OL6-00-000273 - The system must use SMB client signing for connecting to samba servers using mount.cifs.

Information

Packet signing can prevent man-in-the-middle attacks which modify SMB packets in transit.

Solution

Require packet signing of clients who mount Samba shares using the 'mount.cifs' program (e.g., those who specify shares in '/etc/fstab'). To do so, ensure signing options (either 'sec=krb5i' or 'sec=ntlmv2i') are used.

See the 'mount.cifs(8)' man page for more information. A Samba client should only communicate with servers who can support SMB packet signing.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_6_V2R7_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-209011r793732_rule, STIG-ID|OL6-00-000273, STIG-Legacy|SV-65059, STIG-Legacy|V-50853, Vuln-ID|V-209011

Plugin: Unix

Control ID: 936b0692de3e4fcf6bae18f481719b7da7053bdf290e2e26a81402e9fe995d8b