Check: IFTP0090
zOS RACF STIG:
IFTP0090
(in versions v6 r43 through v6 r30)
Title
The TFTP Server program is not properly protected. (Cat II impact)
Discussion
The Trivial File Transfer Protocol (TFTP) Server, known as tftpd, supports file transfer according to the industry standard Trivial File Transfer Protocol. The TFTP Server does not perform any user identification or authentication, allowing any client to connect to the TFTP Server. Due to this lack of security, the TFTP Server will not be used. Failure to restrict the use of the TFTP Server may result in unauthorized access to the host. This exposure may impact the integrity, availability, and privacy of application data.
Check Content
a) Refer to the following report produced by the Data Set and Resource Data Collection: - SENSITVE.RPT(PROGRAM) Automated Analysis Refer to the following report produced by the Data Set and Resource Data Collection: - PDI(IFTP0090) b) Ensure the following program controls are in effect for the TFTP Server: 1) Program resources TFTPD and EZATD are defined to the PROGRAM resource class with a UACC(NONE). The library name where these programs are located is SYS1.TCPIP.SEZALOAD. 2) No access to the program resources TFTPD and EZATD is permitted. c) If both the items in (b) are true, there is NO FINDING. d) If any item in (b) is untrue, this is a FINDING.
Fix Text
Evaluate the impact of implementing the following change. Develop a plan of action and implement the change as required. 1) Ensure that the EZATD program and its alias TFTPD are defined to RACF, no access is granted, and WARN mode is not enabled. The following commands provide a sample of how this can be accomplished. rdef program tftpd addmem('sys1.tcpip.sezaload'//nopadchk) - data('Reference SRR PDI # IFTP0090') - audit(all(read)) uacc(none) owner(admin) rdef program ezatd - addmem('sys1.tcpip.sezaload'//nopadchk) - data('Reference SRR PDI # IFTP0090') - audit(all(read)) uacc(none) owner(admin) A PROGRAM class refresh will be necessary and can be accomplished with the command: setr when(program) refresh
Additional Identifiers
Rule ID: SV-6924r2_rule
Vulnerability ID: V-3241
Group Title: IFTP0090
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001764 |
The information system prevents program execution in accordance with organization-defined policies regarding software program usage and restrictions, and/or rules authorizing the terms and conditions of software program usage. |
CCI-002235 |
The information system prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. |