UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The smb.conf file must use the hosts option to restrict access to Samba.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1030 GEN006220 SV-40298r2_rule Medium
Description
Samba increases the attack surface of the system and must be restricted to communicate only with systems requiring access.
STIG Date
Solaris 10 SPARC Security Technical Implementation Guide 2020-02-26

Details

Check Text ( C-39151r3_chk )
Examine the smb.conf file. Default locations for this file include /etc, /etc/sfw, /etc/samba, and /etc/sfw/samba. If the system has Samba installed in non-standard locations, also check the smb.conf in those locations.

Procedure:
# more /etc/smb.conf /etc/sfw/smb.conf /etc/samba/smb.conf /etc/sfw/samba/smb.conf

If the hosts option is not present to restrict access to a list of authorized hosts and networks, this is a finding.
Fix Text (F-1184r4_fix)
Edit the smb.conf file and set the hosts option to permit only authorized hosts to access Samba.