Signed-off-by: Jeffrey Blank <blank(a)eclipse.ncsc.mil>
---
rhel6/src/Makefile | 4 +
.../disa-stig-rhel5-v1r0.6-xccdf-manual.xml |20459 ++++++++++++++++++++
rhel6/src/transforms/xccdf2table-stig.xslt | 118 +
3 files changed, 20581 insertions(+), 0 deletions(-)
create mode 100644 rhel6/src/references/disa-stig-rhel5-v1r0.6-xccdf-manual.xml
create mode 100644 rhel6/src/transforms/xccdf2table-stig.xslt
diff --git a/rhel6/src/Makefile b/rhel6/src/Makefile
index d57ef15..6443905 100644
--- a/rhel6/src/Makefile
+++ b/rhel6/src/Makefile
@@ -93,6 +93,10 @@ table-srgmap: shorthand-guide shorthand2xccdf
# the map-to-items filename must be provided relative to the root of the main document
being processed
xsltproc -stringparam map-to-items "../$(OUT)/rhel6-xccdf.xml" -o
$(OUT)/rhel6-table-srgmap.html $(TRANS)/table-srgmap.xslt $(REFS)/disa-os-srg-v1r1.xml
+table-stig:
+ xsltproc -o $(OUT)/rhel5-table-stig.html $(TRANS)/xccdf2table-stig.xslt
$(REFS)/disa-stig-rhel5-v1r0.6-xccdf.xml
+ xsltproc -o $(OUT)/rhel5-table-stig-manual.html $(TRANS)/xccdf2table-stig.xslt
$(REFS)/disa-stig-rhel5-v1r0.6-xccdf-manual.xml
+
tables: table-refs table-profilenistrefs table-srgmap
content: shorthand-guide shorthand2xccdf guide checks
diff --git a/rhel6/src/references/disa-stig-rhel5-v1r0.6-xccdf-manual.xml
b/rhel6/src/references/disa-stig-rhel5-v1r0.6-xccdf-manual.xml
new file mode 100644
index 0000000..4eec363
--- /dev/null
+++ b/rhel6/src/references/disa-stig-rhel5-v1r0.6-xccdf-manual.xml
@@ -0,0 +1,20459 @@
+<?xml version="1.0" encoding="utf-8"?>
+<?xml-stylesheet type='text/xsl' href='STIG_unclass.xsl'?>
+<Benchmark
xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"
xmlns:xhtml="http://www.w3.org/1999/xhtml"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:cpe="http://cpe.mitre.org/language/2.0"
xmlns:dc="http://purl.org/dc/elements/1.1/"
+xmlns="http://checklists.nist.gov/xccdf/1.1" id="RHEL_5_STIG"
xml:lang="en"
+xsi:schemaLocation="http://checklists.nist.gov/xccdf/1.1
http://nvd.nist.gov/schema/xccdf-1.1.4.xsd http://cpe.mitre.org/dictionary/2.0
http://cpe.mitre.org/files/cpe-dictionary_2.1.xsd">
+ <status date="2012-05-25">draft</status>
+ <title>Draft Red Hat Enterprise Linux 5 Security Technical Implementation
Guide</title>
+ <description>The Red Hat Enterprise Linux 5 Security Technical Implementation
Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD)
information systems. Comments or proposed revisions to this document should be sent
+ via e-mail to the following address: fso_spt(a)disa.mil.</description>
+ <notice id="terms-of-use" xml:lang="en" />
+ <reference href="http://iase.disa.mil">
+ <dc:publisher>DISA, Field Security Operations</dc:publisher>
+ <dc:source>STIG.DOD.MIL</dc:source>
+ </reference>
+ <plain-text id="release-info">Release: 0.6 Benchmark Date: 25 May
2012</plain-text>
+ <version>1</version>
+ <Profile id="MAC-1_Public">
+ <title>I - Mission Critical Public</title>
+
<description><ProfileDescription></ProfileDescription></description>
+ <select idref="V-756" selected="true" />
+ <select idref="V-761" selected="true" />
+ <select idref="V-763" selected="true" />
+ <select idref="V-765" selected="true" />
+ <select idref="V-769" selected="true" />
+ <select idref="V-770" selected="true" />
+ <select idref="V-773" selected="true" />
+ <select idref="V-774" selected="true" />
+ <select idref="V-775" selected="true" />
+ <select idref="V-776" selected="true" />
+ <select idref="V-777" selected="true" />
+ <select idref="V-780" selected="true" />
+ <select idref="V-781" selected="true" />
+ <select idref="V-782" selected="true" />
+ <select idref="V-783" selected="true" />
+ <select idref="V-784" selected="true" />
+ <select idref="V-785" selected="true" />
+ <select idref="V-786" selected="true" />
+ <select idref="V-787" selected="true" />
+ <select idref="V-788" selected="true" />
+ <select idref="V-789" selected="true" />
+ <select idref="V-790" selected="true" />
+ <select idref="V-791" selected="true" />
+ <select idref="V-792" selected="true" />
+ <select idref="V-793" selected="true" />
+ <select idref="V-794" selected="true" />
+ <select idref="V-795" selected="true" />
+ <select idref="V-796" selected="true" />
+ <select idref="V-797" selected="true" />
+ <select idref="V-798" selected="true" />
+ <select idref="V-800" selected="true" />
+ <select idref="V-801" selected="true" />
+ <select idref="V-802" selected="true" />
+ <select idref="V-803" selected="true" />
+ <select idref="V-804" selected="true" />
+ <select idref="V-805" selected="true" />
+ <select idref="V-806" selected="true" />
+ <select idref="V-807" selected="true" />
+ <select idref="V-808" selected="true" />
+ <select idref="V-812" selected="true" />
+ <select idref="V-813" selected="true" />
+ <select idref="V-814" selected="true" />
+ <select idref="V-815" selected="true" />
+ <select idref="V-818" selected="true" />
+ <select idref="V-819" selected="true" />
+ <select idref="V-821" selected="true" />
+ <select idref="V-822" selected="true" />
+ <select idref="V-823" selected="true" />
+ <select idref="V-824" selected="true" />
+ <select idref="V-825" selected="true" />
+ <select idref="V-827" selected="true" />
+ <select idref="V-828" selected="true" />
+ <select idref="V-829" selected="true" />
+ <select idref="V-831" selected="true" />
+ <select idref="V-832" selected="true" />
+ <select idref="V-833" selected="true" />
+ <select idref="V-834" selected="true" />
+ <select idref="V-835" selected="true" />
+ <select idref="V-836" selected="true" />
+ <select idref="V-837" selected="true" />
+ <select idref="V-838" selected="true" />
+ <select idref="V-840" selected="true" />
+ <select idref="V-841" selected="true" />
+ <select idref="V-842" selected="true" />
+ <select idref="V-843" selected="true" />
+ <select idref="V-845" selected="true" />
+ <select idref="V-846" selected="true" />
+ <select idref="V-847" selected="true" />
+ <select idref="V-848" selected="true" />
+ <select idref="V-849" selected="true" />
+ <select idref="V-850" selected="true" />
+ <select idref="V-867" selected="true" />
+ <select idref="V-899" selected="true" />
+ <select idref="V-900" selected="true" />
+ <select idref="V-901" selected="true" />
+ <select idref="V-902" selected="true" />
