UCF STIG Viewer Logo

All network services daemon files must not have extended ACLs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22313 GEN001190 SV-37199r1_rule ECLP-1 Medium
Description
Restricting permission on daemons will protect them from unauthorized modification and possible system compromise.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2017-03-01

Details

Check Text ( C-35893r2_chk )
Check network services daemon files have no extended ACLs.

# ls -la /usr/sbin

If the permissions include a '+', the file has an extended ACL. If the file has an extended ACL and it has not been documented with the IAO, this is a finding.

Note: Network daemons not residing in these directories must also be checked.
Fix Text (F-23542r1_fix)
Remove the extended ACL from the file.
# setfacl --remove-all /usr/sbin/*