Sun Ray 4 STIG
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0020
- Vuln IDs
-
- V-16061
- Rule IDs
-
- SV-17048r1_rule
Checks: C-17104r1_chk
Work with the network reviewer and system administrator to determine compliance. Request a copy of switch configuration to verify the ports that the Sun Ray server plugs into are configured to a dedicated VLAN. Below is an example of a VLAN that may be used for Sun Ray server traffic. Cisco IOS Example: Interface VLAN5 description “Network A” ip address 192.168.1.25 255.255.255.0 no shutdown interface VLAN 12 description “Network Sun Ray” ip address 10.0.0.25 255.255.255.0 no shutdown set interface sc0 10.0.0.25 255.255.255.0
Fix: F-16166r1_fix
Isolate Sun Ray Desktop Unit traffic from other traffic.
- RMF Control
- Severity
- L
- CCI
- Version
- SUN0030
- Vuln IDs
-
- V-16062
- Rule IDs
-
- SV-17049r2_rule
Checks: C-59757r1_chk
Within the Sun Ray Administration console, perform the following: 1. Select the Advanced Tab. 2. Select the System Policy Tab. 3. Verify the Card Users Access has "Users with Registered Tokens" selected. 4. If Access is set to "None" or "All Users", this is a finding
Fix: F-16167r2_fix
Within the Sun Ray Administration console, perform the following: 1. Select the Advanced Tab. 2. Select the System Policy Tab. 3. Check the Card Users Access for “Users with Registered Tokens"
- RMF Control
- Severity
- L
- CCI
- Version
- SUN0040
- Vuln IDs
-
- V-16063
- Rule IDs
-
- SV-17050r1_rule
Checks: C-17106r1_chk
Within the Sun Ray Administration console, perform the following: 1. Select the Advanced Tab. 2. Select the Kiosk Mode Tab. 3. Click on the Edit button. 4. Select the preferred Kiosk Session from the Session drop-down list and verify the Timeout box has a value of 10 minutes or less, but not zero. The default is 12000 seconds. If it is greater than 600 seconds (10 minutues) or zero/blank, this is a finding. Should be configured to 600 seconds or less.
Fix: F-16168r1_fix
Configure the Sun Ray Kiosk mode timeout value with a value of 10 minutes or less.
- RMF Control
- Severity
- H
- CCI
- Version
- SUN0050
- Vuln IDs
-
- V-16064
- Rule IDs
-
- SV-17051r1_rule
Checks: C-17107r1_chk
Within the Sun Ray Administration console, perform the following: 1. Select the Advanced Tab. 2. Select the System Policy Tab. 3. Verify the Non-Card Users Access has “Self Registration Allowed” not checked. 4. If Access is set to "Self-Registration Allowed", this is a finding.
Fix: F-16169r1_fix
Disable Self-Registration for all users. NIPRNET - Within the Sun Ray Administration console, perform the following: 1. Select the Advanced Tab. 2. Select the System Policy Tab. 3. Uncheck the Card Users Access for “Self Registration Allowed”. SIPRNET - Within the Sun Ray Administration console, perform the following: 1. Select the Advanced Tab. 2. Select the System Policy Tab. 3. Uncheck the Non-Card Users Access for “Self Registration Allowed”.
- RMF Control
- Severity
- H
- CCI
- Version
- SUN0070
- Vuln IDs
-
- V-16071
- Rule IDs
-
- SV-17058r1_rule
Checks: C-17114r1_chk
1. Open a terminal command line on the Sun Ray server. Perform the following: # /opt/SUNWut/sbin/utadminuser admin If the admin user is returned, this is a finding. 2. Then verify that the following /etc/pam.conf file has the following entries: Use the following command to locate them. # cat /etc/pam.conf | grep utadmingui # added to utadmingui by Sun Ray Server Software -- utadmingui utadmingui auth requisite pam_authtok_get.so.1 utadmingui auth required pam_dhkeys.so.1 utadmingui auth required pam_unix_cred.so.1 utadmingui auth required pam_unix_auth.so.1 If the above entries are not in the /etc/pam.conf file, then the alternate username specified to administer the Sun Ray administration tool will not work. If above entries are not in the pam.conf file, this is a finding.
Fix: F-16176r1_fix
Configure individual usernames to access the Sun Ray administration console.
