485409_fix
Change the ownership of the smb.conf file. Procedure: # chown root /etc/smb.conf /etc/sfw/smb.conf /etc/samba/smb.conf /etc/sfw/samba/smb.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006120
- Vuln IDs
- V-227019
- Rule IDs
- SV-227019r505925_rule
Fix: F-29169r485412_fix
Change the group owner of the smb.conf file. Procedure: # chgrp root /etc/smb.conf /etc/sfw/smb.conf /etc/samba/smb.conf /etc/sfw/samba/smb.conf
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN006140
- Vuln IDs
- V-227020
- Rule IDs
- SV-227020r505925_rule
Fix: F-29170r485415_fix
Change the mode of the smb.conf file to 0644 or less permissive. Procedure: # chmod 0644 /etc/smb.conf /etc/sfw/smb.conf /etc/samba/smb.conf /etc/sfw/samba/smb.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006160
- Vuln IDs
- V-227022
- Rule IDs
- SV-227022r505925_rule
Fix: F-29172r485421_fix
Use the chown command to configure the smb passwd file. # chown root /etc/sfw/private/smbpasswd
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006180
- Vuln IDs
- V-227023
- Rule IDs
- SV-227023r505925_rule
Fix: F-29173r485424_fix
Use the chgrp command to ensure the group owner of the smbpasswd file is root. # chgrp root /etc/sfw/private/smbpasswd
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN006200
- Vuln IDs
- V-227024
- Rule IDs
- SV-227024r505925_rule
Fix: F-29174r485427_fix
Change the mode of the smbpasswd file to 0600. Procedure: # chmod 0600 /etc/sfw/private/smbpasswd
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006225
- Vuln IDs
- V-227027
- Rule IDs
- SV-227027r505925_rule
Fix: F-29177r485436_fix
Edit the smb.conf file and change the security setting to user or another valid setting other than share.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006235
- Vuln IDs
- V-227029
- Rule IDs
- SV-227029r505925_rule
Fix: F-29179r485442_fix
Edit the smb.conf file and change the guest ok setting to no.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- GEN006240
- Vuln IDs
- V-227030
- Rule IDs
- SV-227030r505925_rule
Fix: F-29180r485445_fix
Disable the INN server.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN006260
- Vuln IDs
- V-227031
- Rule IDs
- SV-227031r505925_rule
Fix: F-29181r485448_fix
Change the mode of the /etc/news/hosts.nntp file to 0600. # chmod 0600 /etc/news/hosts.nntp
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN006280
- Vuln IDs
- V-227033
- Rule IDs
- SV-227033r505925_rule
Fix: F-29183r485454_fix
Change the mode of /etc/news/hosts.nntp.nolimit to 0600. # chmod 0600 /etc/news/hosts.nntp.nolimit
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN006300
- Vuln IDs
- V-227035
- Rule IDs
- SV-227035r505925_rule
Fix: F-29185r485460_fix
Change the mode of the /etc/news/nnrp.access file to 0600. # chmod 0600 /etc/news/nnrp.access
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN006320
- Vuln IDs
- V-227037
- Rule IDs
- SV-227037r505925_rule
Fix: F-29187r485466_fix
Change the mode of the /etc/news/passwd.nntp file. # chmod 0600 /etc/news/passwd.nntp
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006340
- Vuln IDs
- V-227039
- Rule IDs
- SV-227039r505925_rule
Fix: F-29189r485472_fix
Change the ownership of the /etc/news directory and the files in it to root. Procedure: # chown -R root /etc/news
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006360
- Vuln IDs
- V-227040
- Rule IDs
- SV-227040r505925_rule
Fix: F-29190r485475_fix
Change the group owner of the /etc/news directory and the files in it to root. Procedure: # chgrp -R root /etc/news
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- GEN006400
- Vuln IDs
- V-227042
- Rule IDs
- SV-227042r505925_rule
Fix: F-29192r485481_fix
Disable the use of NIS. Possible replacements are NIS+ and LDAP.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN007840
- Vuln IDs
- V-227054
- Rule IDs
- SV-227054r505925_rule
Fix: F-29204r485532_fix
Delete the DHCP client configuration. # rm /etc/dhcp.*
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN008060
- Vuln IDs
- V-227060
- Rule IDs
- SV-227060r505925_rule
Fix: F-29210r485556_fix
Change the permissions of the files. # chmod 0600 /var/ldap/ldap_client_file /var/ldap/ldap_client_cred
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN008080
- Vuln IDs
- V-227061
- Rule IDs
- SV-227061r505925_rule
Fix: F-29211r485559_fix
Change the owner of the files. # chown root /var/ldap/ldap_client_file /var/ldap/ldap_client_cred
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN008100
- Vuln IDs
- V-227062
- Rule IDs
- SV-227062r505925_rule
Fix: F-29212r485562_fix
Change the group-owner of the files to root, bin, or sys. Procedure: # chgrp root /var/ldap/ldap_client_file /var/ldap/ldap_client_cred
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN008440
- Vuln IDs
- V-227067
- Rule IDs
- SV-227067r505925_rule
Fix: F-29217r503931_fix
Stop and disable the autofs service. # svcadm disable autofs
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN008460
- Vuln IDs
- V-227068
- Rule IDs
- SV-227068r505925_rule
Fix: F-29218r485583_fix
Remove the SUNWusb package. # pkgrm SUNWusb
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN008520
- Vuln IDs
- V-227071
- Rule IDs
- SV-227071r505925_rule
Fix: F-29221r485592_fix
Enable the system's local firewall. # svcadm enable network/ipfilter
- RMF Control
- CM-5
- Severity
- L
- CCI
- CCI-001749
- Version
- GEN008800
- Vuln IDs
- V-227076
- Rule IDs
- SV-227076r505925_rule
Fix: F-29226r485610_fix
Edit /var/sadm/install/admin/default and set the authentication setting to quit.