UCF STIG Viewer Logo

All network services daemon files must not have extended ACLs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22313 GEN001190 SV-64473r1_rule Medium
Description
Restricting permission on daemons will protect them from unauthorized modification and possible system compromise.
STIG Date
Oracle Linux 5 Security Technical Implementation Guide 2020-02-25

Details

Check Text ( C-52889r1_chk )
Check network services daemon files have no extended ACLs.

# ls -la /usr/sbin

If the permissions include a '+', the file has an extended ACL. If the file has an extended ACL and it has not been documented with the IAO, this is a finding.

Note: Network daemons not residing in these directories must also be checked.
Fix Text (F-55067r1_fix)
Remove the extended ACL from the file.
# setfacl --remove-all /usr/sbin/*