- RMF Control
- Severity
- H
- CCI
- Version
- SUN0080
- Vuln IDs
-
- V-16072
- Rule IDs
-
- SV-17059r1_rule
Checks: C-17116r1_chk
Request the documentation authorizing users to administer the Sun Ray Server. Compare this list with the list below. If there is a discrepancy, this is a finding. Open a terminal command line on the Solaris 10 server. Perform the following: # /opt/SUNWut/sbin/utadminuser If users listed here are not authorized to access the Sun Ray administration console, this is a finding.
Fix: F-16178r1_fix
Ensure only authorized users have access to the Sun Ray administration console.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0090
- Vuln IDs
-
- V-16075
- Rule IDs
-
- SV-17062r1_rule
Checks: C-17119r1_chk
On the Sun Ray server perform the following: # cat /etc/opt/SUNWut/webamin/webadmin.conf | grep session.timeout # The session timeout (specified in minutes) Session.timeout=10 If the “session.timeout” value does not equal 10 minutes or less, this is a finding.
Fix: F-16181r1_fix
Configure the administrator session timeout value to 10 minutes or less.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0110
- Vuln IDs
-
- V-16083
- Rule IDs
-
- SV-17071r1_rule
Checks: C-17126r1_chk
The server may have newer patch version of the firmware installed, but the clients may not have downloaded the new firmware due to policy restrictions. Therefore, it is important to check the firmware on the client, not the server. To check the firmware, go to the Sun Ray Desktop Unit, and perform the following: On the Sun Ray 2fs unit press the (Stop-V) on Sun Keyboard and on the PC keyboards press the (Ctrl-Pause-V). If the version is lower than 2.0, this is a finding. Most likely the version will be 4.0.-127553-02.2008-03.06.15.04 or higher. Note: For other Sun Ray Desktop Units, consult the system administrator or documentation for the key mode combinations.
Fix: F-16189r1_fix
Upgrade the firmware to 2.0 or higher, preferably to the most current firmware released from Sun Microsystems.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0120
- Vuln IDs
-
- V-16100
- Rule IDs
-
- SV-17088r1_rule
Checks: C-17146r1_chk
1. Ask the IAO/SA where the test and development Sun Ray Servers are located. Access those servers and perform the following commands: # /opt/SUNWut/lib/utspatches Should return the following: 127554-02 127557-01 OR # patchadd –p | grep <patch> SRSS Patches need to be at one of the following: Solaris/SPARC 127553 Solaris/x86 127554 Linux/x86 127555 SRWC 2.0 Patches need to be at one of the following: Solaris/SPARC 127556 Solaris/x86 127557 Linux/x86 127558 If the preceding patches are not returned, this is a finding. Check Sun Microsystems’s website for updated patches that may have been released after this checklist. 2. Request from the IAO/SA for a documented procedure on how their patches are tested on a development system before using on production systems. If no procedure is provided, this is a finding.
Fix: F-16207r1_fix
Implement the latest patches for the Sun Ray system. Check Sun Microsystems’s website for updated patches that may have been released after this checklist. Create patch procedures for testing before deploying patches to the production system.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0130
- Vuln IDs
-
- V-16103
- Rule IDs
-
- SV-17091r1_rule
Checks: C-17147r1_chk
On the Sun Ray server perform the following: # /opt/SUNWut/lib/utspatches Should return the following: 127554-02 127557-01 OR # patchadd –p | grep <patch> SRSS Patches need to be at one of the following: Solaris/SPARC 127553 Solaris/x86 127554 Linux/x86 127555 SRWC 2.0 Patches need to be at one of the following: Solaris/SPARC 127556 Solaris/x86 127557 Linux/x86 127558 If the preceding patches are not returned, this is a finding. Check Sun Microsystems’s website for updated patches that may have been released after this checklist.
Fix: F-16209r1_fix
Implement the latest patches for the Sun Ray system. Check Sun Microsystem's website for updated patches that may have been released after this checklist.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0140
- Vuln IDs
-
- V-16143
- Rule IDs
-
- SV-17132r1_rule
Checks: C-17187r1_chk
Within the Sun Ray Administration console, perform the following: 1. Select the Advanced Tab. 2. Select the Security Tab. 3. Verify the USB Port under Devices is not checked. If it is, this is a finding. Caveat: This is not applicable for keyboard and mouse USB ports, however, these ports must be documented and approved by the IAO. This check may be Not a Finding for USB ports enabled for operational purposes that are approved by the DAA.
