Oracle Solaris Security Policy

solaris-xccdf.xml

Evaluation Characteristics

Target machinebig64.twistedpair.net
Benchmark TitleOracle Solaris Security Policy
Benchmark VersionSolaris 11
Benchmark Description solaris-xccdf.xml
Profile IDBaseline
Started at2018-10-13T21:11:35
Finished at2018-10-13T21:35:31
Performed byjkwarren

CPE Platforms

    Addresses

      Compliance and Scoring

      The target system did not satisfy the conditions of 8 rules! Please review rule results and consider applying remediation.

      Rule results

      130 passed
      8 failed
      0 other

      Severity of failed rules

      0 other
      0 low
      7 medium
      1 high

      Score

      Scoring systemScoreMaximumPercent
      urn:xccdf:scoring:default89.104561100.000000
      89.1%

      Rule Overview

      TitleSeverityResult
      Oracle Solaris Security Policy 8x fail
      Verify the OS configuration 2x fail
      Package integrity is verifiedhigh
      fail
      The OS version is currentmedium
      fail
      Package signature checking is globally activatedmedium
      pass
      Verify file system information.
      All local filesystems are ZFSmedium
      pass
      Find and list files with extended attributesmedium
      notselected
      Find and list files with no known ownermedium
      notselected
      Find and list .forward filesmedium
      pass
      Find and list .netrc filesmedium
      pass
      Find and list suid and sgid files other than those in standard Oracle Solaris packageshigh
      notselected
      Find and list .rhosts filesmedium
      pass
      swap(1M) is encryptedmedium
      notselected
      Non-root ZFS filesystems are encryptedmedium
      notselected
      A size limit is set on tmpfs(7FS)medium
      notselected
      World-writable directories have sticky bit setmedium
      notselected
      coreadm(1M) configuration is correctmedium
      notselected
      /etc/motd and /etc/issue contain appropriate policy textmedium
      notselected
      Enable required services 5x fail
      Service svc:/system/coreadm is enabledmedium
      pass
      Service svc:/system/cron is enabledmedium
      pass
      Service svc:/system/cryptosvc is enabledmedium
      pass
      Service svc:/system/dbus is enabledmedium
      pass
      Service svc:/system/hal is enabled in global zonemedium
      pass
      Service svc:/system/identity:domain is enabledmedium
      pass
      Service svc:/system/intrd is enabled in global zonemedium
      pass
      Service svc:/system/keymap is enabled in global zonemedium
      pass
      Service svc:/system/picl is enabled in global zonemedium
      pass
      Service svc:/system/scheduler is enabled in global zonemedium
      pass
      Service svc:/system/system-log is enabledmedium
      pass
      Service svc:/system/utmp is enabledmedium
      pass
      Service svc:/system/zones is enabled in global zonemedium
      pass
      Service svc:/system/zones-install is enabledmedium
      pass
      Service svc:/network/rpc/bind is enabledmedium
      pass
      Service svc:/system/name-service/switch is enabledmedium
      pass
      Service svc:/system/name-service/cache is enabledmedium
      pass
      Service svc:/network/nfs/status is disabled or not installedlow
      pass
      Service svc:/network/nfs/nlockmgr is disabled or not installedlow
      pass
      Service svc:/network/nfs/client is disabled or not installedlow
      pass
      Service svc:/network/nfs/server is disabled or not installedlow
      pass
      Service svc:/network/nfs/fedfs-client is disabled or not installedmedium
      fail
      Service svc:/network/nfs/rquota is disabled or not installedlow
      pass
      Service svc:/network/nfs/cbd is disabled or not installedlow
      pass
      Service svc:/network/nfs/mapid is disabled or not installedlow
      pass
      Service svc:/network/smb/client is disabled or not installedmedium
      pass
      Service svc:/network/ftp is disabled or not installedhigh
      pass
      Service svc:/network/ssh is enabledmedium
      pass
      Service svc:/network/smtp:sendmail is enabledmedium
      pass
      Service svc:/network/sendmail-client is enabledmedium
      pass
      Service svc:/network/inetd is enabledmedium
      pass
      Service svc:/system/filesystem/autofs is enabledmedium
      pass
      Service svc:/system/filesystem/rmvolmgr is disabled or not installedmedium
      notselected
      Service svc:/system/filesystem/rmvolmgr is enabledmedium
      notselected
      Service svc:/system/power management is enabled in global zonemedium
      pass
      Service svc:/network/dns/multicast is disabled or not installedmedium
      pass
      Service svc:/network/dhcp-server is disabled or not installedmedium
      pass
      Service svc:/network/ntp is enabled and properly configured as a clientmedium
      notselected
      Service svc:/network/rarp is disabled or not installedmedium
      pass
      Service svc:/network/slp is disabled or not installedmedium
      pass
      Service svc:/network/security/kadmin is disabled or not installedmedium
      pass
      Service svc:/network/security/krb5_prop is disabled or not installedmedium
      pass
      Service svc:/network/security/krb5kdc is disabled or not installedmedium
      pass
      Service svc:/application/management/net-snmp is disabled or not installedmedium
      pass
      Service svc:/application/cups/in-lpd is disabled or not installedmedium
      pass
      Service svc:/application/stosreg is enabled in global zonemedium
      notselected
      Service svc:/system/ocm is enabledmedium
      notselected
      Service svc:/network/finger is disabled or not installedmedium
      pass
      Service svc:/network/login:rlogin is disabled or not installedhigh
      pass
      Service svc:/network/login:klogin is disabled or not installedmedium
      pass
      Service svc:/network/login:eklogin is disabled or not installedmedium
      pass
      Service svc:/network/shell:default is disabled or not installedmedium
      pass
      Service svc:/network/shell:kshell is disabled or not installedmedium
      pass
      Service svc:/network/telnet is disabled or not installedhigh
      pass
      Service svc:/network/uucp is disabled or not installedhigh
      pass
      Service svc:/network/chargen:stream is disabled or not installedhigh
      pass
      Service svc:/network/chargen:dgram is disabled or not installedhigh
      pass
      Service svc:/network/daytime:stream is disabled or not installedhigh
      pass
      Service svc:/network/daytime:dgram is disabled or not installedhigh
      pass
      Service svc:/network/discard:stream is disabled or not installedhigh
      pass
      Service svc:/network/discard:dgram is disabled or not installedhigh
      pass
      Service svc:/network/echo:stream is disabled or not installedhigh
      pass
      Service svc:/network/echo:dgram is disabled or not installedhigh
      pass
      Service svc:/network/time:stream is disabled or not installedhigh
      pass
      Service svc:/network/time:dgram is disabled or not installedhigh
      pass
      Service svc:/network/comsat is disabled or not installedhigh
      pass
      Service svc:/network/rexec is disabled or not installedhigh
      pass
      Service svc:/network/talk is disabled or not installedhigh
      pass
      Service svc:/network/stdiscover is disabled or not installedmedium
      pass
      Service svc:/network/stlisten is disabled or not installedmedium
      pass
      Service svc:/network/rpc/gss is disabled
      notselected
      Service svc:/network/rpc/gss is enabled
      notselected
      Service svc:/network/rpc/gss is enabled if and only if Kerberos is configuredmedium
      fail
      Service svc:/network/rpc/mdcommd is disabled, or not installedmedium
      notselected
      Service svc:/network/rpc/mdcommd is enabledmedium
      notselected
      Service svc:/network/rpc/smserver is disabled or not installedmedium
      notselected
      Service svc:/network/rpc/smserver is enabledmedium
      notselected
      Service svc:/network/security/ktkt_warn is disabled or not installedmedium
      notselected
      Service svc:/network/security/ktkt_warn is enabledmedium
      notselected
      Service svc:/network/rpc/rstat is disabled or not installedmedium
      pass
      Service svc:/network/rpc/rusers is disabled or not installedmedium
      pass
      Service svc:/network/rpc/meta is disabled or not installedmedium
      pass
      Service svc:/network/rpc/metamed is disabled or not installedmedium
      pass
      Service svc:/network/rpc/metamh is disabled or not installedmedium
      pass
      Service svc:/network/rpc/rex is disabled or not installedmedium
      pass
      Service svc:/network/rpc/spray is disabled or not installedmedium
      pass
      Service svc:/network/rpc/wall is disabled or not installedmedium
      pass
      Service svc:/system/avahi-bridge-dsd is disabled or not installedmedium
      pass
      Service cde-ttdbserver is enabled, or not installedmedium
      pass
      Service svc:/application/graphical-login/gdm is enabled or not installedmedium
      pass
      Service cde-calendar-manager is enabled, or not installedmedium
      pass
      Service svc:/application/x11/xfs is disabled or not installedmedium
      pass
      Service xvnc-inetd is enabled, or not installedmedium
      pass
      The GNOME desktop has suitable screensaver settingsmedium
      pass
      The NIS client service is disabled or not installedmedium
      pass
      The NIS server service is disabled or not installedmedium
      pass
      The r-protocols services are disabled in PAMmedium
      fail
      Service svc:/network/http:apache22 is disabled or not installedmedium
      pass
      Service svc:/network/rpc/keyserv is disabled or not installedlow
      pass
      Service svc:/network/rpc/keyserv cannot use the nobody user keymedium
      notselected
      ssh(1) is the only service binding a listener to non-loopback addressesmedium
      fail
      ssh(1) requires passwordsmedium
      fail
      rhost-based authentication in ssh(1) is disabledmedium
      pass
      root login by using ssh(1) is disabledmedium
      pass
      Service svc:/network/smtp:sendmail only listens on loopbackmedium
      pass
      The umask(1) for SMF services is 022medium
      pass
      ssh(1) does not forward X11medium
      notselected
      gdm(1M) does not accept logins without passwordshigh
      notselected
      The ftp(1) banner shows a suitable security messagemedium
      notselected
      The gdm(1M) banner shows a suitable security messagemedium
      notselected
      The ssh(1) banner shows a suitable security messagemedium
      notselected
      The telnet(1) banner shows a suitable security messagemedium
      notselected
      ftp(1) is restricted to a specific set of usersmedium
      notselected
      The tcp_wrappers feature is enabledmedium
      notselected
      Files written in ftp(1) sessions have a suitable umaskmedium
      notselected
      Tune kernel and network parameters
      Directed broadcasts are not forwardedmedium
      pass
      Responses to ICMP netmask requests are disabledmedium
      pass
      Responses to ICMP broadcast timestamp requests are disabledmedium
      pass
      Responses to ICMP timestamp requests are disabledmedium
      pass
      Source-routed packets are not forwardedmedium
      pass
      TCP reverse source routing is disabledmedium
      pass
      The maximum number of half-open TCP connections is set to the defaultmedium
      pass
      The maximum number of waiting TCP connections is set to the defaultmedium
      pass
      Responses to echo requests on multicast addresses are disabledmedium
      notselected
      Responses to ICMP echo requests on broadcast addresses are disabledmedium
      notselected
      Strict multihoming is enabledmedium
      notselected
      ICMP redirects are disabledmedium
      notselected
      Improved sequential generation for TCP packet sequence numberingmedium
      notselected
      Strong TCP packet sequence numberingmedium
      pass
      Routing daemons are disabledmedium
      notselected
      The maximum number of half-open TCP connections is at least 4096medium
      notselected
      The maximum number of waiting TCP connections is set to at least 1024medium
      notselected
      Verify user configuration 1x fail
      DICTIONBDIR is set to /var/passwdmedium
      pass
      Passwords are hashed with a secure algorithmhigh
      pass
      Password history does not log any passwordsmedium
      notselected
      Password history logs the last ten passwordsmedium
      notselected
      Passwords allow repeat charactersmedium
      pass
      Passwords require at least two alphabetic charactersmedium
      pass
      Passwords require at least three characters difference from the previous passwordmedium
      pass
      Passwords require at least four characters difference from previous passwordsmedium
      notselected
      Passwords do not impose restrictions involving digitsmedium
      notselected
      Passwords require at least one digitmedium
      notselected
      Passwords do not impose restrictions involving lowercase charactersmedium
      pass
      Passwords require a minimum of one non-alphabetic charactermedium
      pass
      Passwords do not impose restrictions involving special charactersmedium
      pass
      Passwords do not impose restrictions involving uppercase charactersmedium
      notselected
      Passwords require at least one uppercase charactermedium
      notselected
      Passwords cannot be changed for at least three weeksmedium
      notselected
      Passwords must be changed at least every 13 weeksmedium
      notselected
      NAMECHECK for passwords is set to YESmedium
      pass
      Passwords require at least six charactershigh
      pass
      Passwords require at least eight charactershigh
      notselected
      Passwords require at least 14 charactershigh
      notselected
      Passwords allow whitespacemedium
      pass
      root is a rolemedium
      notselected
      Role details are unchangedmedium
      pass
      Logins require passwordshigh
      pass
      shadow(4) password fields are not emptyhigh
      pass
      Local users are assigned home directoriesmedium
      pass
      root is the only user with UID=0medium
      pass
      All groups specified in /etc/passwd are defined in /etc/groupmedium
      pass
      Home directories for all users existmedium
      pass
      Reserved system accounts remain unusedmedium
      fail
      User home directories have appropriate permissionsmedium
      notselected
      Find and list duplicate GIDsmedium
      pass
      Find and list duplicate group namesmedium
      pass
      Find and list duplicate UIDsmedium
      pass
      Find and list duplicate usernamesmedium
      pass
      Default system accounts are lockedmedium
      pass
      Default system accounts are no-loginmedium
      notselected
      The root password is hashed with the SHA-256 algorithmhigh
      notselected
      Service svc:/network/ipfilter is enabledmedium
      notselected
      mesg(1) prevents talk(1) and write(1) access to remote terminalsmedium
      notselected
      Inactive user accounts will be locked after 35 daysmedium
      notselected
      Check various system configuration items
      The default user UMASK is 022medium
      pass
      root access is console-onlymedium
      pass
      DISABLETIME is set for loginsmedium
      pass
      SLEEPTIME following an invalid login attempt is set to 4medium
      pass
      Name services are set to all local (files) onlymedium
      notselected
      Address Space Layout Randomization (ASLR) is enabledmedium
      pass
      Booting the system should require a passwordmedium
      notselected
      Stacks are non-executablemedium
      notselected
      Remote serial logins are disabledmedium
      notselected
      Verify audit configuration
      Check all default audit propertiesmedium
      pass

