UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The NFS anonymous UID and GID must be configured to values that have no permissions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-227919 GEN005820 SV-227919r603266_rule Medium
Description
When an NFS server is configured to deny remote root access, a selected UID and GID are used to handle requests from the remote root user. The UID and GID should be chosen from the system to provide the appropriate level of non-privileged access.
STIG Date
Solaris 10 X86 Security Technical Implementation Guide 2020-12-04

Details

Check Text ( C-30081r490168_chk )
Check if the anon option is set correctly for exported file systems.

List exported file systems.
# exportfs -v
OR
# more /etc/dfs/sharetab

Each of the exported file systems should include an entry for the 'anon=' option set to -1 or an equivalent (60001, 60002, 65534, or 65535). If an appropriate 'anon=' setting is not present for an exported file system, this is a finding.
Fix Text (F-30069r490169_fix)
Edit /etc/dfs/dfstab and add the "anon=-1" option for exports lacking it. Re-export the filesystems.