Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4695 | GEN005140 | SV-37676r1_rule | DCSW-1 | High |
Description |
---|
TFTP is a file transfer protocol often used by embedded systems to obtain configuration data or software. The service is unencrypted and does not require authentication of requests. Data available using this service may be subject to unauthorized access or interception. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2013-04-10 |
Check Text ( C-36864r2_chk ) |
---|
Determine if the TFTP daemon is active. # chkconfig --list | grep tftp If TFTP is found enabled ("on") and not documented using site-defined procedures, it is a finding. |
Fix Text (F-31806r1_fix) |
---|
Document or Disable the TFTP daemon. If the TFTP daemon is necessary on the system, document and justify its usage for approval from the IAO. If the TFTP daemon is not necessary on the system, turn it off. # chkconfig tftp off # service xinetd restart |