      Result Details

      Package integrity is verifiedOSC-54005

      Package integrity is verified

      Rule IDOSC-54005
      Result
      fail
      Time2018-10-13T21:24:29
      Severityhigh
      Identifiers and References
      Description

      Run 'pkg verify' to check that all installed Oracle Solaris software matches the packaging database and that ownership, permissions and content are correct.

      SCE stdout
      The following packages showed errors
      pkg://solaris/cloud/openstack/neutron                                    ERROR
      pkg://solaris/system/core-os                                             ERROR
      pkg://solaris/system/kernel                                              ERROR
      pkg://solaris/system/network/ike                                         ERROR
      Run 'pkg verify' to determine the nature of the errors.
      
      Remediation description:
      'pkg verify' has produced errors. Rerun the command and evaluate the errors. As appropriate, based on errors found, you should run 'pkg fix <package-fmri>' See the pkg(1) man page.
      Remediation script:
      
          # pkg verify
          followed by
          # pkg fix <package-fmri>
            
      The OS version is currentOSC-53005

      The OS version is current

      Rule IDOSC-53005
      Result
      fail
      Time2018-10-13T21:24:45
      Severitymedium
      Identifiers and References
      Description

      Systems should be kept up to date to ensure that the latest security and operational updates are installed. You can run 'pkg update -n' to check the current state of the system against the configured repositories.

      SCE stdout
          The system is not up to date
          The system is currently at 0.5.11-0.175.3.1.0.5.2
          and the latest available is 11.4-11.4.0.0.1.15.0
      
      Remediation description:
      The system is not up to date. Update the system.
      Remediation script:
      
          # pkg update
            
      Package signature checking is globally activatedOSC-53505

      Package signature checking is globally activated

      Rule IDOSC-53505
      Result
      pass
      Time2018-10-13T21:24:47
      Severitymedium
      Identifiers and References
      Description

      Package signature checking should be globally activated.

      All local filesystems are ZFSOSC-16005

      All local filesystems are ZFS

      Rule IDOSC-16005
      Result
      pass
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      ZFS is the default filesystem for Oracle Solaris. On most systems other filesystem types should not be mounted. See the zfs(7FS) man page.

      Find and list files with extended attributesOSC-15000

      Find and list files with extended attributes

      Rule IDOSC-15000
      Result
      notselected
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      Oracle Solaris implements extended attributes as files in an "extended attribute" name space visible only by using extended attribute aware commands. It is possible for attackers or malicious users to hide information in the extended attribute name space. Oracle Solaris currently does not ship any files with extended attributes. See the runat(1) and fsattr(5) man pages.

      SCE stdout
      
              
      Find and list files with no known ownerOSC-14000

      Find and list files with no known owner

      Rule IDOSC-14000
      Result
      notselected
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      Files with no owner should be removed. Accounts that are closed should be archived and removed from the system.

      SCE stdout
      
              
      Find and list .forward filesOSC-90000

      Find and list .forward files

      Rule IDOSC-90000
      Result
      pass
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      .forward files can provide easy transport of information outside the firewall or outside the user's home directory.

      Find and list .netrc filesOSC-90500

      Find and list .netrc files

      Rule IDOSC-90500
      Result
      pass
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      The .netrc file contains data for logging in to a remote host over the network for file transfers by FTP.

      Find and list suid and sgid files other than those in standard Oracle Solaris packagesOSC-13500

      Find and list suid and sgid files other than those in standard Oracle Solaris packages

      Rule IDOSC-13500
      Result
      notselected
      Time2018-10-13T21:24:48
      Severityhigh
      Identifiers and References
      Description

      Programs that set the UID and GID offer entry points for malicious code.

      SCE stdout
      
              
      Find and list .rhosts filesOSC-91505

      Find and list .rhosts files

      Rule IDOSC-91505
      Result
      pass
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      .rhosts files can provide easy access to remote hosts by bypassing the password requirement. These files should be removed.

      swap(1M) is encryptedOSC-78000

      swap(1M) is encrypted

      Rule IDOSC-78000
      Result
      notselected
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      Swap space, either a ZFS volume or raw device, should be encrypted. Encryption ensures that any sensitive data, such as user passwords, are protected if the system needs to swap those pages out to disk. See the swap(1M) man page.

      Non-root ZFS filesystems are encryptedOSC-17000

      Non-root ZFS filesystems are encrypted

      Rule IDOSC-17000
      Result
      notselected
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      All ZFS file systems that are not the root file system should be encrypted. Encryption must be applied at filesystem creation. You must remember the encryption passphrase. Store it in a safe place. See the zfs(1M) and zfs_encrypt(1M) man pages.

      SCE stdout
      
              
      A size limit is set on tmpfs(7FS)OSC-16500

      A size limit is set on tmpfs(7FS)

      Rule IDOSC-16500
      Result
      notselected
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      The size of the tmpfs file system is not limited by default. To avoid a performance impact, you can limit the size of each tmpfs mount. See the mount_tmpfs(1M) and vfstab(4) man pages.

      World-writable directories have sticky bit setOSC-14500

      World-writable directories have sticky bit set

      Rule IDOSC-14500
      Result
      notselected
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      The sticky bit on a directory prevents files in a world-writable directory from being deleted or moved by anyone except the owner of the file, or root. This is useful in directories that are common to many users, such as the /tmp directory.

      coreadm(1M) configuration is correctOSC-07500

      coreadm(1M) configuration is correct

      Rule IDOSC-07500
      Result
      notselected
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      Core dumps can contain sensitive data. Protections can include file permissions and logging core dump events. See the coreadm(1m) and chmod(1M) man pages.

      SCE stdout
      
              
      /etc/motd and /etc/issue contain appropriate policy textOSC-35000

      /etc/motd and /etc/issue contain appropriate policy text

      Rule IDOSC-35000
      Result
      notselected
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      The /etc/issue and /etc/motd (message of the day) files are designed to hold system and security information. The contents of the /etc/issue file are displayed prior to the login prompt on the console, or in a window if the file is called from the GNOME Display Manager (gdm). Several applications call this file, such as Secure Shell and FTP. The /etc/motd contents are displayed after login. By default, the /etc/motd file exists while the /etc/issue file does not. See the issue(4), gdm(1M), and sshd_config(4) man pages.

      Service svc:/system/coreadm is enabledOSC-07011

      Service svc:/system/coreadm is enabled

      Rule IDOSC-07011
      Result
      pass
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      The coreadm service manages the core files that are produced by processes that terminate abnormally. See the core(4) and coreadm(1M) man pages.

      Service svc:/system/cron is enabledOSC-08011

      Service svc:/system/cron is enabled

      Rule IDOSC-08011
      Result
      pass
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      The cron service manages the cron(1M) command, which runs processes that execute commands at specified dates and times. See the at(1), crontab(1), and cron(1M) man pages.

      Service svc:/system/cryptosvc is enabledOSC-09011

      Service svc:/system/cryptosvc is enabled

      Rule IDOSC-09011
      Result
      pass
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      The cryptosvc service manages the use of cryptographic mechanisms from the Cryptographic Framework feature of Oracle Solaris. See the cryptoadm(1M) man page.

      Service svc:/system/dbus is enabledOSC-10011

      Service svc:/system/dbus is enabled

      Rule IDOSC-10011
      Result
      pass
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      The dbus service manages the D-Bus message bus daemon. Programs use the message bus daemon to exchange messages with one another. For example, the Hardware Abstraction Layer (HAL) uses dbus. See the dbus-daemon(1) and hal(5) man pages.

      Service svc:/system/hal is enabled in global zoneOSC-21511

      Service svc:/system/hal is enabled in global zone

      Rule IDOSC-21511
      Result
      pass
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      The Hardware Abstraction Layer (HAL) service manages dynamic hardware configuration changes. See the hal(5) man page. This service only runs in the global zone.

      Service svc:/system/identity:domain is enabledOSC-22011

      Service svc:/system/identity:domain is enabled

      Rule IDOSC-22011
      Result
      pass
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      The identity:domain service instance manages system identity. See the domainname(1M) man page.

      Service svc:/system/intrd is enabled in global zoneOSC-27011

      Service svc:/system/intrd is enabled in global zone

      Rule IDOSC-27011
      Result
      pass
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      The interrupt balancer (intrd) service monitors the assignments between interrupts and CPUs to ensure optimal performance. See the intrd(1M) man page. This service only runs in the global zone.