Fix: F-16249r1_fix
Disable all USB ports on Sun Ray Desktop Units.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0160
- Vuln IDs
-
- V-16145
- Rule IDs
-
- SV-17134r1_rule
Checks: C-17188r1_chk
Have the administrator log into the Sun Ray administrator console by typing the following: http://localhost:1660. If the session does not switch to https://localhost:1661 in the browser, this is a finding.
Fix: F-16250r1_fix
Encrypt all Sun Ray server console sessions.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0170
- Vuln IDs
-
- V-16146
- Rule IDs
-
- SV-17135r1_rule
Checks: C-17189r1_chk
Within the Sun Ray Administration console, perform the following: 1. Select the Advanced Tab. 2. Select the Security Tab. 3. Verify that “Upstream Encryption” and “Downstream Encryption” are checked. 4. If these are not checked, this is a finding.
Fix: F-16251r1_fix
Encrypt Sun Ray traffic to all Desktop Units.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0180
- Vuln IDs
-
- V-16148
- Rule IDs
-
- SV-17137r1_rule
Checks: C-17190r1_chk
Within the Sun Ray Administration console, perform the following: 1. Select the Advanced Tab. 2. Select the Security Tab. 3. Verify that “Server Authentication” is checked. If it is not checked, this is a finding.
Fix: F-16252r1_fix
Enable Server Authentication for the Sun Ray server.
- RMF Control
- Severity
- H
- CCI
- Version
- SUN0190
- Vuln IDs
-
- V-16151
- Rule IDs
-
- SV-17140r1_rule
Checks: C-17191r1_chk
Within the Sun Ray Administration console, perform the following: 1. Select the Advanced Tab. 2. Select the Security Tab. 3. Verify that “Security Mode” is configured to Hard. If it is not configured or set to soft, this is a finding.
Fix: F-16254r1_fix
Configure Security Mode to Hard.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0200
- Vuln IDs
-
- V-16153
- Rule IDs
-
- SV-17142r1_rule
Checks: C-17192r1_chk
On the Sun Ray server perform the following: # /opt/SUNWut/sbin/utreplica -l If no secondary failover servers are configured, this is a finding.
Fix: F-16256r1_fix
Configure the Sun Ray system with primary and secondary servers for failover.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0210
- Vuln IDs
-
- V-16155
- Rule IDs
-
- SV-17144r1_rule
Checks: C-17193r1_chk
On the Sun Ray server, perform the following: # find /etc/opt/SUNWut/ -name gmSignature If no results are returned, this is a finding.
Fix: F-16258r1_fix
Configure a failover group signature to ensure only authorized servers are members of the group.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0230
- Vuln IDs
-
- V-16157
- Rule IDs
-
- SV-17146r1_rule
Checks: C-17194r1_chk
1. Verify that syslogd is running on the system. Perform the following: # ps –ef | grep syslogd If nothing is returned, this is a finding. 2. Verify /etc/syslog.conf is configured with the following entries: # cat /etc/syslog.conf User.info /var/opt/SUNWut/log/messages Local1.info /var/opt/SUNWut/log/admin_log If these two entries are missing, this is a finding. 3. Critical Sun Ray log files are the administration, authentication, automatic mounting, mass storage devices, messages, and web administration. Significant activity is recorded in the following log files. Verify that these files are being written to by performing the following: # ls -Ll /var/opt/SUNWut/log | awk ‘{if ($5 ~ /^0$/ print}’ If any of the following log files are returned this is a finding. admin_log auth_log utmountd.log utstoraged.log messages utwebadmin.log Example of log file with zero byte (0) size. (i.e. –rw-r----- 1 root utadmin 0 Jun 29 utmountd.log) If these logs are being written to an external syslog server, review that server to ensure the logs are being recorded.