+ <select idref="V-903" selected="true" />
+ <select idref="V-904" selected="true" />
+ <select idref="V-905" selected="true" />
+ <select idref="V-906" selected="true" />
+ <select idref="V-907" selected="true" />
+ <select idref="V-910" selected="true" />
+ <select idref="V-913" selected="true" />
+ <select idref="V-914" selected="true" />
+ <select idref="V-915" selected="true" />
+ <select idref="V-916" selected="true" />
+ <select idref="V-917" selected="true" />
+ <select idref="V-918" selected="true" />
+ <select idref="V-921" selected="true" />
+ <select idref="V-922" selected="true" />
+ <select idref="V-923" selected="true" />
+ <select idref="V-924" selected="true" />
+ <select idref="V-925" selected="true" />
+ <select idref="V-928" selected="true" />
+ <select idref="V-929" selected="true" />
+ <select idref="V-931" selected="true" />
+ <select idref="V-932" selected="true" />
+ <select idref="V-933" selected="true" />
+ <select idref="V-935" selected="true" />
+ <select idref="V-936" selected="true" />
+ <select idref="V-940" selected="true" />
+ <select idref="V-941" selected="true" />
+ <select idref="V-974" selected="true" />
+ <select idref="V-975" selected="true" />
+ <select idref="V-976" selected="true" />
+ <select idref="V-977" selected="true" />
+ <select idref="V-978" selected="true" />
+ <select idref="V-979" selected="true" />
+ <select idref="V-980" selected="true" />
+ <select idref="V-981" selected="true" />
+ <select idref="V-982" selected="true" />
+ <select idref="V-983" selected="true" />
+ <select idref="V-984" selected="true" />
+ <select idref="V-985" selected="true" />
+ <select idref="V-986" selected="true" />
+ <select idref="V-987" selected="true" />
+ <select idref="V-988" selected="true" />
+ <select idref="V-989" selected="true" />
+ <select idref="V-993" selected="true" />
+ <select idref="V-994" selected="true" />
+ <select idref="V-995" selected="true" />
+ <select idref="V-1010" selected="true" />
+ <select idref="V-1011" selected="true" />
+ <select idref="V-1013" selected="true" />
+ <select idref="V-1021" selected="true" />
+ <select idref="V-1022" selected="true" />
+ <select idref="V-1023" selected="true" />
+ <select idref="V-1025" selected="true" />
+ <select idref="V-1026" selected="true" />
+ <select idref="V-1027" selected="true" />
+ <select idref="V-1028" selected="true" />
+ <select idref="V-1029" selected="true" />
+ <select idref="V-1030" selected="true" />
+ <select idref="V-1032" selected="true" />
+ <select idref="V-1046" selected="true" />
+ <select idref="V-1047" selected="true" />
+ <select idref="V-1048" selected="true" />
+ <select idref="V-1049" selected="true" />
+ <select idref="V-1054" selected="true" />
+ <select idref="V-1055" selected="true" />
+ <select idref="V-1056" selected="true" />
+ <select idref="V-1058" selected="true" />
+ <select idref="V-1059" selected="true" />
+ <select idref="V-1061" selected="true" />
+ <select idref="V-1062" selected="true" />
+ <select idref="V-4083" selected="true" />
+ <select idref="V-4084" selected="true" />
+ <select idref="V-4087" selected="true" />
+ <select idref="V-4089" selected="true" />
+ <select idref="V-4090" selected="true" />
+ <select idref="V-4091" selected="true" />
+ <select idref="V-4246" selected="true" />
+ <select idref="V-4247" selected="true" />
+ <select idref="V-4248" selected="true" />
+ <select idref="V-4249" selected="true" />
+ <select idref="V-4250" selected="true" />
+ <select idref="V-4255" selected="true" />
+ <select idref="V-4268" selected="true" />
+ <select idref="V-4269" selected="true" />
+ <select idref="V-4273" selected="true" />
+ <select idref="V-4274" selected="true" />
+ <select idref="V-4275" selected="true" />
+ <select idref="V-4276" selected="true" />
+ <select idref="V-4277" selected="true" />
+ <select idref="V-4278" selected="true" />
+ <select idref="V-4295" selected="true" />
+ <select idref="V-4298" selected="true" />
+ <select idref="V-4301" selected="true" />
+ <select idref="V-4304" selected="true" />
+ <select idref="V-4321" selected="true" />
+ <select idref="V-4334" selected="true" />
+ <select idref="V-4335" selected="true" />
+ <select idref="V-4336" selected="true" />
+ <select idref="V-4339" selected="true" />
+ <select idref="V-4342" selected="true" />
+ <select idref="V-4346" selected="true" />
+ <select idref="V-4357" selected="true" />
+ <select idref="V-4358" selected="true" />
+ <select idref="V-4360" selected="true" />
+ <select idref="V-4361" selected="true" />
+ <select idref="V-4364" selected="true" />
+ <select idref="V-4365" selected="true" />
+ <select idref="V-4366" selected="true" />
+ <select idref="V-4367" selected="true" />
+ <select idref="V-4368" selected="true" />
+ <select idref="V-4369" selected="true" />
+ <select idref="V-4370" selected="true" />
+ <select idref="V-4371" selected="true" />
+ <select idref="V-4382" selected="true" />
+ <select idref="V-4384" selected="true" />
+ <select idref="V-4385" selected="true" />
+ <select idref="V-4387" selected="true" />
+ <select idref="V-4392" selected="true" />
+ <select idref="V-4393" selected="true" />
+ <select idref="V-4394" selected="true" />
+ <select idref="V-4395" selected="true" />
+ <select idref="V-4397" selected="true" />
+ <select idref="V-4398" selected="true" />
+ <select idref="V-4399" selected="true" />
+ <select idref="V-4427" selected="true" />
+ <select idref="V-4428" selected="true" />
+ <select idref="V-4430" selected="true" />
+ <select idref="V-4687" selected="true" />
+ <select idref="V-4688" selected="true" />
+ <select idref="V-4689" selected="true" />
+ <select idref="V-4690" selected="true" />
+ <select idref="V-4691" selected="true" />
+ <select idref="V-4692" selected="true" />
+ <select idref="V-4693" selected="true" />
+ <select idref="V-4694" selected="true" />
+ <select idref="V-4695" selected="true" />
+ <select idref="V-4696" selected="true" />
+ <select idref="V-4697" selected="true" />
+ <select idref="V-4701" selected="true" />
+ <select idref="V-4702" selected="true" />
+ <select idref="V-11940" selected="true" />
+ <select idref="V-11945" selected="true" />
+ <select idref="V-11946" selected="true" />
+ <select idref="V-11947" selected="true" />
+ <select idref="V-11948" selected="true" />
