UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The access.conf file must not have an extended ACL.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22595 GEN000000-LNX00450 SV-26998r1_rule ECLP-1 Medium
Description
If the access permissions are more permissive than 0640, system security could be compromised.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2016-12-16

Details

Check Text ( C-35941r3_chk )
Check the permissions of the file.
# ls -lL /etc/security/access.conf
If the permissions of the file or directory contain a '+', an extended ACL is present. If the file has an extended ACL and it has not been documented with the IAO, this is a finding.
Fix Text (F-24264r1_fix)
Remove the extended ACL from the file.
# setfacl --remove-all /etc/security/access.conf