WG330 A22 - A public web server must limit email to outbound only - netstat

Information

Incoming E-mail has been known to provide hackers with access to servers. Disabling the incoming mail service prevents this type of attacks. Additionally, Email represents the main use of the Internet. It is specialized application that requires the dedication of server resources. To combine this type of transaction processing function with the file serving role of the web server creates an inherent conflict. Supporting mail services on a web server opens the server to the risk of abuse as an email relay.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure the email application to not allow incoming connections.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Apache_2-2_UNIX_V1R11_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, Rule-ID|SV-32937r1_rule, STIG-ID|WG330_A22, Vuln-ID|V-2261

Plugin: Unix

Control ID: 0d5494f8b1814153c99b729155f84a3211761ac1349ca325ae4d87897ab44f4f