+ <select idref="V-11972" selected="true" />
+ <select idref="V-11973" selected="true" />
+ <select idref="V-11975" selected="true" />
+ <select idref="V-11976" selected="true" />
+ <select idref="V-11977" selected="true" />
+ <select idref="V-11979" selected="true" />
+ <select idref="V-11980" selected="true" />
+ <select idref="V-11981" selected="true" />
+ <select idref="V-11982" selected="true" />
+ <select idref="V-11983" selected="true" />
+ <select idref="V-11984" selected="true" />
+ <select idref="V-11985" selected="true" />
+ <select idref="V-11986" selected="true" />
+ <select idref="V-11987" selected="true" />
+ <select idref="V-11988" selected="true" />
+ <select idref="V-11989" selected="true" />
+ <select idref="V-11990" selected="true" />
+ <select idref="V-11994" selected="true" />
+ <select idref="V-11995" selected="true" />
+ <select idref="V-11996" selected="true" />
+ <select idref="V-11997" selected="true" />
+ <select idref="V-11999" selected="true" />
+ <select idref="V-12002" selected="true" />
+ <select idref="V-12003" selected="true" />
+ <select idref="V-12004" selected="true" />
+ <select idref="V-12005" selected="true" />
+ <select idref="V-12006" selected="true" />
+ <select idref="V-12010" selected="true" />
+ <select idref="V-12011" selected="true" />
+ <select idref="V-12014" selected="true" />
+ <select idref="V-12016" selected="true" />
+ <select idref="V-12017" selected="true" />
+ <select idref="V-12018" selected="true" />
+ <select idref="V-12019" selected="true" />
+ <select idref="V-12020" selected="true" />
+ <select idref="V-12021" selected="true" />
+ <select idref="V-12022" selected="true" />
+ <select idref="V-12023" selected="true" />
+ <select idref="V-12024" selected="true" />
+ <select idref="V-12025" selected="true" />
+ <select idref="V-12026" selected="true" />
+ <select idref="V-12028" selected="true" />
+ <select idref="V-12030" selected="true" />
+ <select idref="V-12038" selected="true" />
+ <select idref="V-12039" selected="true" />
+ <select idref="V-12040" selected="true" />
+ <select idref="V-12049" selected="true" />
+ <select idref="V-12765" selected="true" />
+ <select idref="V-22290" selected="true" />
+ <select idref="V-22291" selected="true" />
+ <select idref="V-22292" selected="true" />
+ <select idref="V-22294" selected="true" />
+ <select idref="V-22295" selected="true" />
+ <select idref="V-22296" selected="true" />
+ <select idref="V-22297" selected="true" />
+ <select idref="V-22298" selected="true" />
+ <select idref="V-22299" selected="true" />
+ <select idref="V-22301" selected="true" />
+ <select idref="V-22302" selected="true" />
+ <select idref="V-22303" selected="true" />
+ <select idref="V-22304" selected="true" />
+ <select idref="V-22305" selected="true" />
+ <select idref="V-22306" selected="true" />
+ <select idref="V-22307" selected="true" />
+ <select idref="V-22308" selected="true" />
+ <select idref="V-22309" selected="true" />
+ <select idref="V-22310" selected="true" />
+ <select idref="V-22311" selected="true" />
+ <select idref="V-22312" selected="true" />
+ <select idref="V-22313" selected="true" />
+ <select idref="V-22314" selected="true" />
+ <select idref="V-22315" selected="true" />
+ <select idref="V-22316" selected="true" />
+ <select idref="V-22317" selected="true" />
+ <select idref="V-22318" selected="true" />
+ <select idref="V-22319" selected="true" />
+ <select idref="V-22320" selected="true" />
+ <select idref="V-22321" selected="true" />
+ <select idref="V-22322" selected="true" />
+ <select idref="V-22323" selected="true" />
+ <select idref="V-22324" selected="true" />
+ <select idref="V-22325" selected="true" />
+ <select idref="V-22326" selected="true" />
+ <select idref="V-22327" selected="true" />
+ <select idref="V-22328" selected="true" />
+ <select idref="V-22329" selected="true" />
+ <select idref="V-22330" selected="true" />
+ <select idref="V-22332" selected="true" />
+ <select idref="V-22333" selected="true" />
+ <select idref="V-22334" selected="true" />
+ <select idref="V-22335" selected="true" />
+ <select idref="V-22336" selected="true" />
+ <select idref="V-22337" selected="true" />
+ <select idref="V-22338" selected="true" />
+ <select idref="V-22339" selected="true" />
+ <select idref="V-22340" selected="true" />
+ <select idref="V-22341" selected="true" />
+ <select idref="V-22342" selected="true" />
+ <select idref="V-22343" selected="true" />
+ <select idref="V-22344" selected="true" />
+ <select idref="V-22347" selected="true" />
+ <select idref="V-22348" selected="true" />
+ <select idref="V-22349" selected="true" />
+ <select idref="V-22350" selected="true" />
+ <select idref="V-22351" selected="true" />
+ <select idref="V-22352" selected="true" />
+ <select idref="V-22353" selected="true" />
+ <select idref="V-22354" selected="true" />
+ <select idref="V-22355" selected="true" />
+ <select idref="V-22356" selected="true" />
+ <select idref="V-22357" selected="true" />
+ <select idref="V-22358" selected="true" />
+ <select idref="V-22359" selected="true" />
+ <select idref="V-22360" selected="true" />
+ <select idref="V-22361" selected="true" />
+ <select idref="V-22362" selected="true" />
+ <select idref="V-22363" selected="true" />
+ <select idref="V-22364" selected="true" />
+ <select idref="V-22365" selected="true" />
+ <select idref="V-22366" selected="true" />
+ <select idref="V-22367" selected="true" />
+ <select idref="V-22368" selected="true" />
+ <select idref="V-22369" selected="true" />
+ <select idref="V-22370" selected="true" />
+ <select idref="V-22371" selected="true" />
+ <select idref="V-22372" selected="true" />
+ <select idref="V-22373" selected="true" />
+ <select idref="V-22374" selected="true" />
+ <select idref="V-22375" selected="true" />
+ <select idref="V-22376" selected="true" />
+ <select idref="V-22377" selected="true" />
+ <select idref="V-22378" selected="true" />
+ <select idref="V-22382" selected="true" />
+ <select idref="V-22383" selected="true" />
+ <select idref="V-22384" selected="true" />
+ <select idref="V-22385" selected="true" />
+ <select idref="V-22386" selected="true" />
+ <select idref="V-22387" selected="true" />
+ <select idref="V-22388" selected="true" />
+ <select idref="V-22389" selected="true" />
