UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Inetd or xinetd logging/tracing must be enabled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1011 GEN003800 SV-37439r1_rule ECAR-1 ECAR-2 ECAR-3 ECSC-1 Low
Description
Inetd or xinetd logging and tracing allows the system administrators to observe the IP addresses connecting to their machines and what network services are being sought. This provides valuable information when trying to find the source of malicious users and potential malicious users.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2014-04-02

Details

Check Text ( C-36111r1_chk )
The /etc/xinetd.conf file and each file in the /etc/xinetd.d directory file should be examined for the following:

Procedure:
log_type = SYSLOG authpriv
log_on_success = HOST PID USERID EXIT
log_on_failure = HOST USERID

If xinetd is running and logging is not enabled, this is a finding.

Fix Text (F-31357r1_fix)
Edit each file in the /etc/xinetd.d directory and the /etc/xinetd.conf file to contain:
log_type = SYSLOG authpriv
log_on_success = HOST PID USERID EXIT
log_on_failure = HOST USERID

The /etc/xinetd.conf file contains default values that will hold true for all services unless individually modified in the service's xinetd.d file.

To make the new settings effective, restart the xinetd service:
# service xinetd restart