      Service svc:/system/keymap is enabled in global zoneOSC-28511

      Service svc:/system/keymap is enabled in global zone

      Rule IDOSC-28511
      Result
      pass
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      The keymap service manages the default configuration of the keyboard. See the kbd(1) man page. This service only runs in the global zone.

      Service svc:/system/picl is enabled in global zoneOSC-52511

      Service svc:/system/picl is enabled in global zone

      Rule IDOSC-52511
      Result
      pass
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      The platform information and control (picl) service manages the publishing of platform configuration information that can respond to client requests for information about the configuration. See the picld(1M) and prtcpicl(1M) man pages. This service only runs in the global zone.

      Service svc:/system/scheduler is enabled in global zoneOSC-67011

      Service svc:/system/scheduler is enabled in global zone

      Rule IDOSC-67011
      Result
      pass
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      The system/scheduler service manages the process scheduler. See the dispadmin(1M) man page. This service only runs in the global zone.

      Service svc:/system/system-log is enabledOSC-78511

      Service svc:/system/system-log is enabled

      Rule IDOSC-78511
      Result
      pass
      Time2018-10-13T21:24:48
      Severitymedium
      Identifiers and References
      Description

      The system-log service reads and forwards system messages to the appropriate log files or users. See the syslogd(1M) and rsyslogd(1M) man pages.

      Service svc:/system/utmp is enabledOSC-95011

      Service svc:/system/utmp is enabled

      Rule IDOSC-95011
      Result
      pass
      Time2018-10-13T21:24:49
      Severitymedium
      Identifiers and References
      Description

      The utmp service manages a table of processes, detects when a process has terminated, and updates the table. See the utmpd(1M) man page.

      Service svc:/system/zones is enabled in global zoneOSC-97511

      Service svc:/system/zones is enabled in global zone

      Rule IDOSC-97511
      Result
      pass
      Time2018-10-13T21:24:49
      Severitymedium
      Identifiers and References
      Description

      The zones service manages the autoboot and graceful shutdown of zones. See the zones(5) and zonecfg(1M) man pages. This service only runs in the global zone.

      Service svc:/system/zones-install is enabledOSC-98011

      Service svc:/system/zones-install is enabled

      Rule IDOSC-98011
      Result
      pass
      Time2018-10-13T21:24:49
      Severitymedium
      Identifiers and References
      Description

      The zones-install service manages the auto-installation of zones.

      Service svc:/network/rpc/bind is enabledOSC-62011

      Service svc:/network/rpc/bind is enabled

      Rule IDOSC-62011
      Result
      pass
      Time2018-10-13T21:24:49
      Severitymedium
      Identifiers and References
      Description

      The rpc/bind service manages the conversion of RPC program numbers to universal addresses. See the rpcbind(1M) man page.

      Service svc:/system/name-service/switch is enabledOSC-36011

      Service svc:/system/name-service/switch is enabled

      Rule IDOSC-36011
      Result
      pass
      Time2018-10-13T21:24:49
      Severitymedium
      Identifiers and References
      Description

      The name-service/switch service manages the databases that contain information about hosts, users, and groups. See the nsswitch.conf(4) man page.

      Service svc:/system/name-service/cache is enabledOSC-35511

      Service svc:/system/name-service/cache is enabled

      Rule IDOSC-35511
      Result
      pass
      Time2018-10-13T21:24:49
      Severitymedium
      Identifiers and References
      Description

      The name-service/cache service manages the caching of name service information. See the nscd(1M) man page.

      Service svc:/network/nfs/status is disabled or not installedOSC-40010

      Service svc:/network/nfs/status is disabled or not installed

      Rule IDOSC-40010
      Result
      pass
      Time2018-10-13T21:24:49
      Severitylow
      Identifiers and References
      Description

      The NFS status monitor service interacts with lockd(1M) to provide the crash and recovery functions for the locking services on NFS.

      Service svc:/network/nfs/nlockmgr is disabled or not installedOSC-38510

      Service svc:/network/nfs/nlockmgr is disabled or not installed

      Rule IDOSC-38510
      Result
      pass
      Time2018-10-13T21:24:49
      Severitylow
      Identifiers and References
      Description

      The NFS lock manager supports record locking operations on NFS files in NFSv2 and NFSv3. See the lockd(1M) and sharectl(1M) man pages.

      Service svc:/network/nfs/client is disabled or not installedOSC-37510

      Service svc:/network/nfs/client is disabled or not installed

      Rule IDOSC-37510
      Result
      pass
      Time2018-10-13T21:24:49
      Severitylow
      Identifiers and References
      Description

      The NFS client service is needed only if the system is mounting files from an NFS server. If the system is not mounting files, the service can be disabled or its package unistalled. See the mount_nfs(1M) man page.

      Service svc:/network/nfs/server is disabled or not installedOSC-39510

      Service svc:/network/nfs/server is disabled or not installed

      Rule IDOSC-39510
      Result
      pass
      Time2018-10-13T21:24:49
      Severitylow
      Identifiers and References
      Description

      The NFS server service handles client file system requests over NFS versions 2, 3, and 4. If this system is not an NFS server, this service should be disabled. See the nfsd(1M) man page.

      Service svc:/network/nfs/fedfs-client is disabled or not installedOSC-12510

      Service svc:/network/nfs/fedfs-client is disabled or not installed

      Rule IDOSC-12510
      Result
      fail
      Time2018-10-13T21:24:49
      Severitymedium
      Identifiers and References
      Description

      The Federated Filesystem (FedFS) client service manages defaults and connection information for LDAP servers that store FedFS information. See the nsdbparams(1M) and fedfs(5) man pages.

      Remediation description:
      If you are either not using FedFS for DNS SRV records or LDAP-based referrals, disable the service.
      Remediation script:
      
          # svcadm disable svc:/network/nfs/fedfs-client
            
      Service svc:/network/nfs/rquota is disabled or not installedOSC-39010

      Service svc:/network/nfs/rquota is disabled or not installed

      Rule IDOSC-39010
      Result
      pass
      Time2018-10-13T21:24:49
      Severitylow
      Identifiers and References
      Description

      The remote quota server returns quotas for a user of a local file system which is mounted over NFS. The results are used by quota(1M) to display user quotas for remote file systems. The rquotad(1M) daemon is normally invoked by inetd(1M).

      Service svc:/network/nfs/cbd is disabled or not installedOSC-37010

      Service svc:/network/nfs/cbd is disabled or not installed

      Rule IDOSC-37010
      Result
      pass
      Time2018-10-13T21:24:49
      Severitylow
      Identifiers and References
      Description

      This service manages communication endpoints for the NFS Version 4 protocol. The nfs4cbd(1M) daemon runs on the NFS Version 4 client and creates a listener port for callbacks.

      Service svc:/network/nfs/mapid is disabled or not installedOSC-38010

      Service svc:/network/nfs/mapid is disabled or not installed

      Rule IDOSC-38010
      Result
      pass
      Time2018-10-13T21:24:49
      Severitylow
      Identifiers and References
      Description

      The NFS user and group ID mapping daemon service maps to and from NFS version 4 owner and owner_group identification attributes and local UID and GID numbers used by both the NFS version 4 client and server. See the nfsmapid(1M) man page.

      Service svc:/network/smb/client is disabled or not installedOSC-70510

      Service svc:/network/smb/client is disabled or not installed

      Rule IDOSC-70510
      Result
      pass
      Time2018-10-13T21:24:49
      Severitymedium
      Identifiers and References
      Description

      The SMB/CIFS client allows an Oracle Solaris system to natively mount file systems by means of SMB shares from SMB enabled servers such as a Windows system. See the mount_smbfs(1M) man page.

      Service svc:/network/ftp is disabled or not installedOSC-17510

      Service svc:/network/ftp is disabled or not installed

      Rule IDOSC-17510
      Result
      pass
      Time2018-10-13T21:24:49
      Severityhigh
      Identifiers and References
      Description

      The FTP service provides unencrypted file transfer service and uses plain text authentication. The secure copy program (scp(1)) program should be used instead of FTP as it provides encrypted authentication and file transfer.

      Service svc:/network/ssh is enabledOSC-72011

      Service svc:/network/ssh is enabled

      Rule IDOSC-72011
      Result
      pass
      Time2018-10-13T21:24:49
      Severitymedium
      Identifiers and References
      Description

      The ssh service manages the Secure Shell (ssh) daemon, which provides secure encrypted communications between two untrusted hosts over an insecure network. By default, ssh is the only network service that can send and receive network packets on a newly-installed Oracle Solaris system. See the sshd(1M) man page.

      Service svc:/network/smtp:sendmail is enabledOSC-67511

      Service svc:/network/smtp:sendmail is enabled

      Rule IDOSC-67511
      Result
      pass
      Time2018-10-13T21:24:49
      Severitymedium
      Identifiers and References
      Description

      The sendmail service should be running. Otherwise, important system mail to root will not be delivered. If receipt of remote mail is not required, sendmail should be in local_only mode. See check OSC-68505-sendmail-local-only to verify that sendmail is running in local_only mode. See the sendmail(1M) man page.

      Service svc:/network/sendmail-client is enabledOSC-68011

      Service svc:/network/sendmail-client is enabled

      Rule IDOSC-68011
      Result
      pass
      Time2018-10-13T21:24:49
      Severitymedium
      Identifiers and References
      Description

      The sendmail-client service manages email on a client. The sendmail-client service needs to be running to ensure delivery of mail to local accounts such as root. See the sendmail(1M) man page.

      Service svc:/network/inetd is enabledOSC-26511

      Service svc:/network/inetd is enabled

      Rule IDOSC-26511
      Result
      pass
      Time2018-10-13T21:24:49
      Severitymedium
      Identifiers and References
      Description

      The inetd service manages the restarting of inet services. See the inetd(1M) man page.

      Service svc:/system/filesystem/autofs is enabledOSC-03511

      Service svc:/system/filesystem/autofs is enabled

      Rule IDOSC-03511
      Result
      pass
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      The autofs service manages the mount points for the automount(1M) daemon.

      Service svc:/system/filesystem/rmvolmgr is disabled or not installedOSC-58510

      Service svc:/system/filesystem/rmvolmgr is disabled or not installed

      Rule IDOSC-58510
      Result
      notselected
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      The removable volume manager is a HAL-aware volume manager that can automatically mount and unmount removable media and hot-pluggable storage. Users might import malicious programs, or transfer sensitive data off the system. See the rmvolmgr(1M) man page. This service only runs in the global zone.

      Service svc:/system/filesystem/rmvolmgr is enabledOSC-58511

      Service svc:/system/filesystem/rmvolmgr is enabled

      Rule IDOSC-58511
      Result
      notselected
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      The removable volume manager is a HAL-aware volume manager that can automatically mount and unmount removable media and hot-pluggable storage. Users might import malicious programs, or transfer sensitive data off the system. See the rmvolmgr(1M) man page.

      Service svc:/system/power management is enabled in global zoneOSC-54511

      Service svc:/system/power management is enabled in global zone

      Rule IDOSC-54511
      Result
      pass
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      The system/power service manages the power management configuration of an Oracle Solaris system. See the poweradm(1M) man page. This service only runs in the global zone.

      Service svc:/network/dns/multicast is disabled or not installedOSC-80010

      Service svc:/network/dns/multicast is disabled or not installed

      Rule IDOSC-80010
      Result
      pass
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      Multicast DNS (mDNS) implements DNS in a small network where no conventional DNS server has been installed. DNS Service Discovery (DNS-SD) extends multicast DNS to also provide simple service discovery (network browsing). This service is disabled by default, because while it can ease finding hosts and servers, it can also provide information about the network to malicious users. See the named(1M) and mdnsd(1M) man pages.

