UCF STIG Viewer Logo

The smb.conf file must use the hosts option to restrict access to Samba.


Overview

Finding ID Version Rule ID IA Controls Severity
V-227933 GEN006220 SV-227933r603266_rule Medium
Description
Samba increases the attack surface of the system and must be restricted to communicate only with systems requiring access.
STIG Date
Solaris 10 X86 Security Technical Implementation Guide 2020-12-04

Details

Check Text ( C-30095r490219_chk )
Examine the smb.conf file. Default locations for this file include /etc, /etc/sfw, /etc/samba, and /etc/sfw/samba. If the system has Samba installed in non-standard locations, also check the smb.conf in those locations.

Procedure:
# more /etc/smb.conf /etc/sfw/smb.conf /etc/samba/smb.conf /etc/sfw/samba/smb.conf

If the hosts option is not present to restrict access to a list of authorized hosts and networks, this is a finding.
Fix Text (F-30083r490220_fix)
Edit the smb.conf file and set the hosts option to permit only authorized hosts to access Samba.