UCF STIG Viewer Logo

All network services daemon files must not have extended ACLs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-227614 GEN001190 SV-227614r603266_rule Medium
Description
Restricting permission on daemons will protect them from unauthorized modification and possible system compromise.
STIG Date
Solaris 10 X86 Security Technical Implementation Guide 2022-09-07

Details

Check Text ( C-29776r488399_chk )
Verify network services daemon files have no extended ACLs.
# ls -la /usr/sbin
# ls -la /usr/bin
If the permissions include a "+", the file has an extended ACL and this is a finding.
NOTE: Network daemons not residing in these directories (such as httpd or sshd) must also be checked for the correct permissions.

A way to locate network daemons, such as httpd and sshd, is with the ps command.
# ps -ef | egrep '(sshd|httpd)'
Fix Text (F-29764r488400_fix)
Remove the extended ACL from the file.
# chmod A- [file with extended ACL]