      Service svc:/network/dhcp-server is disabled or not installedOSC-10510

      Service svc:/network/dhcp-server is disabled or not installed

      Rule IDOSC-10510
      Result
      pass
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      By default, the dhcp-server service is not installed. If you are not using this system as a DHCP server, you should not install or enable the service.

      Service svc:/network/ntp is enabled and properly configured as a clientOSC-42011

      Service svc:/network/ntp is enabled and properly configured as a client

      Rule IDOSC-42011
      Result
      notselected
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      The Network Time Protocol daemon should be enabled and properly configured as a client. The /etc/inet/ntp.conf file must include at least one server definition. The file should also contain the line "restrict default ignore" to prevent the client from also acting as a server.

      Service svc:/network/rarp is disabled or not installedOSC-55510

      Service svc:/network/rarp is disabled or not installed

      Rule IDOSC-55510
      Result
      pass
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      This legacy service responds to DARPA reverse address resolution protocol (RARP) requests. Historically, RARP was used by machines at boot time to discover their Internet Protocol (IP) address. By default, this service is not installed. See the rarpd(1M) and rarp(7P) man pages.

      Service svc:/network/slp is disabled or not installedOSC-70010

      Service svc:/network/slp is disabled or not installed

      Rule IDOSC-70010
      Result
      pass
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      This legacy service provides common server functionality for the Service Location Protocol (SLP) versions 1 and 2, as defined by IETF in RFC 2165 and RFC 2608. SLP discovers and selects network services. By default, this service is not enabled. See the slpd(1M), slp.conf(4), and slp(7P) man pages.

      Service svc:/network/security/kadmin is disabled or not installedOSC-28010

      Service svc:/network/security/kadmin is disabled or not installed

      Rule IDOSC-28010
      Result
      pass
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      The Kerberos administration daemon service runs on the master key distribution center (KDC), which stores the principal and policy databases. This service should not be run on a system that is not a KDC. See the kadmind(1M) man page.

      Service svc:/network/security/krb5_prop is disabled or not installedOSC-30510

      Service svc:/network/security/krb5_prop is disabled or not installed

      Rule IDOSC-30510
      Result
      pass
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      The Kerberos propagation daemon runs on slave KDC servers to update the database from the master KDC. See the kpropd(1M) man page.

      Service svc:/network/security/krb5kdc is disabled or not installedOSC-31010

      Service svc:/network/security/krb5kdc is disabled or not installed

      Rule IDOSC-31010
      Result
      pass
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      The Kerberos key distribution center service manages Kerberos tickets on the master and slave KDCs. See the krb5kdc(1M) man page.

      Service svc:/application/management/net-snmp is disabled or not installedOSC-71010

      Service svc:/application/management/net-snmp is disabled or not installed

      Rule IDOSC-71010
      Result
      pass
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      The Simple Network Management Protocol (SNMP) is a widely used protocol for monitoring the health and welfare of network equipment. The net-snmp SNMP daemon processes requests from SNMP management software. See the snmpd(8) and snmp_config(5) man pages.

      Service svc:/application/cups/in-lpd is disabled or not installedOSC-34010

      Service svc:/application/cups/in-lpd is disabled or not installed

      Rule IDOSC-34010
      Result
      pass
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      This service supports the CUPS Line Printer Daemon (LPD) for legacy client systems that use the LPD protocol. By default, this service is not installed. See the cups-lpd(8) man page.

      Service svc:/application/stosreg is enabled in global zoneOSC-77011

      Service svc:/application/stosreg is enabled in global zone

      Rule IDOSC-77011
      Result
      notselected
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      The service tag OS registry inserter (stosreg) service manages the service tag registry. See the stclient(1M) man page. This service only runs in the global zone.

      Service svc:/system/ocm is enabledOSC-43011

      Service svc:/system/ocm is enabled

      Rule IDOSC-43011
      Result
      notselected
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      The Oracle Configuration Manager (ocm) service collects configuration information and uploads it to the Oracle repository. See the configCCR(1M) man page.

      Service svc:/network/finger is disabled or not installedOSC-15510

      Service svc:/network/finger is disabled or not installed

      Rule IDOSC-15510
      Result
      pass
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      This legacy service enables users to display information about local and remote users. By default, this service is not installed as part of solaris-small-server. It is however installed as part of solaris-large-server. This service is almost never needed and either should be removed or at least, disabled. See the fingerd(1M) and finger(1) man pages.

      Service svc:/network/login:rlogin is disabled or not installedOSC-58010

      Service svc:/network/login:rlogin is disabled or not installed

      Rule IDOSC-58010
      Result
      pass
      Time2018-10-13T21:24:50
      Severityhigh
      Identifiers and References
      Description

      This legacy service enables users to log in remotely. By default, this service is not installed as part of solaris-small-server. See the rlogind(1M) and rlogin(1) man pages.

      Service svc:/network/login:klogin is disabled or not installedOSC-30010

      Service svc:/network/login:klogin is disabled or not installed

      Rule IDOSC-30010
      Result
      pass
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      This service enables users to log in remotely with Kerberos authentication. By default, this service is not installed. See the rlogind(1M) and rlogin(1) man pages.

      Service svc:/network/login:eklogin is disabled or not installedOSC-12010

      Service svc:/network/login:eklogin is disabled or not installed

      Rule IDOSC-12010
      Result
      pass
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      This service enables users to log in remotely with Kerberos authentication over an encrypted line. By default, this service is not installed. See the rlogind(1M) and rlogin(1) man pages.

      Service svc:/network/shell:default is disabled or not installedOSC-69510

      Service svc:/network/shell:default is disabled or not installed

      Rule IDOSC-69510
      Result
      pass
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      The remote shell daemon provides remote execution facilities with authentication based on Kerberos V5 or privileged port numbers. The Secure Shell service, svc:/network/ssh, is the best choice for remote execution. See the rshd(1M) and sshd(1M) man pages.

      Service svc:/network/shell:kshell is disabled or not installedOSC-31510

      Service svc:/network/shell:kshell is disabled or not installed

      Rule IDOSC-31510
      Result
      pass
      Time2018-10-13T21:24:50
      Severitymedium
      Identifiers and References
      Description

      The remote shell daemon provides remote execution facilities with authentication based on Kerberos V5 or privileged port numbers. The Secure Shell service, svc:/network/ssh, is the best choice for remote execution. See the rshd(1M) and sshd(1M) man pages.

      Service svc:/network/telnet is disabled or not installedOSC-88510

      Service svc:/network/telnet is disabled or not installed

      Rule IDOSC-88510
      Result
      pass
      Time2018-10-13T21:24:50
      Severityhigh
      Identifiers and References
      Description

      This legacy service supports the DARPA standard TELNET virtual terminal protocol to connect to a remote system over the TELNET port. By default, this service is not installed. See the telnetd(1M) and telnet(1) man pages.

      Service svc:/network/uucp is disabled or not installedOSC-95510

      Service svc:/network/uucp is disabled or not installed

      Rule IDOSC-95510
      Result
      pass
      Time2018-10-13T21:24:50
      Severityhigh
      Identifiers and References
      Description

      This legacy service, UNIX to UNIX copy, provides a user interface for requesting file copy operations, typically used when constant connectivity is not possible. By default, this service is not installed. See the uucpd(1M) and uucp(1C) man pages.

      Service svc:/network/chargen:stream is disabled or not installedOSC-06020

      Service svc:/network/chargen:stream is disabled or not installed

      Rule IDOSC-06020
      Result
      pass
      Time2018-10-13T21:24:50
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Character Generator Protocol (RFC 864) for TCP. See the in.chargend(1M) man page.

      Service svc:/network/chargen:dgram is disabled or not installedOSC-06010

      Service svc:/network/chargen:dgram is disabled or not installed

      Rule IDOSC-06010
      Result
      pass
      Time2018-10-13T21:24:50
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Character Generator Protocol (RFC 864) for UDP. See the in.chargend(1M) man page.

      Service svc:/network/daytime:stream is disabled or not installedOSC-09520

      Service svc:/network/daytime:stream is disabled or not installed

      Rule IDOSC-09520
      Result
      pass
      Time2018-10-13T21:24:50
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Daytime Protocol (RFC 867) for TCP. See the in.daytimed(1M) man page.

      Service svc:/network/daytime:dgram is disabled or not installedOSC-09510

      Service svc:/network/daytime:dgram is disabled or not installed

      Rule IDOSC-09510
      Result
      pass
      Time2018-10-13T21:24:51
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Daytime Protocol (RFC 867) for UDP. See the in.daytimed(1M) man page.

      Service svc:/network/discard:stream is disabled or not installedOSC-11020

      Service svc:/network/discard:stream is disabled or not installed

      Rule IDOSC-11020
      Result
      pass
      Time2018-10-13T21:24:51
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Discard Protocol (RFC 863) for TCP. See the in.discardd(1M) man page.

      Service svc:/network/discard:dgram is disabled or not installedOSC-11010

      Service svc:/network/discard:dgram is disabled or not installed

      Rule IDOSC-11010
      Result
      pass
      Time2018-10-13T21:24:51
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Discard Protocol (RFC 863) for UDP. See the in.discardd(1M) man page.

      Service svc:/network/echo:stream is disabled or not installedOSC-11520

      Service svc:/network/echo:stream is disabled or not installed

      Rule IDOSC-11520
      Result
      pass
      Time2018-10-13T21:24:51
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Echo Protocol (RFC 862) for TCP. See the in.echod(1M) man page.

      Service svc:/network/echo:dgram is disabled or not installedOSC-11510

      Service svc:/network/echo:dgram is disabled or not installed

      Rule IDOSC-11510
      Result
      pass
      Time2018-10-13T21:24:51
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Echo Protocol (RFC 862) for UDP. See the in.echod(1M) man page.

      Service svc:/network/time:stream is disabled or not installedOSC-89520

      Service svc:/network/time:stream is disabled or not installed

      Rule IDOSC-89520
      Result
      pass
      Time2018-10-13T21:24:51
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Time Protocol (RFC 868) for TCP. See the in.timed(1M) man page.

      Service svc:/network/time:dgram is disabled or not installedOSC-89510

      Service svc:/network/time:dgram is disabled or not installed

      Rule IDOSC-89510
      Result
      pass
      Time2018-10-13T21:24:51
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Time Protocol (RFC 868) for UDP. See the in.timed(1M) man page.

      Service svc:/network/comsat is disabled or not installedOSC-06510

      Service svc:/network/comsat is disabled or not installed

      Rule IDOSC-06510
      Result
      pass
      Time2018-10-13T21:24:51
      Severityhigh
      Identifiers and References
      Description

      This legacy service process listens for reports of incoming mail and notifies interested users. By default, this service is not installed as part of solaris-small-server. See the comsat(1M) man page.

      Service svc:/network/rexec is disabled or not installedOSC-57510

      Service svc:/network/rexec is disabled or not installed

      Rule IDOSC-57510
      Result
      pass
      Time2018-10-13T21:24:51
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides remote execution facilities with authentication based on user names and passwords. See the in.rexecd(1M) and rexec(3C) man pages.

      Service svc:/network/talk is disabled or not installedOSC-79010

      Service svc:/network/talk is disabled or not installed

      Rule IDOSC-79010
      Result
      pass
      Time2018-10-13T21:24:51
      Severityhigh
      Identifiers and References
      Description

      This legacy program enables two-way, screen-oriented communication. For more information, see the talk(1) and mesg(1) man pages.

