UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The TFTP daemon must operate in "secure mode" which provides access only to a single directory on the host file system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-847 GEN005080 SV-35110r1_rule ECSC-1 High
Description
Secure mode limits TFTP requests to a specific directory. If TFTP is not running in secure mode, it may be able to write to any file or directory and may seriously impair system integrity, confidentiality, and availability.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2016-12-20

Details

Check Text ( C-36593r1_chk )
Determine if the TFTP daemon is installed, started, and running in secure mode.
# cat /etc/inetd.conf | tr '\011' ' ' | tr -s ' ' | sed -e 's/^[ \t]*//' | grep -v "^#" | cut -f 6,7 -d " " | grep -i tftp

If the tftpd process is not configured with exactly one path argument
(example: "/usr/lbin/tftpd tftpd"), this is a finding.
Fix Text (F-31960r1_fix)
Edit /etc/inetd.conf and add one path argument, representing
the TFTP root directory, to the tftpd command.