SOL-11.1-040400 - The use of FTP must be restricted.

Information

FTP is an insecure protocol that transfers files and credentials in clear text, and can be replaced by using SFTP. However, if FTP is permitted for use in the environment, it is important to ensure that the default 'system' accounts are not permitted to transfer files via FTP, especially the root role. Consider also adding the names of other privileged or shared accounts that may exist on the system such as user 'oracle' and the account which the web server process runs under.

Solution

The root role is required.

Determine if the FTP server package is installed:

# pkg list service/network/ftp

If the output of this command is:

pkg list: no packages matching 'service/network/ftp' installed

no further action is required.

# for user in 'logins -s | awk '{ print $1 }''
aiuser noaccess nobody nobody4; do
$(echo $user >> /etc/ftpd/ftpusers)
done
# sort -u /etc/ftpd/ftpusers > /etc/ftpd/ftpusers.temp
# mv /etc/ftpd/ftpusers.temp /etc/ftpd/ftpusers

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_SPARC_V3R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-216358r959010_rule, STIG-ID|SOL-11.1-040400, STIG-Legacy|SV-60989, STIG-Legacy|V-48117, Vuln-ID|V-216358

Plugin: Unix

Control ID: 75f8dcf416b3927a835bd70f240c1a8cb044ac36ac843ebaf910e99638322ac9