+ <select idref="V-22390" selected="true" />
+ <select idref="V-22391" selected="true" />
+ <select idref="V-22392" selected="true" />
+ <select idref="V-22393" selected="true" />
+ <select idref="V-22394" selected="true" />
+ <select idref="V-22395" selected="true" />
+ <select idref="V-22396" selected="true" />
+ <select idref="V-22397" selected="true" />
+ <select idref="V-22398" selected="true" />
+ <select idref="V-22404" selected="true" />
+ <select idref="V-22405" selected="true" />
+ <select idref="V-22406" selected="true" />
+ <select idref="V-22407" selected="true" />
+ <select idref="V-22408" selected="true" />
+ <select idref="V-22409" selected="true" />
+ <select idref="V-22410" selected="true" />
+ <select idref="V-22411" selected="true" />
+ <select idref="V-22414" selected="true" />
+ <select idref="V-22415" selected="true" />
+ <select idref="V-22416" selected="true" />
+ <select idref="V-22417" selected="true" />
+ <select idref="V-22418" selected="true" />
+ <select idref="V-22419" selected="true" />
+ <select idref="V-22421" selected="true" />
+ <select idref="V-22422" selected="true" />
+ <select idref="V-22423" selected="true" />
+ <select idref="V-22424" selected="true" />
+ <select idref="V-22425" selected="true" />
+ <select idref="V-22426" selected="true" />
+ <select idref="V-22427" selected="true" />
+ <select idref="V-22428" selected="true" />
+ <select idref="V-22429" selected="true" />
+ <select idref="V-22430" selected="true" />
+ <select idref="V-22431" selected="true" />
+ <select idref="V-22432" selected="true" />
+ <select idref="V-22433" selected="true" />
+ <select idref="V-22434" selected="true" />
+ <select idref="V-22435" selected="true" />
+ <select idref="V-22436" selected="true" />
+ <select idref="V-22437" selected="true" />
+ <select idref="V-22438" selected="true" />
+ <select idref="V-22439" selected="true" />
+ <select idref="V-22440" selected="true" />
+ <select idref="V-22441" selected="true" />
+ <select idref="V-22442" selected="true" />
+ <select idref="V-22444" selected="true" />
+ <select idref="V-22445" selected="true" />
+ <select idref="V-22446" selected="true" />
+ <select idref="V-22447" selected="true" />
+ <select idref="V-22448" selected="true" />
+ <select idref="V-22449" selected="true" />
+ <select idref="V-22450" selected="true" />
+ <select idref="V-22451" selected="true" />
+ <select idref="V-22452" selected="true" />
+ <select idref="V-22453" selected="true" />
+ <select idref="V-22454" selected="true" />
+ <select idref="V-22455" selected="true" />
+ <select idref="V-22456" selected="true" />
+ <select idref="V-22457" selected="true" />
+ <select idref="V-22458" selected="true" />
+ <select idref="V-22459" selected="true" />
+ <select idref="V-22460" selected="true" />
+ <select idref="V-22461" selected="true" />
+ <select idref="V-22462" selected="true" />
+ <select idref="V-22463" selected="true" />
+ <select idref="V-22470" selected="true" />
+ <select idref="V-22471" selected="true" />
+ <select idref="V-22472" selected="true" />
+ <select idref="V-22473" selected="true" />
+ <select idref="V-22474" selected="true" />
+ <select idref="V-22475" selected="true" />
+ <select idref="V-22485" selected="true" />
+ <select idref="V-22486" selected="true" />
+ <select idref="V-22487" selected="true" />
+ <select idref="V-22488" selected="true" />
+ <select idref="V-22489" selected="true" />
+ <select idref="V-22490" selected="true" />
+ <select idref="V-22491" selected="true" />
+ <select idref="V-22492" selected="true" />
+ <select idref="V-22493" selected="true" />
+ <select idref="V-22496" selected="true" />
+ <select idref="V-22497" selected="true" />
+ <select idref="V-22498" selected="true" />
+ <select idref="V-22499" selected="true" />
+ <select idref="V-22500" selected="true" />
+ <select idref="V-22501" selected="true" />
+ <select idref="V-22502" selected="true" />
+ <select idref="V-22503" selected="true" />
+ <select idref="V-22504" selected="true" />
+ <select idref="V-22505" selected="true" />
+ <select idref="V-22506" selected="true" />
+ <select idref="V-22507" selected="true" />
+ <select idref="V-22508" selected="true" />
+ <select idref="V-22509" selected="true" />
+ <select idref="V-22511" selected="true" />
+ <select idref="V-22514" selected="true" />
+ <select idref="V-22524" selected="true" />
+ <select idref="V-22530" selected="true" />
+ <select idref="V-22533" selected="true" />
+ <select idref="V-22539" selected="true" />
+ <select idref="V-22541" selected="true" />
+ <select idref="V-22542" selected="true" />
+ <select idref="V-22545" selected="true" />
+ <select idref="V-22546" selected="true" />
+ <select idref="V-22547" selected="true" />
+ <select idref="V-22548" selected="true" />
+ <select idref="V-22549" selected="true" />
+ <select idref="V-22550" selected="true" />
+ <select idref="V-22553" selected="true" />
+ <select idref="V-22555" selected="true" />
+ <select idref="V-22556" selected="true" />
+ <select idref="V-22557" selected="true" />
+ <select idref="V-22558" selected="true" />
+ <select idref="V-22559" selected="true" />
+ <select idref="V-22560" selected="true" />
+ <select idref="V-22561" selected="true" />
+ <select idref="V-22562" selected="true" />
+ <select idref="V-22563" selected="true" />
+ <select idref="V-22564" selected="true" />
+ <select idref="V-22565" selected="true" />
+ <select idref="V-22566" selected="true" />
+ <select idref="V-22567" selected="true" />
+ <select idref="V-22568" selected="true" />
+ <select idref="V-22569" selected="true" />
+ <select idref="V-22570" selected="true" />
+ <select idref="V-22571" selected="true" />
+ <select idref="V-22572" selected="true" />
+ <select idref="V-22573" selected="true" />
+ <select idref="V-22574" selected="true" />
+ <select idref="V-22575" selected="true" />
+ <select idref="V-22576" selected="true" />
+ <select idref="V-22577" selected="true" />
+ <select idref="V-22578" selected="true" />
+ <select idref="V-22579" selected="true" />
+ <select idref="V-22580" selected="true" />
+ <select idref="V-22582" selected="true" />
+ <select idref="V-22583" selected="true" />
+ <select idref="V-22584" selected="true" />
+ <select idref="V-22585" selected="true" />
+ <select idref="V-22586" selected="true" />