      Service svc:/network/stdiscover is disabled or not installedOSC-76010

      Service svc:/network/stdiscover is disabled or not installed

      Rule IDOSC-76010
      Result
      pass
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      This legacy program is used to locate the service tag listener. For more information, see the in.stdiscover(1M) man page.

      Service svc:/network/stlisten is disabled or not installedOSC-76510

      Service svc:/network/stlisten is disabled or not installed

      Rule IDOSC-76510
      Result
      pass
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      This legacy program is used to listen for discovery probes. See the in.stlisten(1M) man page.

      Service svc:/network/rpc/gss is disabledOSC-62510

      Service svc:/network/rpc/gss is disabled

      Rule IDOSC-62510
      Result
      notselected
      Time2018-10-13T21:24:51
      Severity
      Identifiers and References
      Description

      The generic security service (gss) service manages the generation and validation of Generic Security Service Application Program Interface (GSS-API) security tokens. The gssd(1M) daemon operates between the kernel rpc and the GSS-API.

      Service svc:/network/rpc/gss is enabledOSC-62511

      Service svc:/network/rpc/gss is enabled

      Rule IDOSC-62511
      Result
      notselected
      Time2018-10-13T21:24:51
      Severity
      Identifiers and References
      Description

      The generic security service (gss) service manages the generation and validation of Generic Security Service Application Program Interface (GSS-API) security tokens. The gssd(1M) daemon operates between the kernel rpc and the GSS-API.

      Service svc:/network/rpc/gss is enabled if and only if Kerberos is configuredOSC-63005

      Service svc:/network/rpc/gss is enabled if and only if Kerberos is configured

      Rule IDOSC-63005
      Result
      fail
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      The generic security service (gss) service manages the generation and validation of Generic Security Service Application Program Interface (GSS-API) security tokens. The gssd(1M) daemon operates between the kernel rpc and the GSS-API. Kerberos uses this service.

      Remediation description:
      Disable the rpc/gss service if Kerberos is not configured and not in use.
      Remediation script:
      
          # svcadm enable rpc/gss
            
      Service svc:/network/rpc/mdcommd is disabled, or not installedOSC-63510

      Service svc:/network/rpc/mdcommd is disabled, or not installed

      Rule IDOSC-63510
      Result
      notselected
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      rpc.mdcommd is an rpc(4) daemon that functions as a server process. rpc.mdcommd manages communication among hosts participating in a multi-node disk set configuration. rpc.mdcommd is invoked by inetd(1M).

      Service svc:/network/rpc/mdcommd is enabledOSC-63511

      Service svc:/network/rpc/mdcommd is enabled

      Rule IDOSC-63511
      Result
      notselected
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      rpc.mdcommd(1M) is an rpc(4) daemon that functions as a server process. rpc.mdcommd(1M) manages communication among hosts participating in a multi-node disk set configuration. rpc.mdcommd is invoked by inetd(1M).

      Service svc:/network/rpc/smserver is disabled or not installedOSC-65510

      Service svc:/network/rpc/smserver is disabled or not installed

      Rule IDOSC-65510
      Result
      notselected
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      This program is used to access removable media devices. See the rpc.smserverd(1M) man page.

      Service svc:/network/rpc/smserver is enabledOSC-65511

      Service svc:/network/rpc/smserver is enabled

      Rule IDOSC-65511
      Result
      notselected
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      This program is used to access removable media devices. See the rpc.smserverd(1M) man page.

      Service svc:/network/security/ktkt_warn is disabled or not installedOSC-32010

      Service svc:/network/security/ktkt_warn is disabled or not installed

      Rule IDOSC-32010
      Result
      notselected
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      The Kerberos V5 warning messages daemon on Kerberos clients can warn users when their Kerberos tickets are about to expire and can renew the tickets before they expire. By default, this service is disabled. If the system is Kerberos client, then this service should be enabled. See the ktkt_warnd(1M) man page.

      Service svc:/network/security/ktkt_warn is enabledOSC-32011

      Service svc:/network/security/ktkt_warn is enabled

      Rule IDOSC-32011
      Result
      notselected
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      The Kerberos V5 warning messages daemon on Kerberos clients can warn users when their Kerberos tickets are about to expire and can renew the tickets before they expire. By default, this service is disabled. See the ktkt_warnd(1M) man page.

      Service svc:/network/rpc/rstat is disabled or not installedOSC-66010

      Service svc:/network/rpc/rstat is disabled or not installed

      Rule IDOSC-66010
      Result
      pass
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      This legacy service displays performance data from a remote system. By default, this service is not installed. See the rstatd(1M) and rstat(3RPC) man pages.

      Service svc:/network/rpc/rusers is disabled or not installedOSC-66510

      Service svc:/network/rpc/rusers is disabled or not installed

      Rule IDOSC-66510
      Result
      pass
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      This legacy service displays information about users on a remote system. By default, this service is not installed. See the rusersd(1M) and rusers(1) man pages.

      Service svc:/network/rpc/meta is disabled or not installedOSC-64010

      Service svc:/network/rpc/meta is disabled or not installed

      Rule IDOSC-64010
      Result
      pass
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      This legacy service uses an rpc(4) daemon to manage local copies of metadevice diskset information. By default, this service is not installed. See the rpc.metad(1M) man page.

      Service svc:/network/rpc/metamed is disabled or not installedOSC-64510

      Service svc:/network/rpc/metamed is disabled or not installed

      Rule IDOSC-64510
      Result
      pass
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      This legacy service manages mediator information for 2-string high availability configurations. See the rpc.metamedd(1M) man page.

      Service svc:/network/rpc/metamh is disabled or not installedOSC-65010

      Service svc:/network/rpc/metamh is disabled or not installed

      Rule IDOSC-65010
      Result
      pass
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      This legacy service uses an rpc(4) daemon to manage multi-hosted disks. By default, this service is not installed. See the rpc.metamhd(1M) man page.

      Service svc:/network/rpc/rex is disabled or not installedOSC-57010

      Service svc:/network/rpc/rex is disabled or not installed

      Rule IDOSC-57010
      Result
      pass
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      This program is the Oracle Solaris RPC server for remote program execution. If this service is enabled, the daemon is started by inetd(1M) whenever a remote execution request is made. See the rpc.rexd(1M) man page.

      Service svc:/network/rpc/spray is disabled or not installedOSC-71510

      Service svc:/network/rpc/spray is disabled or not installed

      Rule IDOSC-71510
      Result
      pass
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      This program is a server that records the packets sent by spray(1M). See the rpc.sprayd(1M) man page.

      Service svc:/network/rpc/wall is disabled or not installedOSC-96510

      Service svc:/network/rpc/wall is disabled or not installed

      Rule IDOSC-96510
      Result
      pass
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      This program broadcasts messages to all logged-in users. See the rpc.rwalld(1M) and wall(1M) man pages.

      Service svc:/system/avahi-bridge-dsd is disabled or not installedOSC-04010

      Service svc:/system/avahi-bridge-dsd is disabled or not installed

      Rule IDOSC-04010
      Result
      pass
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      This program provides an object-oriented interface to DBUS-enabled applications. See the avahi-daemon-bridge-dsd(1) man page.

      Service cde-ttdbserver is enabled, or not installedOSC-05511

      Service cde-ttdbserver is enabled, or not installed

      Rule IDOSC-05511
      Result
      pass
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      The rpc.ttdbserver service is part of the Common Desktop Environment (CDE) which predates the use of GNOME in Solaris. If you are running CDE, then you should enable its services. You should have good reasons to choose CDE over GNOME as your desktop environment.

      Service svc:/application/graphical-login/gdm is enabled or not installedOSC-19511

      Service svc:/application/graphical-login/gdm is enabled or not installed

      Rule IDOSC-19511
      Result
      pass
      Time2018-10-13T21:24:51
      Severitymedium
      Identifiers and References
      Description

      The GNOME Display Manager manages the displays on a system, including the console display, attached displays, XDMCP displays, and virtual terminals. If a windowing display is needed and installed, this service should be enabled. See the gdm(1M) man page.

      Service cde-calendar-manager is enabled, or not installedOSC-05011

      Service cde-calendar-manager is enabled, or not installed

      Rule IDOSC-05011
      Result
      pass
      Time2018-10-13T21:24:52
      Severitymedium
      Identifiers and References
      Description

      The cde-calendar-manager service is part of the Common Desktop Environment (CDE) which predates the use of GNOME in Solaris. If you are running CDE, then you should enable its services. You should have good reasons to choose CDE over GNOME as your desktop environment.

      Service svc:/application/x11/xfs is disabled or not installedOSC-97010

      Service svc:/application/x11/xfs is disabled or not installed

      Rule IDOSC-97010
      Result
      pass
      Time2018-10-13T21:24:52
      Severitymedium
      Identifiers and References
      Description

      This program provides fonts to X Window System display servers. The server is usually run by inetd(1M). See the xfs(1) and fsadmin(1) man pages.

      Service xvnc-inetd is enabled, or not installedOSC-96011

      Service xvnc-inetd is enabled, or not installed

      Rule IDOSC-96011
      Result
      pass
      Time2018-10-13T21:24:52
      Severitymedium
      Identifiers and References
      Description

      The xvnc-inetd service runs the X VNC server from inetd(1M). See the Xvnc(1) man page.

      The GNOME desktop has suitable screensaver settingsOSC-21000

      The GNOME desktop has suitable screensaver settings

      Rule IDOSC-21000
      Result
      pass
      Time2018-10-13T21:24:52
      Severitymedium
      Identifiers and References
      Description

      The timeout parameter for the xscreensaver application specifies the amount of time that the keyboard and mouse can be inactive before a password-protected screensaver appears. See the xscreensaver(1) man page.

      The NIS client service is disabled or not installedOSC-40510

      The NIS client service is disabled or not installed

      Rule IDOSC-40510
      Result
      pass
      Time2018-10-13T21:24:52
      Severitymedium
      Identifiers and References
      Description

      By default, NIS client software is not installed. NIS is an RPC-based naming service that does not conform to current security requirements, so can be less secure than the LDAP naming service. See the nis(5) and ypbind(1M) man pages.

      The NIS server service is disabled or not installedOSC-41010

      The NIS server service is disabled or not installed

      Rule IDOSC-41010
      Result
      pass
      Time2018-10-13T21:24:52
      Severitymedium
      Identifiers and References
      Description

      By default, NIS server software is not installed. NIS is an RPC-based naming service that does not conform to current security requirements, that can be less secure than the LDAP naming service. See the nis(5) and ypserv(1M) man pages.

      The r-protocols services are disabled in PAMOSC-55010

      The r-protocols services are disabled in PAM

      Rule IDOSC-55010
      Result
      fail
      Time2018-10-13T21:24:52
      Severitymedium
      Identifiers and References
      Description

      By default, legacy services such as the r-protocols, rlogin(1) and rsh(1), are not installed. Their services, however, are defined in /etc/pam.d. See the pam.d(4) man page.