Fix: F-16262r1_fix
Record Sun Ray server activity to log files.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0250
- Vuln IDs
-
- V-16158
- Rule IDs
-
- SV-17147r1_rule
Checks: C-17195r1_chk
On the Sun Ray server perform the following: # ls -al /var/opt/SUNWut/log | less Log files that should be 640: admin_log auth_log utmountd.log utstoraged.log messages utwebadmin.log If any of the audit log file permissions are greater than 640, this is a finding. If the audit logs are on an external syslog server, ensure permissions are 640. If they are not, this is a finding.
Fix: F-16263r1_fix
Configure the Sun Ray server logs permissions to 640.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0260
- Vuln IDs
-
- V-16159
- Rule IDs
-
- SV-17148r1_rule
Checks: C-17196r1_chk
Ask the IAO/SA where the Sun Ray system audit logs are stored. If they are offsite, review the process to move them to the alternative site. Verify that the audit data is retained for a minimum of one year by reviewing the dates of the oldest backup files or media. Audit data that should be retained include the following files on the Sun Ray server: (These files maybe at a different location for a remote syslog server.) /var/opt/SUNWut/log/admin_log /var/opt/SUNWut/log/auth_log /var/opt/SUNWut/log/utmountd.log /var/opt/SUNWut/log/utstoraged.log /var/opt/SUNWut/log/messages /var/opt/SUNWut/log/utwebadmin.log
Fix: F-16264r1_fix
Retain all audit data for a minimum of one year.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0270
- Vuln IDs
-
- V-16349
- Rule IDs
-
- SV-17342r1_rule
Checks: C-17263r1_chk
1. Determine the MAC level of the Sun Ray system by asking the IAO/SA. 2. Once the MAC level is determined, locate the backup media or storage location. For MAC I servers, a redundant secondary system is required that is not colocated. For MAC II servers, daily backups are required with recovery media stored offline. For MAC III servers, backups must be performed weekly. 3. Depending on the MAC level, verify the servers are backed up to media or storage within the guidelines of the MAC level. If they are not, this is a finding.
Fix: F-16401r1_fix
Backup the Sun Ray system in accordance to the MAC level.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0310
- Vuln IDs
-
- V-16351
- Rule IDs
-
- SV-17344r1_rule
Checks: C-17264r1_chk
On the Sun Ray 2fs unit press the (Stop-M) on Sun Keyboard and on the PC keyboards press the (Ctrl-Pause-M or S). If you are not prompted for a password to enter the firmware configuration, this is a finding. To configure the password, select Security, Password, and type in the password. Make sure it is compliant with DoD password policies. Caveat: If the (Stop-M) on the Sun keyboard or the (Ctrl-Pause-M or S) on the PC keyboards does not bring up the pop-up firmware-gui, then the pop-up function is disabled for this firmware and this is not applicable. Note: For other Sun Ray Desktop Units, consult the system administrator or documentation for the key mode combinations.
Fix: F-16402r1_fix
Configure a username / password for the DTU pop-up menu.
- RMF Control
- Severity
- L
- CCI
- Version
- SUN0320
- Vuln IDs
-
- V-16354
- Rule IDs
-
- SV-17347r1_rule
Checks: C-17265r1_chk
Open the Solaris DHCP Manager or the DCHP server that is handing out IP addresses. The Solaris DHCP manager is located in /usr/sadm/admin/bin/dhcpmgr. Verify that the dynamic IP addresses are set to permanent or static based on the MAC.
Fix: F-16403r1_fix
Configure Sun Ray session servers to reserve IP addresses for Desktop Units.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0330
- Vuln IDs
-
- V-16379
- Rule IDs
-
- SV-17372r1_rule
Checks: C-17267r1_chk
On the Sun Ray server perform the following: # find /opt –perm -4000 If the result does not return the following output only, this is a finding. /opt/SUNWut/lib/utrcmd /opt/SUNWut/lib/utguiauth /opt/SUNWut/lib/utprefs-helper /opt/SUNWut/lib/utdomount /opt/SUNWut/bin/utaudio /opt/SUNWut/bin/utxconfig # find /opt –perm -2000 If the result does not return the following output only, this is a finding. /opt/SUNuttsc/lib/uttsc-bin Ensure the documented setuid and setgid match the output above. If not, this is a finding.
Fix: F-16415r1_fix
Document the setuid and setgid files on the Sun Ray system.