+ <select idref="V-22587" selected="true" />
+ <select idref="V-22588" selected="true" />
+ <select idref="V-22589" selected="true" />
+ <select idref="V-22595" selected="true" />
+ <select idref="V-22596" selected="true" />
+ <select idref="V-22598" selected="true" />
+ <select idref="V-22665" selected="true" />
+ <select idref="V-22702" selected="true" />
+ <select idref="V-23732" selected="true" />
+ <select idref="V-23736" selected="true" />
+ <select idref="V-23738" selected="true" />
+ <select idref="V-23739" selected="true" />
+ <select idref="V-23741" selected="true" />
+ <select idref="V-23952" selected="true" />
+ <select idref="V-23953" selected="true" />
+ <select idref="V-23972" selected="true" />
+ <select idref="V-24331" selected="true" />
+ <select idref="V-24347" selected="true" />
+ <select idref="V-24357" selected="true" />
+ <select idref="V-24384" selected="true" />
+ <select idref="V-24386" selected="true" />
+ <select idref="V-24624" selected="true" />
+ <select idref="V-27250" selected="true" />
+ <select idref="V-27251" selected="true" />
+ <select idref="V-27275" selected="true" />
+ <select idref="V-27276" selected="true" />
+ <select idref="V-27279" selected="true" />
+ <select idref="V-27283" selected="true" />
+ <select idref="V-27284" selected="true" />
+ <select idref="V-27285" selected="true" />
+ <select idref="V-29236" selected="true" />
+ <select idref="V-29237" selected="true" />
+ <select idref="V-29238" selected="true" />
+ <select idref="V-29239" selected="true" />
+ <select idref="V-29240" selected="true" />
+ <select idref="V-29241" selected="true" />
+ <select idref="V-29242" selected="true" />
+ <select idref="V-29243" selected="true" />
+ <select idref="V-29244" selected="true" />
+ <select idref="V-29245" selected="true" />
+ <select idref="V-29246" selected="true" />
+ <select idref="V-29247" selected="true" />
+ <select idref="V-29248" selected="true" />
+ <select idref="V-29249" selected="true" />
+ <select idref="V-29250" selected="true" />
+ <select idref="V-29251" selected="true" />
+ <select idref="V-29252" selected="true" />
+ <select idref="V-29253" selected="true" />
+ <select idref="V-29255" selected="true" />
+ <select idref="V-29257" selected="true" />
+ <select idref="V-29259" selected="true" />
+ <select idref="V-29261" selected="true" />
+ <select idref="V-29272" selected="true" />
+ <select idref="V-29274" selected="true" />
+ <select idref="V-29275" selected="true" />
+ <select idref="V-29279" selected="true" />
+ <select idref="V-29281" selected="true" />
+ <select idref="V-29284" selected="true" />
+ <select idref="V-29286" selected="true" />
+ <select idref="V-29288" selected="true" />
+ <select idref="V-29289" selected="true" />
+ <select idref="V-29376" selected="true" />
+ </Profile>
+ <Profile id="MAC-1_Sensitive">
+ <title>I - Mission Critical Sensitive</title>
+
<description><ProfileDescription></ProfileDescription></description>
+ <select idref="V-756" selected="true" />
+ <select idref="V-760" selected="true" />
+ <select idref="V-761" selected="true" />
+ <select idref="V-762" selected="true" />
+ <select idref="V-763" selected="true" />
+ <select idref="V-765" selected="true" />
+ <select idref="V-766" selected="true" />
+ <select idref="V-768" selected="true" />
+ <select idref="V-769" selected="true" />
+ <select idref="V-770" selected="true" />
+ <select idref="V-773" selected="true" />
+ <select idref="V-774" selected="true" />
+ <select idref="V-775" selected="true" />
+ <select idref="V-776" selected="true" />
+ <select idref="V-777" selected="true" />
+ <select idref="V-778" selected="true" />
+ <select idref="V-780" selected="true" />
+ <select idref="V-781" selected="true" />
+ <select idref="V-782" selected="true" />
+ <select idref="V-783" selected="true" />
+ <select idref="V-784" selected="true" />
+ <select idref="V-785" selected="true" />
+ <select idref="V-786" selected="true" />
+ <select idref="V-787" selected="true" />
+ <select idref="V-788" selected="true" />
+ <select idref="V-789" selected="true" />
+ <select idref="V-790" selected="true" />
+ <select idref="V-791" selected="true" />
+ <select idref="V-792" selected="true" />
+ <select idref="V-793" selected="true" />
+ <select idref="V-794" selected="true" />
+ <select idref="V-795" selected="true" />
+ <select idref="V-796" selected="true" />
+ <select idref="V-797" selected="true" />
+ <select idref="V-798" selected="true" />
+ <select idref="V-800" selected="true" />
+ <select idref="V-801" selected="true" />
+ <select idref="V-802" selected="true" />
+ <select idref="V-803" selected="true" />
+ <select idref="V-804" selected="true" />
+ <select idref="V-805" selected="true" />
+ <select idref="V-806" selected="true" />
+ <select idref="V-807" selected="true" />
+ <select idref="V-808" selected="true" />
+ <select idref="V-810" selected="true" />
+ <select idref="V-811" selected="true" />
+ <select idref="V-812" selected="true" />
+ <select idref="V-813" selected="true" />
+ <select idref="V-814" selected="true" />
+ <select idref="V-815" selected="true" />
+ <select idref="V-818" selected="true" />
+ <select idref="V-819" selected="true" />
+ <select idref="V-821" selected="true" />
+ <select idref="V-822" selected="true" />
+ <select idref="V-823" selected="true" />
+ <select idref="V-824" selected="true" />
+ <select idref="V-825" selected="true" />
+ <select idref="V-827" selected="true" />
+ <select idref="V-828" selected="true" />
+ <select idref="V-829" selected="true" />
+ <select idref="V-831" selected="true" />
+ <select idref="V-832" selected="true" />
+ <select idref="V-833" selected="true" />
+ <select idref="V-834" selected="true" />
+ <select idref="V-835" selected="true" />
+ <select idref="V-836" selected="true" />
+ <select idref="V-837" selected="true" />
+ <select idref="V-838" selected="true" />
+ <select idref="V-840" selected="true" />
+ <select idref="V-841" selected="true" />
+ <select idref="V-842" selected="true" />
+ <select idref="V-843" selected="true" />
+ <select idref="V-845" selected="true" />
+ <select idref="V-846" selected="true" />
+ <select idref="V-847" selected="true" />
+ <select idref="V-848" selected="true" />
+ <select idref="V-849" selected="true" />