      Remediation description:
      If you remove the service definitions from /etc/pam.d, these services would use the "other" service if these legacy services were enabled. Therefore, specify pam_deny.so.1 as the module for the authentication stack for the r-protocol services in the /etc/pam.d directory.
      Remediation script:
      
          # cd /etc/pam.d
          # cp rlogin rlogin.orig
          # pfedit rlogin
          auth definitive    pam_deny.so.1
          auth sufficient    pam_deny.so.1
          auth required    pam_deny.so.1
          # cp rsh rsh.orig
          # pfedit rsh
          auth definitive         pam_deny.so.1
          auth sufficient         pam_deny.so.1
          auth required           pam_deny.so.1
            
      Service svc:/network/http:apache22 is disabled or not installedOSC-01010

      Service svc:/network/http:apache22 is disabled or not installed

      Rule IDOSC-01010
      Result
      pass
      Time2018-10-13T21:24:52
      Severitymedium
      Identifiers and References
      Description

      This program provides Apache web server services by using the Apache hypertext transfer protocol (http). See the httpd(8) man page.

      Service svc:/network/rpc/keyserv is disabled or not installedOSC-29010

      Service svc:/network/rpc/keyserv is disabled or not installed

      Rule IDOSC-29010
      Result
      pass
      Time2018-10-13T21:24:52
      Severitylow
      Identifiers and References
      Description

      keyserv is a daemon that is used for storing the private encryption keys of each user logged into the system. These encryption keys are used for accessing secure network services such as secure NFS. For more information, see the keyserv(1M) man page.

      Service svc:/network/rpc/keyserv cannot use the nobody user keyOSC-29510

      Service svc:/network/rpc/keyserv cannot use the nobody user key

      Rule IDOSC-29510
      Result
      notselected
      Time2018-10-13T21:24:52
      Severitymedium
      Identifiers and References
      Description

      The value of ENABLE_NOBODY_KEYS is YES by default. See the keyserv(1M) man page.

      ssh(1) is the only service binding a listener to non-loopback addressesOSC-73505

      ssh(1) is the only service binding a listener to non-loopback addresses

      Rule IDOSC-73505
      Result
      fail
      Time2018-10-13T21:24:52
      Severitymedium
      Identifiers and References
      Description

      By default, ssh(1) is the only network service that can send and receive network packets on a newly-installed Oracle Solaris system. See the sshd(1M) man page.

      SCE stdout
      The following ports are open:
      *.4369 epmd
      *.60801 beam.smp
      *.5672 beam.smp
      *.5672 beam.smp
      *.80 0
      *.6482 ldmd
      *.3306 mysqld
      *.8101 ldmd
      *.10000 0
      *.9191 glance-registr
      *.9292 glance-api
      *.8776 cinder-api
      
      Remediation description:
      Disable any unneeded services listening on the network.
      Remediation script:
      
          # svcadm disable <FMRI for unneeded service>
            
      ssh(1) requires passwordsOSC-73010

      ssh(1) requires passwords

      Rule IDOSC-73010
      Result
      fail
      Time2018-10-13T21:24:52
      Severitymedium
      Identifiers and References
      Description

      Logins without a password put the system at risk. In the default remote login service, Secure Shell, the PermitEmptyPasswords parameter in the /etc/ssh/sshd_config file should remain set to no. See the sshd_config(4) man page.

      Remediation description:
      Ensure that PermitEmptyPasswords value in the /etc/ssh/sshd_config file has not been changed. The default value is no. If you reset the value, restart the ssh service.
      Remediation script:
      
          # cd /etc/ssh
          # grep PermitEmpty sshd_config
          ...
          PermitEmptyPasswords no
      
          # svcadm restart svc:/network/ssh
            
      rhost-based authentication in ssh(1) is disabledOSC-74010

      rhost-based authentication in ssh(1) is disabled

      Rule IDOSC-74010
      Result
      pass
      Time2018-10-13T21:24:52
      Severitymedium
      Identifiers and References
      Description

      rhost-based authentication in Secure Shell allows users to remotely log in without supplying a password. The IgnoreRhosts parameter specifies whether .rhosts and .shosts files can be used rather than a password. See the sshd_config(4) and hosts.equiv(4) man pages.

      root login by using ssh(1) is disabledOSC-61510

      root login by using ssh(1) is disabled

      Rule IDOSC-61510
      Result
      pass
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      By default, remote root logins are not permitted because root is a role and roles cannot log in. If root has been changed to a user, the default value of the PermitRootLogin parameter in the /etc/ssh/sshd_config file prevents root from remotely logging in. See the sshd_config(4) man page.

      Service svc:/network/smtp:sendmail only listens on loopbackOSC-68505

      Service svc:/network/smtp:sendmail only listens on loopback

      Rule IDOSC-68505
      Result
      pass
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      Check that sendmail listens in local_only mode. This is also called listens on loopback. See the sendmail(1M) and svccfg(1M) man pages

      The umask(1) for SMF services is 022OSC-77500

      The umask(1) for SMF services is 022

      Rule IDOSC-77500
      Result
      pass
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      Files that the Service Management Facility (SMF) creates should be created with 644 file permissions.

      ssh(1) does not forward X11OSC-74510

      ssh(1) does not forward X11

      Rule IDOSC-74510
      Result
      notselected
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      The X11Forwarding parameter in the /etc/ssh/sshd_config file specifies whether users can forward an X Window session through an encrypted tunnel. This parameter allows the remote user to display windows remotely over Secure Shell. See the sshd_config(1M) and X(5) man pages.

      gdm(1M) does not accept logins without passwordsOSC-20010

      gdm(1M) does not accept logins without passwords

      Rule IDOSC-20010
      Result
      notselected
      Time2018-10-13T21:24:53
      Severityhigh
      Identifiers and References
      Description

      Automatic logins are a known security risk for other than public kiosks. By default, GNOME automatic login is disallowed, so users must supply a password. Automatic and Timed login is controlled by the entries in /etc/gdm/custom.conf See the gdm(1M) man page.

      The ftp(1) banner shows a suitable security messageOSC-18000

      The ftp(1) banner shows a suitable security message

      Rule IDOSC-18000
      Result
      notselected
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      The banner informs users who are attempting to access the system that the system is monitored. Note that the pkg:/service/network/ftp package must be installed for ftp to work.

      The gdm(1M) banner shows a suitable security messageOSC-20500

      The gdm(1M) banner shows a suitable security message

      Rule IDOSC-20500
      Result
      notselected
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      The banner informs users who are attempting to access the system that the system is monitored. The banner uses the /etc/issue file. See the issue(4) and gdm(1M) man pages.

      The ssh(1) banner shows a suitable security messageOSC-75000

      The ssh(1) banner shows a suitable security message

      Rule IDOSC-75000
      Result
      notselected
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      By default, the ssh(1) banner displays the contents of the /etc/issue file. See the issue(4) and sshd_config(4) man pages.

      The telnet(1) banner shows a suitable security messageOSC-89000

      The telnet(1) banner shows a suitable security message

      Rule IDOSC-89000
      Result
      notselected
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      The telnetd(1M) DARPA TELNET protocol server is a legacy service that does not conform to current security requirements. By default, this service is not installed, and systems use the ssh(1M) protocol to communicate.

      ftp(1) is restricted to a specific set of usersOSC-19000

      ftp(1) is restricted to a specific set of users

      Rule IDOSC-19000
      Result
      notselected
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      FTP file transfers should not be available to all users, and must require qualified users to supply their names and password. In general, system users should not be allowed to use FTP. This check verifies that system accounts are included in the /etc/ftpd/ftpusers file so that they are not allowed to use FTP. See the ftp(1) man page.

      SCE stdout
      
              
      The tcp_wrappers feature is enabledOSC-88011

      The tcp_wrappers feature is enabled

      Rule IDOSC-88011
      Result
      notselected
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      TCP wrappers provides a way of implementing access controls by checking the address of a host that is requesting a particular network service against an ACL. Requests are granted or denied accordingly. TCP wrappers also logs host requests for network services, which is a useful monitoring function. The ssh(1) and sendmail(1M) services are configured to use TCP wrappers. Network services that might be placed under access control include proftpd(8) and rpcbind(1M). See the tcpd(1M) man page.

      Files written in ftp(1) sessions have a suitable umaskOSC-18500

      Files written in ftp(1) sessions have a suitable umask

      Rule IDOSC-18500
      Result
      notselected
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      The FTP server does not necessarily use the user's system file creation mask. Setting the FTP umask ensures that files transmitted over FTP use a strong file creation umask. See the umask(1) and proftpd(8) man pages.

      Directed broadcasts are not forwardedOSC-79510

      Directed broadcasts are not forwarded

      Rule IDOSC-79510
      Result
      pass
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      By default, Oracle Solaris forwards broadcast packets. To reduce the possibility of broadcast flooding, change the default. Note that you are also disabling broadcast pings.

      Responses to ICMP netmask requests are disabledOSC-81010

      Responses to ICMP netmask requests are disabled

      Rule IDOSC-81010
      Result
      pass
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      To prevent the dissemination of information about the network topology, disable these responses if they are currently enabled.

      Responses to ICMP broadcast timestamp requests are disabledOSC-81510

      Responses to ICMP broadcast timestamp requests are disabled

      Rule IDOSC-81510
      Result
      pass
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      To prevent the dissemination of information about the network topology, disable these responses if they are currently enabled.

      Responses to ICMP timestamp requests are disabledOSC-82510

      Responses to ICMP timestamp requests are disabled

      Rule IDOSC-82510
      Result
      pass
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      The default value removes additional CPU demands on systems and prevents the dissemination of information about the network.

      Source-routed packets are not forwardedOSC-87010

      Source-routed packets are not forwarded

      Rule IDOSC-87010
      Result
      pass
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      To prevent DOS attacks from spoofed packets, ensure that source-routed packets are not forwarded. The default is not to forward them.

      TCP reverse source routing is disabledOSC-86010

      TCP reverse source routing is disabled

      Rule IDOSC-86010
      Result
      pass
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      The default value prevents packets from bypassing network security measures. Source-routed packets allow the source of the packet to suggest a path different from the path configured on the router. Note - This parameter might be set to 1 for diagnostic purposes. After diagnosis is complete, return the value to 0.

      The maximum number of half-open TCP connections is set to the defaultOSC-83500

      The maximum number of half-open TCP connections is set to the default

      Rule IDOSC-83500
      Result
      pass
      Time2018-10-13T21:24:53
      Severitymedium
      Identifiers and References
      Description

      Setting the maximum half-open TCP connections to 4096 per IP address per port helps to defend against SYN flood denial of service attacks. 1024 is the default.

      The maximum number of waiting TCP connections is set to the defaultOSC-84500

      The maximum number of waiting TCP connections is set to the default

      Rule IDOSC-84500
      Result
      pass
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      Setting the maximun number of queued incoming connections TCP to at least 1024 can help prevent certain Distributed Denial of Service (DDoS) attacks. The default is 128.

      Responses to echo requests on multicast addresses are disabledOSC-85510

      Responses to echo requests on multicast addresses are disabled

      Rule IDOSC-85510
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      To prevent the dissemination of information about the network topology, disable these responses.

      SCE stdout
      
              
      Responses to ICMP echo requests on broadcast addresses are disabledOSC-80510

      Responses to ICMP echo requests on broadcast addresses are disabled

      Rule IDOSC-80510
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      To prevent the dissemination of information about the network topology, disable these responses if they are currently enabled.

      SCE stdout
      
              
      Strict multihoming is enabledOSC-87500

      Strict multihoming is enabled

      Rule IDOSC-87500
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      For systems that are gateways to other domains, such as a firewall or a VPN node, strict multihoming must be enabled. The hostmodel property controls the send and receive behavior for IP packets on a multihomed system.

