Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-849 | GEN005120 | SV-39825r1_rule | ECSC-1 | Medium |
Description |
---|
If TFTP has a valid shell, it increases the likelihood of someone logging to the TFTP account and compromising the system. |
STIG | Date |
---|---|
Solaris 10 SPARC Security Technical Implementation Guide | 2020-02-26 |
Check Text ( C-38704r2_chk ) |
---|
Verify the tftp service is enabled. # svcs tftp If the tftp service is not installed or enabled, this check is not applicable. Check the /etc/passwd file to determine if TFTP is configured properly. Procedure: # grep tftp /etc/passwd If a "tftp" user account does not exist and TFTP is active, this is a finding. Check the user shell for the "tftp" user. If it is not /bin/false or equivalent, this is a finding. Check the home directory assigned to the "tftp" user. If no home directory is set, or the directory specified is not dedicated to the use of the TFTP service, this is a finding. |
Fix Text (F-1003r2_fix) |
---|
Create a TFTP user account if none exists. Assign a non-login shell to the TFTP user account, such as /bin/false. Assign a home directory to the TFTP user account. |