+ <select idref="V-850" selected="true" />
+ <select idref="V-867" selected="true" />
+ <select idref="V-899" selected="true" />
+ <select idref="V-900" selected="true" />
+ <select idref="V-901" selected="true" />
+ <select idref="V-902" selected="true" />
+ <select idref="V-903" selected="true" />
+ <select idref="V-904" selected="true" />
+ <select idref="V-905" selected="true" />
+ <select idref="V-906" selected="true" />
+ <select idref="V-907" selected="true" />
+ <select idref="V-910" selected="true" />
+ <select idref="V-913" selected="true" />
+ <select idref="V-914" selected="true" />
+ <select idref="V-915" selected="true" />
+ <select idref="V-916" selected="true" />
+ <select idref="V-917" selected="true" />
+ <select idref="V-918" selected="true" />
+ <select idref="V-921" selected="true" />
+ <select idref="V-922" selected="true" />
+ <select idref="V-923" selected="true" />
+ <select idref="V-924" selected="true" />
+ <select idref="V-925" selected="true" />
+ <select idref="V-928" selected="true" />
+ <select idref="V-929" selected="true" />
+ <select idref="V-931" selected="true" />
+ <select idref="V-932" selected="true" />
+ <select idref="V-933" selected="true" />
+ <select idref="V-935" selected="true" />
+ <select idref="V-936" selected="true" />
+ <select idref="V-940" selected="true" />
+ <select idref="V-941" selected="true" />
+ <select idref="V-974" selected="true" />
+ <select idref="V-975" selected="true" />
+ <select idref="V-976" selected="true" />
+ <select idref="V-977" selected="true" />
+ <select idref="V-978" selected="true" />
+ <select idref="V-979" selected="true" />
+ <select idref="V-980" selected="true" />
+ <select idref="V-981" selected="true" />
+ <select idref="V-982" selected="true" />
+ <select idref="V-983" selected="true" />
+ <select idref="V-984" selected="true" />
+ <select idref="V-985" selected="true" />
+ <select idref="V-986" selected="true" />
+ <select idref="V-987" selected="true" />
+ <select idref="V-988" selected="true" />
+ <select idref="V-989" selected="true" />
+ <select idref="V-993" selected="true" />
+ <select idref="V-994" selected="true" />
+ <select idref="V-995" selected="true" />
+ <select idref="V-1010" selected="true" />
+ <select idref="V-1011" selected="true" />
+ <select idref="V-1013" selected="true" />
+ <select idref="V-1021" selected="true" />
+ <select idref="V-1022" selected="true" />
+ <select idref="V-1023" selected="true" />
+ <select idref="V-1025" selected="true" />
+ <select idref="V-1026" selected="true" />
+ <select idref="V-1027" selected="true" />
+ <select idref="V-1028" selected="true" />
+ <select idref="V-1029" selected="true" />
+ <select idref="V-1030" selected="true" />
+ <select idref="V-1032" selected="true" />
+ <select idref="V-1046" selected="true" />
+ <select idref="V-1047" selected="true" />
+ <select idref="V-1048" selected="true" />
+ <select idref="V-1049" selected="true" />
+ <select idref="V-1054" selected="true" />
+ <select idref="V-1055" selected="true" />
+ <select idref="V-1056" selected="true" />
+ <select idref="V-1058" selected="true" />
+ <select idref="V-1059" selected="true" />
+ <select idref="V-1061" selected="true" />
+ <select idref="V-1062" selected="true" />
+ <select idref="V-4083" selected="true" />
+ <select idref="V-4084" selected="true" />
+ <select idref="V-4087" selected="true" />
+ <select idref="V-4089" selected="true" />
+ <select idref="V-4090" selected="true" />
+ <select idref="V-4091" selected="true" />
+ <select idref="V-4246" selected="true" />
+ <select idref="V-4247" selected="true" />
+ <select idref="V-4248" selected="true" />
+ <select idref="V-4249" selected="true" />
+ <select idref="V-4250" selected="true" />
+ <select idref="V-4255" selected="true" />
+ <select idref="V-4268" selected="true" />
+ <select idref="V-4269" selected="true" />
+ <select idref="V-4273" selected="true" />
+ <select idref="V-4274" selected="true" />
+ <select idref="V-4275" selected="true" />
+ <select idref="V-4276" selected="true" />
+ <select idref="V-4277" selected="true" />
+ <select idref="V-4278" selected="true" />
+ <select idref="V-4295" selected="true" />
+ <select idref="V-4298" selected="true" />
+ <select idref="V-4301" selected="true" />
+ <select idref="V-4304" selected="true" />
+ <select idref="V-4321" selected="true" />
+ <select idref="V-4334" selected="true" />
+ <select idref="V-4335" selected="true" />
+ <select idref="V-4336" selected="true" />
+ <select idref="V-4339" selected="true" />
+ <select idref="V-4342" selected="true" />
+ <select idref="V-4346" selected="true" />
+ <select idref="V-4357" selected="true" />
+ <select idref="V-4358" selected="true" />
+ <select idref="V-4360" selected="true" />
+ <select idref="V-4361" selected="true" />
+ <select idref="V-4364" selected="true" />
+ <select idref="V-4365" selected="true" />
+ <select idref="V-4366" selected="true" />
+ <select idref="V-4367" selected="true" />
+ <select idref="V-4368" selected="true" />
+ <select idref="V-4369" selected="true" />
+ <select idref="V-4370" selected="true" />
+ <select idref="V-4371" selected="true" />
+ <select idref="V-4382" selected="true" />
+ <select idref="V-4384" selected="true" />
+ <select idref="V-4385" selected="true" />
+ <select idref="V-4387" selected="true" />
+ <select idref="V-4392" selected="true" />
+ <select idref="V-4393" selected="true" />
+ <select idref="V-4394" selected="true" />
+ <select idref="V-4395" selected="true" />
+ <select idref="V-4397" selected="true" />
+ <select idref="V-4398" selected="true" />
+ <select idref="V-4399" selected="true" />
+ <select idref="V-4427" selected="true" />
+ <select idref="V-4428" selected="true" />
+ <select idref="V-4430" selected="true" />
+ <select idref="V-4687" selected="true" />
+ <select idref="V-4688" selected="true" />
+ <select idref="V-4689" selected="true" />
+ <select idref="V-4690" selected="true" />
+ <select idref="V-4691" selected="true" />
+ <select idref="V-4692" selected="true" />
+ <select idref="V-4693" selected="true" />
+ <select idref="V-4694" selected="true" />
+ <select idref="V-4695" selected="true" />
+ <select idref="V-4696" selected="true" />
+ <select idref="V-4697" selected="true" />
+ <select idref="V-4701" selected="true" />
