UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Inetd or xinetd logging/tracing must be enabled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1011 GEN003800 SV-38951r1_rule ECAR-1 ECAR-2 ECAR-3 ECSC-1 Low
Description
Inetd or xinetd logging and tracing allows the system administrators to observe the IP addresses that are connecting to their machines and to observe what network services are being sought. This provides valuable information when trying to find the source of malicious users and potential malicious users.
STIG Date
AIX 5.3 Security Technical Implementation Guide 2013-03-26

Details

Check Text ( C-38287r2_chk )
Determine if inetd or xinetd has logging or tracing enabled.

# ps -ef |grep inetd |grep -e "-d"

If no results are returned, this is a finding.
Fix Text (F-31831r1_fix)
Edit the inetd startup script to contain the "-d" parameter for the inetd process.

#vi /etc/rc.tcpip

# chssys -s inetd -a '-d'