UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Samba Web Administration Tool (SWAT) must be restricted to the local host or require SSL.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1026 GEN006080 SV-1026r2_rule EBRP-1 ECCT-1 ECCT-2 Medium
Description
SWAT is a tool used to configure Samba. As it modifies Samba configuration, which can impact system security, it must be protected from unauthorized access. SWAT authentication may involve the root password, which must be protected by encryption when traversing the network. Restricting access to the local host allows for the use of SSH TCP forwarding, if configured, or administration by a web browser on the local system.
STIG Date
UNIX SRG 2013-03-26

Details

Check Text ( C-2047r3_chk )
Check the system for an enabled SWAT service.

# grep -i swat /etc/inetd.conf

If SWAT is found enabled, it must be utilized with SSL to ensure a secure connection between the client and the server. Ask the SA to identify the method used to provide SSL protection for the SWAT service. Verify (or ask the SA to demonstrate) this configuration is effective by accessing SWAT using an HTTPS connection from a web browser.

If SWAT is found enabled and has no SSL protection, this is a finding.
Fix Text (F-1180r3_fix)
Disable SWAT (e.g., remove the "swat" line from inetd.conf or equivalent, and restart the service) or configure SSL protection for the SWAT service.