+ <select idref="V-4702" selected="true" />
+ <select idref="V-11940" selected="true" />
+ <select idref="V-11945" selected="true" />
+ <select idref="V-11946" selected="true" />
+ <select idref="V-11947" selected="true" />
+ <select idref="V-11948" selected="true" />
+ <select idref="V-11972" selected="true" />
+ <select idref="V-11973" selected="true" />
+ <select idref="V-11975" selected="true" />
+ <select idref="V-11976" selected="true" />
+ <select idref="V-11977" selected="true" />
+ <select idref="V-11979" selected="true" />
+ <select idref="V-11980" selected="true" />
+ <select idref="V-11981" selected="true" />
+ <select idref="V-11982" selected="true" />
+ <select idref="V-11983" selected="true" />
+ <select idref="V-11984" selected="true" />
+ <select idref="V-11985" selected="true" />
+ <select idref="V-11986" selected="true" />
+ <select idref="V-11987" selected="true" />
+ <select idref="V-11988" selected="true" />
+ <select idref="V-11989" selected="true" />
+ <select idref="V-11990" selected="true" />
+ <select idref="V-11994" selected="true" />
+ <select idref="V-11995" selected="true" />
+ <select idref="V-11996" selected="true" />
+ <select idref="V-11997" selected="true" />
+ <select idref="V-11999" selected="true" />
+ <select idref="V-12002" selected="true" />
+ <select idref="V-12003" selected="true" />
+ <select idref="V-12004" selected="true" />
+ <select idref="V-12005" selected="true" />
+ <select idref="V-12006" selected="true" />
+ <select idref="V-12010" selected="true" />
+ <select idref="V-12011" selected="true" />
+ <select idref="V-12014" selected="true" />
+ <select idref="V-12016" selected="true" />
+ <select idref="V-12017" selected="true" />
+ <select idref="V-12018" selected="true" />
+ <select idref="V-12019" selected="true" />
+ <select idref="V-12020" selected="true" />
+ <select idref="V-12021" selected="true" />
+ <select idref="V-12022" selected="true" />
+ <select idref="V-12023" selected="true" />
+ <select idref="V-12024" selected="true" />
+ <select idref="V-12025" selected="true" />
+ <select idref="V-12026" selected="true" />
+ <select idref="V-12028" selected="true" />
+ <select idref="V-12030" selected="true" />
+ <select idref="V-12038" selected="true" />
+ <select idref="V-12039" selected="true" />
+ <select idref="V-12040" selected="true" />
+ <select idref="V-12049" selected="true" />
+ <select idref="V-12765" selected="true" />
+ <select idref="V-22290" selected="true" />
+ <select idref="V-22291" selected="true" />
+ <select idref="V-22292" selected="true" />
+ <select idref="V-22294" selected="true" />
+ <select idref="V-22295" selected="true" />
+ <select idref="V-22296" selected="true" />
+ <select idref="V-22297" selected="true" />
+ <select idref="V-22298" selected="true" />
+ <select idref="V-22299" selected="true" />
+ <select idref="V-22301" selected="true" />
+ <select idref="V-22302" selected="true" />
+ <select idref="V-22303" selected="true" />
+ <select idref="V-22304" selected="true" />
+ <select idref="V-22305" selected="true" />
+ <select idref="V-22306" selected="true" />
+ <select idref="V-22307" selected="true" />
+ <select idref="V-22308" selected="true" />
+ <select idref="V-22309" selected="true" />
+ <select idref="V-22310" selected="true" />
+ <select idref="V-22311" selected="true" />
+ <select idref="V-22312" selected="true" />
+ <select idref="V-22313" selected="true" />
+ <select idref="V-22314" selected="true" />
+ <select idref="V-22315" selected="true" />
+ <select idref="V-22316" selected="true" />
+ <select idref="V-22317" selected="true" />
+ <select idref="V-22318" selected="true" />
+ <select idref="V-22319" selected="true" />
+ <select idref="V-22320" selected="true" />
+ <select idref="V-22321" selected="true" />
+ <select idref="V-22322" selected="true" />
+ <select idref="V-22323" selected="true" />
+ <select idref="V-22324" selected="true" />
+ <select idref="V-22325" selected="true" />
+ <select idref="V-22326" selected="true" />
+ <select idref="V-22327" selected="true" />
+ <select idref="V-22328" selected="true" />
+ <select idref="V-22329" selected="true" />
+ <select idref="V-22330" selected="true" />
+ <select idref="V-22332" selected="true" />
+ <select idref="V-22333" selected="true" />
+ <select idref="V-22334" selected="true" />
+ <select idref="V-22335" selected="true" />
+ <select idref="V-22336" selected="true" />
+ <select idref="V-22337" selected="true" />
+ <select idref="V-22338" selected="true" />
+ <select idref="V-22339" selected="true" />
+ <select idref="V-22340" selected="true" />
+ <select idref="V-22341" selected="true" />
+ <select idref="V-22342" selected="true" />
+ <select idref="V-22343" selected="true" />
+ <select idref="V-22344" selected="true" />
+ <select idref="V-22347" selected="true" />
+ <select idref="V-22348" selected="true" />
+ <select idref="V-22349" selected="true" />
+ <select idref="V-22350" selected="true" />
+ <select idref="V-22351" selected="true" />
+ <select idref="V-22352" selected="true" />
+ <select idref="V-22353" selected="true" />
+ <select idref="V-22354" selected="true" />
+ <select idref="V-22355" selected="true" />
+ <select idref="V-22356" selected="true" />
+ <select idref="V-22357" selected="true" />
+ <select idref="V-22358" selected="true" />
+ <select idref="V-22359" selected="true" />
+ <select idref="V-22360" selected="true" />
+ <select idref="V-22361" selected="true" />
+ <select idref="V-22362" selected="true" />
+ <select idref="V-22363" selected="true" />
+ <select idref="V-22364" selected="true" />
+ <select idref="V-22365" selected="true" />
+ <select idref="V-22366" selected="true" />
+ <select idref="V-22367" selected="true" />
+ <select idref="V-22368" selected="true" />
+ <select idref="V-22369" selected="true" />
+ <select idref="V-22370" selected="true" />
+ <select idref="V-22371" selected="true" />
+ <select idref="V-22372" selected="true" />
+ <select idref="V-22373" selected="true" />
+ <select idref="V-22374" selected="true" />
+ <select idref="V-22375" selected="true" />
+ <select idref="V-22376" selected="true" />
+ <select idref="V-22377" selected="true" />
+ <select idref="V-22378" selected="true" />
+ <select idref="V-22382" selected="true" />
+ <select idref="V-22383" selected="true" />
