UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Unencrypted FTP must not be used on the system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-12010 GEN004800 SV-37515r1_rule ECSC-1 Medium
Description
: FTP is typically unencrypted and presents confidentiality and integrity risks. FTP may be protected by encryption in certain cases, such as when used in a Kerberos environment. SFTP and FTPS are encrypted alternatives to FTP.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2015-06-12

Details

Check Text ( C-36174r3_chk )
Perform the following to determine if unencrypted FTP is enabled:

# chkconfig --list gssftp
# chkconfig --list vsftpd

If any of these services are found, ask the SA if these services are encrypted. If they are not, this is a finding.
Fix Text (F-31425r2_fix)
Disable the FTP daemons.

Procedure:
# chkconfig gssftp off
# chkconfig vsftpd off