Check: GEN005820
SUSE Linux Enterprise Server v11 for System z STIG:
GEN005820
(in versions v1 r12 through v1 r9)
Title
The Network File System (NFS) anonymous UID and GID must be configured to values without permissions. (Cat II impact)
Discussion
When an NFS server is configured to deny remote root access, a selected UID and GID are used to handle requests from the remote root user. The UID and GID should be chosen from the system to provide the appropriate level of non-privileged access.
Check Content
Check if the nfs-kernel-server package is installed. It contains the exportfs command as well as the nfsserver process itself. # rpm –q nfs-kernel-server If the package is not installed, this check does not apply. If it is installed, check if the 'anonuid' and 'anongid' options are set correctly for exported file systems. List exported filesystems: # exportfs -v Each of the exported file systems should include an entry for the 'anonuid=' and 'anongid=' options set to "-1" or an equivalent (60001, 65534, or 65535). If appropriate values for 'anonuid' or 'anongid' are not set, this is a finding.
Fix Text
Edit "/etc/exports" and set the "anonuid=-1" and "anongid=-1" options for exports lacking it. Re-export the filesystems.
Additional Identifiers
Rule ID: SV-46123r1_rule
Vulnerability ID: V-932
Group Title: GEN005820
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000062 |
The organization permits actions to be performed without identification and authentication only to the extent necessary to accomplish mission/business objectives. |
Controls
Number | Title |
---|---|
No controls are assigned to this check |