- RMF Control
- Severity
- L
- CCI
- Version
- SUN0340
- Vuln IDs
-
- V-16393
- Rule IDs
-
- SV-17386r1_rule
Checks: C-17271r1_chk
On the Sun Ray server, examine the /etc/syslog.conf file. To send all syslog data from the Sun Ray server to a remote syslog host, search for the following line(s) in the /etc/syslog.conf file: *.*<Tab><Tab> @loghost (name of remote host) OR *.debug, info, …@loghost At a minimum, the following two log files must be configured to send their logs to a remote syslog server: Log Name Facility Level Default Location messages user.info /var/opt/SUNWut/log/messages admin_log local1.info /var/opt/SUNWut/log/admin_log Verify the loghost referred to in the syslog.conf file is not resolving to the localhost. Check /etc/hosts file to review what the remote host is referring to. If it is not in this file, check the DNS server to determine what it is resolving to. If it is resolving to localhost, this is a finding.
Fix: F-16423r1_fix
Configure the Sun Ray server to send its logs to a remote syslog server.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0370
- Vuln IDs
-
- V-16394
- Rule IDs
-
- SV-17387r1_rule
Checks: C-17272r1_chk
Select the server that has the Sun Management Center software installed. Perform the following at the console: # /opt/SUNWsymon/sbin/es-start –c & Enter the username/password and login 1. Select the Alarms tab. 2. Verify alarms are configured for the daemons, failover groups, and interconnects by performing the following: a) Double-click on the Sun Ray Services icon on the left. Daemons: Dtlogin – Desktop login daemon In.dhcpd – Dhcp daemon Utauthd – Auth manager Utdsd – Datastore daemon Utsessiond – Session daemon Utdevmgrd – Device manager b) Double-click on the Sun Ray Failover Groups icon on the left. failover Groups primary and secondary servers c) Double-click on the Sun Ray Interconnects icon on the left. Interconnects (Network Interfaces Used by Sun Ray server): If these are system objects are not configured with alarms, this is a finding.
Fix: F-16424r1_fix
Configure Sun Ray system in the Sun Management Center to monitor daemons, failover groups, and interconnects.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0380
- Vuln IDs
-
- V-16395
- Rule IDs
-
- SV-17388r1_rule
Checks: C-17273r1_chk
Access VMS or appropriate database and navigate to the site’s assets. Ensure the Sun Ray Server(s) are registered within the database or VMS. If they are not registered, this is a finding.
Fix: F-16425r1_fix
Register Sun Ray Servers in VMS or database.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0390
- Vuln IDs
-
- V-16396
- Rule IDs
-
- SV-17389r1_rule
Checks: C-17274r1_chk
If VMS is used and check SUN0380 is a finding, this should be automatically marked as a finding. If VMS is not being used, this is Not Applicable. If the assets are registered in VMS, verify that the following postures are registered. If any of the postures are not registered this is a finding. Solaris 10 or Red Hat Linux Advanced Server 4 or SuSE Linux Enterprise Server 9 Sun Ray 4 Tomcat 5.x
Fix: F-16426r1_fix
Register Sun Ray Servers in VMS with the correct posture.
- RMF Control
- Severity
- M
- CCI
- Version
- SUN0400
- Vuln IDs
-
- V-17455
- Rule IDs
-
- SV-18511r1_rule
Checks: C-18273r1_chk
1. Validate the scope of clients that the Sun Ray Session Server (SRSS) is servicing. If the SRSS is servicing clients outside the local enclave, proceed to step 2. If the SRSS is servicing clients inside the local enclave, proceed to step 3. 2. The requirement is that the SRSS must be in a protected DMZ. Review the network topology diagram and obtain the SRSS IP address and subnet mask to validate that it is in the documented subnet for the DMZ. If no network topology diagram exists, work with the network reviewer/system administrator to determine if the SRSS is located in a DMZ. If it is not in a DMZ, this is a finding. 3. If the SRSS server is only serving clients inside the local enclave, the requirement is to be behind the enclave not part of the DMZ that houses the public servers. Review the network topology diagram and obtain the SRSS IP address and subnet mask to validate that it is in an enclave subnet for servers. If no network topology exists, work with the network reviewer/system administrator to determine where the SRSS server is located. If it is in the DMZ, this is a finding.
Fix: F-17374r1_fix
Place the SRSS behind a screened subnet or DMZ.