Check: GEN004800
Solaris 9 X86 STIG:
GEN004800
(in version v1 r9)
Title
Unencrypted FTP must not be used on the system. (Cat II impact)
Discussion
FTP is typically unencrypted and, therefore, presents confidentiality and integrity risks. FTP may be protected by encryption in certain cases, such as when used in a Kerberos environment. SFTP and FTPS are encrypted alternatives to FTP.
Check Content
Determine if unencrypted FTP is enabled. Procedure: # grep ftp /etc/inetd.conf If this service is found, and is not commented out, ask the SA if the services are encrypted. If they are not, this is a finding.
Fix Text
Edit /etc/inetd.conf and comment out or remove the ftp service.
Additional Identifiers
Rule ID: SV-28634r1_rule
Vulnerability ID: V-12010
Group Title:
Expert Comments
Expert comments are only available to logged-in users.
CCIs
CCIs tied to check.
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Controls tied to check. These are derived from the CCIs shown above.
Number | Title |
---|---|
CM-6 |
Configuration Settings |