      SCE stdout
      
              
      ICMP redirects are disabledOSC-82010

      ICMP redirects are disabled

      Rule IDOSC-82010
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      Routers use ICMP redirect messages to inform hosts of more direct routes to a destination. An illicit ICMP redirect message could result in a man-in-the-middle attack.

      SCE stdout
      
              
      Improved sequential generation for TCP packet sequence numberingOSC-83001

      Improved sequential generation for TCP packet sequence numbering

      Rule IDOSC-83001
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      Ensure that the TCP initial sequence number generation parameter complies with RFC 6528 (http://www.ietf.org/rfc/rfc6528.txt).

      Strong TCP packet sequence numberingOSC-83002

      Strong TCP packet sequence numbering

      Rule IDOSC-83002
      Result
      pass
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      Ensure that the TCP initial sequence number generation parameter complies with RFC 6528 (http://www.ietf.org/rfc/rfc6528.txt).

      Routing daemons are disabledOSC-86510

      Routing daemons are disabled

      Rule IDOSC-86510
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      Systems in a secure datacenter should not need automatic routing reconfiguration.

      The maximum number of half-open TCP connections is at least 4096OSC-84000

      The maximum number of half-open TCP connections is at least 4096

      Rule IDOSC-84000
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      Setting the maximum half-open TCP connections to 4096 per IP address per port helps to defend against SYN flood denial of service attacks.

      SCE stdout
      
              
      The maximum number of waiting TCP connections is set to at least 1024OSC-85000

      The maximum number of waiting TCP connections is set to at least 1024

      Rule IDOSC-85000
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      Setting the maximun number of queued incoming connections TCP to at least 1024 can help prevent certain Distributed Denial of Service (DDoS) attacks.

      SCE stdout
      
              
      DICTIONBDIR is set to /var/passwdOSC-43500

      DICTIONBDIR is set to /var/passwd

      Rule IDOSC-43500
      Result
      pass
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      DICTIONBDIR in the /etc/default/passwd file points to the /var/passwd dictionary by default. A password dictionary can strengthen users' password selection by preventing the use of common words or letter combinations. The passwd command performs dictionary lookups in the dictionary that DICTIONBDIR indicates. See the passwd(1) man page.

      Passwords are hashed with a secure algorithmOSC-44000

      Passwords are hashed with a secure algorithm

      Rule IDOSC-44000
      Result
      pass
      Time2018-10-13T21:24:54
      Severityhigh
      Identifiers and References
      Description

      The hash used is determined by values of CRYPT_ALGORITHMS_ALLOW and CRYPT_DEFAULT set in /etc/security/policy.conf file. The value for SHA-256 is "5", and the value for SHA-512 is "6". To confirm properly set, the second field in the /etc/shadow file indicates the algorithm that was used to create the password hash. If the algorithm is set to SHA-256, the entry begins with "$5$" If the algorithm is set to SHA-512, the entry begins with "$6$" See the crypt.conf(4) and policy.conf(4) man pages.

      Password history does not log any passwordsOSC-44500

      Password history does not log any passwords

      Rule IDOSC-44500
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      HISTORY in the /etc/default/passwd file prevents users from using similar passwords within the HISTORY value. The default value, 0, allows users to reuse passwords immediately.

      Password history logs the last ten passwordsOSC-44510

      Password history logs the last ten passwords

      Rule IDOSC-44510
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      HISTORY in the /etc/default/passwd file prevents users from using similar passwords within the HISTORY value. If MINWEEKS is set to 3 and HISTORY is set to 10, passwords are checked for reuse for ten months. See the passwd(1) man page.

      Passwords allow repeat charactersOSC-45000

      Passwords allow repeat characters

      Rule IDOSC-45000
      Result
      pass
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      MAXREPEATS in the `/etc/default/passwd file allows users to repeat characters in passwords. The default is 0, which permits repeated characters. Any other value indicates how many characters can be repeated. See the passwd(1) man page.

      Passwords require at least two alphabetic charactersOSC-46502

      Passwords require at least two alphabetic characters

      Rule IDOSC-46502
      Result
      pass
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      MINALPHA in the /etc/default/passwd file indicates the minimum number of alphabetic characters that passwords must contain. Alphabetic characters provide more values than numeric or special characters, so allow for more variation. The default value is 2. See the passwd(1) man page.

      Passwords require at least three characters difference from the previous passwordOSC-47034

      Passwords require at least three characters difference from the previous password

      Rule IDOSC-47034
      Result
      pass
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      MINDIFF in the /etc/default/passwd file indicates the minimum difference a password must have from the previous password. The default is 3.

      Passwords require at least four characters difference from previous passwordsOSC-47004

      Passwords require at least four characters difference from previous passwords

      Rule IDOSC-47004
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      MINDIFF in the /etc/default/passwd file indicates the minimum difference a password must have from the previous passwords that are logged in HISTORY. The default is 3. A value of at least 4 is recommended.

      Passwords do not impose restrictions involving digitsOSC-47500

      Passwords do not impose restrictions involving digits

      Rule IDOSC-47500
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      MINDIGIT in the /etc/default/passwd file indicates the minimum number of digits that a password must contain. Digits provide some protection against dictionary-based password attacks. The default is 0.

      Passwords require at least one digitOSC-47501

      Passwords require at least one digit

      Rule IDOSC-47501
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      MINDIGIT in the /etc/default/passwd file indicates the minimum number of digits that a password must contain. Digits provide some protection against dictionary-based password attacks. The default is 0. A value of at least 1 is recommended. See the passwd(1) man page.

      Passwords do not impose restrictions involving lowercase charactersOSC-48000

      Passwords do not impose restrictions involving lowercase characters

      Rule IDOSC-48000
      Result
      pass
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      MINLOWER in the /etc/default/passwd file indicates the minimum number of lowercase letters that a password must contain. Lowercase letters provide some protection against dictionary-based password attacks. The default is 0.

      Passwords require a minimum of one non-alphabetic characterOSC-48501

      Passwords require a minimum of one non-alphabetic character

      Rule IDOSC-48501
      Result
      pass
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      MINNONALPHA in the /etc/default/passwd file indicates the minimum number of non-alphabetic characters that a password must contain. Non-alphabetic characters provide some protection against dictionary-based password attacks. The default is 0. A value of at least 1 is recommended. See the passwd(1) man page.

      Passwords do not impose restrictions involving special charactersOSC-49000

      Passwords do not impose restrictions involving special characters

      Rule IDOSC-49000
      Result
      pass
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      MINSPECIAL in the /etc/default/passwd file indicates the minimum number of special characters that a password must contain. Special characters provide some protection against dictionary-based password attacks. The default is 0.

      Passwords do not impose restrictions involving uppercase charactersOSC-49500

      Passwords do not impose restrictions involving uppercase characters

      Rule IDOSC-49500
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      MINUPPER in the /etc/default/passwd file indicates the minimum number of uppercase letters that a password must contain. Uppercase letters provide some protection against dictionary-based password attacks. The default is 0.

      Passwords require at least one uppercase characterOSC-49501

      Passwords require at least one uppercase character

      Rule IDOSC-49501
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      MINUPPER in the /etc/default/passwd file indicates the minimum number of uppercase letters that a password must contain. Uppercase letters provide some protection against dictionary-based password attacks. The default is 0. A value of at least 1 is recommended. See the passwd(1) man page.

      Passwords cannot be changed for at least three weeksOSC-50003

      Passwords cannot be changed for at least three weeks

      Rule IDOSC-50003
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      MINWEEKS in the /etc/default/passwd file indicates the minimum number of weeks before a password can be changed. This value prevents users from reusing a password quickly. The default is unspecified. See the passwd(1) man page.

      Passwords must be changed at least every 13 weeksOSC-45513

      Passwords must be changed at least every 13 weeks

      Rule IDOSC-45513
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      MAXWEEKS in the /etc/default/passwd file indicates the maximum number of weeks that a password can be used. This value is a balance between users remembering a new password and malicious users attacking long-term passwords. The default is unspecified. See the passwd(1) man page.

      NAMECHECK for passwords is set to YESOSC-50500

      NAMECHECK for passwords is set to YES

      Rule IDOSC-50500
      Result
      pass
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      NAMECHECK in the /etc/default/passwd file indicates whether login names are checked in the files naming service. The default, YES, prevents malicious users from using a login name that is not in a local file. See the passwd(1) man page.

      Passwords require at least six charactersOSC-46006

      Passwords require at least six characters

      Rule IDOSC-46006
      Result
      pass
      Time2018-10-13T21:24:54
      Severityhigh
      Identifiers and References
      Description

      PASSLENGTH in the /etc/default/login file indicates the minimum number of characters that a password must contain. A longer password length plus a strong password hashing algorithm provide some protection against password attacks. The default in Oracle Solaris 11 is 6.

      Passwords require at least eight charactersOSC-46008

      Passwords require at least eight characters

      Rule IDOSC-46008
      Result
      notselected
      Time2018-10-13T21:24:54
      Severityhigh
      Identifiers and References
      Description

      PASSLENGTH in the /etc/default/login file indicates the minimum number of characters that a password must contain. A longer password length plus a strong password hashing algorithm provide some protection against password attacks. The default for Oracle Solaris 12 is 8. See the passwd(1) man page.

      Passwords require at least 14 charactersOSC-46014

      Passwords require at least 14 characters

      Rule IDOSC-46014
      Result
      notselected
      Time2018-10-13T21:24:54
      Severityhigh
      Identifiers and References
      Description

      PASSLENGTH in the /etc/default/login file indicates the minimum number of characters that a password must contain. A longer password length plus a strong password hashing algorithm provide some protection against password attacks. The default for Oracle Solaris 11 is 6 and for Oracle Solaris 12 is 8.

      Passwords allow whitespaceOSC-52000

      Passwords allow whitespace

      Rule IDOSC-52000
      Result
      pass
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      WHITESPACE in the /etc/default/login file indicates whether passwords can include the space character. The space character provides some protection against dictionary-based password attacks. The default is YES. See the passwd(1) man page.

      root is a roleOSC-59000

      root is a role

      Rule IDOSC-59000
      Result
      notselected
      Time2018-10-13T21:24:54
      Severitymedium
      Identifiers and References
      Description

      By default, root is a role. Roles cannot log in directly. Rather, a user logs in and then assumes the root role, thus providing an audit trail of who is operating as root. See the roles(1), user_attr(4), and usermod(1M) man pages.

      Role details are unchangedOSC-56000

      Role details are unchanged

      Rule IDOSC-56000
      Result
      pass
      Time2018-10-13T21:35:28
      Severitymedium
      Identifiers and References
      Description

      Oracle Solaris ships with Role Based Access Control (RBAC). This feature enables administrators to delegate specific, limited, additional privileges and authorizations to individual users to administer parts of the system without giving them access to the root account. The provided rights databases should not be changed directly. To add rights to roles, use the roleadd and rolemod commands. These commands add entries to the /etc/user_attr file. See the profiles(1), auths(1), roles(1), rbac(5), roleadd(1M), rolemod(1M), and user_attr(4) man pages.

