UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The /etc/smb.conf file must not have an extended ACL.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22497 GEN006150 SV-26823r2_rule ECLP-1 Medium
Description
Excessive permissions could endanger the security of the Samba configuration file and, ultimately, the system and network.
STIG Date
SOLARIS 9 X86 SECURITY TECHNICAL IMPLEMENTATION GUIDE 2015-03-25

Details

Check Text ( C-27808r3_chk )
Check the group ownership of the Samba configuration file. Default locations for this file include /etc, /etc/sfw, /etc/samba, and /etc/sfw/samba. If the system has Samba installed in non-standard locations, also check the smb.conf in those locations.

Procedure:

# ls -lL /etc/smb.conf /etc/sfw/smb.conf /etc/samba/smb.conf /etc/sfw/samba/smb.conf

If the permissions include a "+", the file has an extended ACL and this is a finding.
Fix Text (F-24066r3_fix)
Remove the extended ACL from the file:

# getfacl /etc/smb.conf /etc/sfw/smb.conf /etc/samba/smb.conf /etc/sfw/samba/smb.conf

Remove each ACE returned:

# setfacl -d [ACE] /etc/smb.conf /etc/sfw/smb.conf /etc/samba/smb.conf /etc/sfw/samba/smb.conf