      Logins require passwordsOSC-33000

      Logins require passwords

      Rule IDOSC-33000
      Result
      pass
      Time2018-10-13T21:35:28
      Severityhigh
      Identifiers and References
      Description

      PASSREQ in the /etc/default/login file indicates whether logins require passwords. Passwords are required for defense against computer attacks. The default is YES. See the login(1) man page.

      shadow(4) password fields are not emptyOSC-51005

      shadow(4) password fields are not empty

      Rule IDOSC-51005
      Result
      pass
      Time2018-10-13T21:35:29
      Severityhigh
      Identifiers and References
      Description

      The second field in the /etc/shadow file contains passwords. When creating roles, you can easily forget to assign a password. See the shadow(4) and passwd(1) man pages.

      Local users are assigned home directoriesOSC-94501

      Local users are assigned home directories

      Rule IDOSC-94501
      Result
      pass
      Time2018-10-13T21:35:30
      Severitymedium
      Identifiers and References
      Description

      Users need a place to store and create files. A home directory enables a user to place configuration files, such as the .profile file, and ongoing work in a directory that is owned by the user.

      root is the only user with UID=0OSC-61001

      root is the only user with UID=0

      Rule IDOSC-61001
      Result
      pass
      Time2018-10-13T21:35:30
      Severitymedium
      Identifiers and References
      Description

      The UID of 0 has superuser privileges. Only root should have those privileges.

      All groups specified in /etc/passwd are defined in /etc/groupOSC-24505

      All groups specified in /etc/passwd are defined in /etc/group

      Rule IDOSC-24505
      Result
      pass
      Time2018-10-13T21:35:30
      Severitymedium
      Identifiers and References
      Description

      Users are assigned to at least one group and can be assigned to secondary groups. All groups must be defined in the /etc/group file.

      Home directories for all users existOSC-93505

      Home directories for all users exist

      Rule IDOSC-93505
      Result
      pass
      Time2018-10-13T21:35:30
      Severitymedium
      Identifiers and References
      Description

      Users need a place to store and create files. A home directory enables a user to place configuration files, such as the .profile file, and ongoing work in a directory that is owned by the user.

      Reserved system accounts remain unusedOSC-25505

      Reserved system accounts remain unused

      Rule IDOSC-25505
      Result
      fail
      Time2018-10-13T21:35:30
      Severitymedium
      Identifiers and References
      Description

      Accounts whose ID is 100 or less are system accounts. These accounts should not be replaced or reconfigured.

      SCE stdout
      Invalid User with Reserved UID: rabbitmq
      Invalid User with Reserved UID: ocm
      Invalid User with Reserved UID: cinder
      Invalid User with Reserved UID: glance
      Invalid User with Reserved UID: keystone
      Invalid User with Reserved UID: neutron
      Invalid User with Reserved UID: nova
      Invalid User with Reserved UID: swift
      Invalid User with Reserved UID: heat
      Invalid User with Reserved UID: evsuser
      Invalid User with Reserved UID: ironic
      
      Remediation description:
      Users should not be assigned UIDs less than 100 and existing system accounts should not be renamed or renumbered. Undo any changes that have made involving these accounts. See the usermod(1M) man page.
      Remediation script:
      
          # usermod <options> <username>
            
      User home directories have appropriate permissionsOSC-93005

      User home directories have appropriate permissions

      Rule IDOSC-93005
      Result
      notselected
      Time2018-10-13T21:35:30
      Severitymedium
      Identifiers and References
      Description

      Home directories must be writable and searchable by their owners. Typically, other users do not have rights to modify those files or add files to the user's home directory.

      SCE stdout
      
              
      Find and list duplicate GIDsOSC-22500

      Find and list duplicate GIDs

      Rule IDOSC-22500
      Result
      pass
      Time2018-10-13T21:35:30
      Severitymedium
      Identifiers and References
      Description

      Groups, like users, are unique. Duplicate group IDs must be removed.

      Find and list duplicate group namesOSC-23000

      Find and list duplicate group names

      Rule IDOSC-23000
      Result
      pass
      Time2018-10-13T21:35:30
      Severitymedium
      Identifiers and References
      Description

      Groups, like users, are unique. Duplicate group names must be removed.

      Find and list duplicate UIDsOSC-23500

      Find and list duplicate UIDs

      Rule IDOSC-23500
      Result
      pass
      Time2018-10-13T21:35:30
      Severitymedium
      Identifiers and References
      Description

      Users are identified by IDs, which must be unique. Duplicate user IDs must be removed.

      Find and list duplicate usernamesOSC-24000

      Find and list duplicate usernames

      Rule IDOSC-24000
      Result
      pass
      Time2018-10-13T21:35:30
      Severitymedium
      Identifiers and References
      Description

      Users log in by name, which must be unique. Duplicate user names must be removed.

      Default system accounts are lockedOSC-26005

      Default system accounts are locked

      Rule IDOSC-26005
      Result
      pass
      Time2018-10-13T21:35:31
      Severitymedium
      Identifiers and References
      Description

      Oracle Solaris is installed with correctly configured system accounts. These accounts should not be modified.

      Default system accounts are no-loginOSC-51505

      Default system accounts are no-login

      Rule IDOSC-51505
      Result
      notselected
      Time2018-10-13T21:35:31
      Severitymedium
      Identifiers and References
      Description

      Oracle Solaris is installed with correctly configured system accounts. These accounts should not be modified.

      SCE stdout
      
              
      The root password is hashed with the SHA-256 algorithmOSC-60000

      The root password is hashed with the SHA-256 algorithm

      Rule IDOSC-60000
      Result
      notselected
      Time2018-10-13T21:35:31
      Severityhigh
      Identifiers and References
      Description

      The second field in the /etc/shadow file indicates the algorithm that was used to create the password hash. If the entry begins with "$5$", then password is hashed with SHA-256 algorithm. If the entry begins with "$6$", then password is hashed with SHA-512 algorithm. See the crypt.conf(4) and policy.conf(4) man pages.

      Service svc:/network/ipfilter is enabledOSC-27505

      Service svc:/network/ipfilter is enabled

      Rule IDOSC-27505
      Result
      notselected
      Time2018-10-13T21:35:31
      Severitymedium
      Identifiers and References
      Description

      IP Filter is a host-based firewall that provides stateful packet filtering and network address translation (NAT). Packet filtering provides basic protection against network-based attacks. IP Filter also includes stateless packet filtering and can create and manage address pools. See the ipf(1M) and ipfilter(5) man pages.

      mesg(1) prevents talk(1) and write(1) access to remote terminalsOSC-34510

      mesg(1) prevents talk(1) and write(1) access to remote terminals

      Rule IDOSC-34510
      Result
      notselected
      Time2018-10-13T21:35:31
      Severitymedium
      Identifiers and References
      Description

      This program controls whether users can send messages by using write(1), talk(1) or other utilities to a terminal device. See the mesg(1) man page.

      Inactive user accounts will be locked after 35 daysOSC-25000

      Inactive user accounts will be locked after 35 days

      Rule IDOSC-25000
      Result
      notselected
      Time2018-10-13T21:35:31
      Severitymedium
      Identifiers and References
      Description

      Inactive user accounts can provide a back door into the system. User accounts should be locked after a period of inactivity.

      SCE stdout
      
              
      The default user UMASK is 022OSC-94000

      The default user UMASK is 022

      Rule IDOSC-94000
      Result
      pass
      Time2018-10-13T21:35:31
      Severitymedium
      Identifiers and References
      Description

      UMASK in the /etc/default/login file indicates the permissions on user files at creation. This value should not allow group or world write. The default value is 022, which allows group and world to read files owned by a user. See the login(1) man page.

      root access is console-onlyOSC-59510

      root access is console-only

      Rule IDOSC-59510
      Result
      pass
      Time2018-10-13T21:35:31
      Severitymedium
      Identifiers and References
      Description

      The root account should not be able to log in remotely, and its actions should be monitored. See the login(1) man page.

      DISABLETIME is set for loginsOSC-32500

      DISABLETIME is set for logins

      Rule IDOSC-32500
      Result
      pass
      Time2018-10-13T21:35:31
      Severitymedium
      Identifiers and References
      Description

      DISABLETIME in the /etc/default/login file is set to 20 by default. Any value greater than zero indicates the seconds before a login prompt appears after RETRIES failed login attempts. This delay can mitigate rapid-fire, brute force attacks on passwords. See the login(1) man page.

      SLEEPTIME following an invalid login attempt is set to 4OSC-33500

      SLEEPTIME following an invalid login attempt is set to 4

      Rule IDOSC-33500
      Result
      pass
      Time2018-10-13T21:35:31
      Severitymedium
      Identifiers and References
      Description

      SLEEPTIME in the /etc/default/login file is set to 4 by default. This number indicates the number of seconds that elapse before the "login incorrect" message appears after an incorrect password is typed. The maximum number is 5. This delay can mitigate rapid-fire, brute force attacks on passwords. See the login(1) man page.

      Name services are set to all local (files) onlyOSC-36500

      Name services are set to all local (files) only

      Rule IDOSC-36500
      Result
      notselected
      Time2018-10-13T21:35:31
      Severitymedium
      Identifiers and References
      Description

      The operating system uses a number of databases of information about hosts, ipnodes, users (passwd(4), shadow(4), and user_attr(4)), and groups. Data for these can come from a variety of sources: hostnames and host addresses, for example, can be found in /etc/hosts, NIS, LDAP, DNS, or Multicast DNS. Systems in restricted environments may be more secure if only local files entries are used for these entries. See the nsswitch.conf(4) man page for more information

      Address Space Layout Randomization (ASLR) is enabledOSC-01511

      Address Space Layout Randomization (ASLR) is enabled

      Rule IDOSC-01511
      Result
      pass
      Time2018-10-13T21:35:31
      Severitymedium
      Identifiers and References
      Description

      Oracle Solaris tags many of its userland binaries to enable Address Space Layout Randomization (ASLR). ASLR randomizes the starting address of key parts of an address space. This security defense mechanism can cause Return Oriented Programming (ROP) attacks to fail when they try to exploit software vulnerabilities. See the sxadm(1M) man page.
      Zones inherit this randomized layout for their processes. Because the use of ASLR might not be optimal for all binaries, the use of ASLR is configurable at the zone level and at the binary level.

      Booting the system should require a passwordOSC-04511

      Booting the system should require a password

      Rule IDOSC-04511
      Result
      notselected
      Time2018-10-13T21:35:31
      Severitymedium
      Identifiers and References
      Description

      The GRUB menu, the BIOS, and the eeprom should be password-protected to prevent configuration by unauthorized users. The BIOS protections prevent booting from an external device, such as a USB flash drive.

      SCE stdout
      
              
      Stacks are non-executableOSC-75511

      Stacks are non-executable

      Rule IDOSC-75511
      Result
      notselected
      Time2018-10-13T21:35:31
      Severitymedium
      Identifiers and References
      Description

      Programs read and write data on the stack. Typically, they execute from read-only portions of memory that are specifically designated for code. Some attacks that cause buffers on the stack to overflow try to insert new code on the stack and cause the program to execute it. Removing execute permission from the stack memory prevents these attacks from succeeding. Properly written programs function correctly without using executable stacks.

      Remote serial logins are disabledOSC-69010

      Remote serial logins are disabled

      Rule IDOSC-69010
      Result
      notselected
      Time2018-10-13T21:35:31
      Severitymedium
      Identifiers and References
      Description

      Serial logins can be a source of unauthorized access. Login services should not be enabled for serial ports that are not required to support the purpose of the system.

      Check all default audit propertiesOSC-02000

      Check all default audit properties

      Rule IDOSC-02000
      Result
      pass
      Time2018-10-13T21:35:31
      Severitymedium
      Identifiers and References
      Description

      Check all default audit properties