+ <select idref="V-22384" selected="true" />
+ <select idref="V-22385" selected="true" />
+ <select idref="V-22386" selected="true" />
+ <select idref="V-22387" selected="true" />
+ <select idref="V-22388" selected="true" />
+ <select idref="V-22389" selected="true" />
+ <select idref="V-22390" selected="true" />
+ <select idref="V-22391" selected="true" />
+ <select idref="V-22392" selected="true" />
+ <select idref="V-22393" selected="true" />
+ <select idref="V-22394" selected="true" />
+ <select idref="V-22395" selected="true" />
+ <select idref="V-22396" selected="true" />
+ <select idref="V-22397" selected="true" />
+ <select idref="V-22398" selected="true" />
+ <select idref="V-22404" selected="true" />
+ <select idref="V-22405" selected="true" />
+ <select idref="V-22406" selected="true" />
+ <select idref="V-22407" selected="true" />
+ <select idref="V-22408" selected="true" />
+ <select idref="V-22409" selected="true" />
+ <select idref="V-22410" selected="true" />
+ <select idref="V-22411" selected="true" />
+ <select idref="V-22414" selected="true" />
+ <select idref="V-22415" selected="true" />
+ <select idref="V-22416" selected="true" />
+ <select idref="V-22417" selected="true" />
+ <select idref="V-22418" selected="true" />
+ <select idref="V-22419" selected="true" />
+ <select idref="V-22421" selected="true" />
+ <select idref="V-22422" selected="true" />
+ <select idref="V-22423" selected="true" />
+ <select idref="V-22424" selected="true" />
+ <select idref="V-22425" selected="true" />
+ <select idref="V-22426" selected="true" />
+ <select idref="V-22427" selected="true" />
+ <select idref="V-22428" selected="true" />
+ <select idref="V-22429" selected="true" />
+ <select idref="V-22430" selected="true" />
+ <select idref="V-22431" selected="true" />
+ <select idref="V-22432" selected="true" />
+ <select idref="V-22433" selected="true" />
+ <select idref="V-22434" selected="true" />
+ <select idref="V-22435" selected="true" />
+ <select idref="V-22436" selected="true" />
+ <select idref="V-22437" selected="true" />
+ <select idref="V-22438" selected="true" />
+ <select idref="V-22439" selected="true" />
+ <select idref="V-22440" selected="true" />
+ <select idref="V-22441" selected="true" />
+ <select idref="V-22442" selected="true" />
+ <select idref="V-22444" selected="true" />
+ <select idref="V-22445" selected="true" />
+ <select idref="V-22446" selected="true" />
+ <select idref="V-22447" selected="true" />
+ <select idref="V-22448" selected="true" />
+ <select idref="V-22449" selected="true" />
+ <select idref="V-22450" selected="true" />
+ <select idref="V-22451" selected="true" />
+ <select idref="V-22452" selected="true" />
+ <select idref="V-22453" selected="true" />
+ <select idref="V-22454" selected="true" />
+ <select idref="V-22455" selected="true" />
+ <select idref="V-22456" selected="true" />
+ <select idref="V-22457" selected="true" />
+ <select idref="V-22458" selected="true" />
+ <select idref="V-22459" selected="true" />
+ <select idref="V-22460" selected="true" />
+ <select idref="V-22461" selected="true" />
+ <select idref="V-22462" selected="true" />
+ <select idref="V-22463" selected="true" />
+ <select idref="V-22470" selected="true" />
+ <select idref="V-22471" selected="true" />
+ <select idref="V-22472" selected="true" />
+ <select idref="V-22473" selected="true" />
+ <select idref="V-22474" selected="true" />
+ <select idref="V-22475" selected="true" />
+ <select idref="V-22485" selected="true" />
+ <select idref="V-22486" selected="true" />
+ <select idref="V-22487" selected="true" />
+ <select idref="V-22488" selected="true" />
+ <select idref="V-22489" selected="true" />
+ <select idref="V-22490" selected="true" />
+ <select idref="V-22491" selected="true" />
+ <select idref="V-22492" selected="true" />
+ <select idref="V-22493" selected="true" />
+ <select idref="V-22496" selected="true" />
+ <select idref="V-22497" selected="true" />
+ <select idref="V-22498" selected="true" />
+ <select idref="V-22499" selected="true" />
+ <select idref="V-22500" selected="true" />
+ <select idref="V-22501" selected="true" />
+ <select idref="V-22502" selected="true" />
+ <select idref="V-22503" selected="true" />
+ <select idref="V-22504" selected="true" />
+ <select idref="V-22505" selected="true" />
+ <select idref="V-22506" selected="true" />
+ <select idref="V-22507" selected="true" />
+ <select idref="V-22508" selected="true" />
+ <select idref="V-22509" selected="true" />
+ <select idref="V-22511" selected="true" />
+ <select idref="V-22514" selected="true" />
+ <select idref="V-22524" selected="true" />
+ <select idref="V-22530" selected="true" />
+ <select idref="V-22533" selected="true" />
+ <select idref="V-22539" selected="true" />
+ <select idref="V-22541" selected="true" />
+ <select idref="V-22542" selected="true" />
+ <select idref="V-22545" selected="true" />
+ <select idref="V-22546" selected="true" />
+ <select idref="V-22547" selected="true" />
+ <select idref="V-22548" selected="true" />
+ <select idref="V-22549" selected="true" />
+ <select idref="V-22550" selected="true" />
+ <select idref="V-22553" selected="true" />
+ <select idref="V-22555" selected="true" />
+ <select idref="V-22556" selected="true" />
+ <select idref="V-22557" selected="true" />
+ <select idref="V-22558" selected="true" />
+ <select idref="V-22559" selected="true" />
+ <select idref="V-22560" selected="true" />
+ <select idref="V-22561" selected="true" />
+ <select idref="V-22562" selected="true" />
+ <select idref="V-22563" selected="true" />
+ <select idref="V-22564" selected="true" />
+ <select idref="V-22565" selected="true" />
+ <select idref="V-22566" selected="true" />
+ <select idref="V-22567" selected="true" />
+ <select idref="V-22568" selected="true" />
+ <select idref="V-22569" selected="true" />
+ <select idref="V-22570" selected="true" />
+ <select idref="V-22571" selected="true" />
+ <select idref="V-22572" selected="true" />
+ <select idref="V-22573" selected="true" />
+ <select idref="V-22574" selected="true" />
+ <select idref="V-22575" selected="true" />
+ <select idref="V-22576" selected="true" />
+ <select idref="V-22577" selected="true" />
+ <select idref="V-22578" selected="true" />
+ <select idref="V-22579" selected="true" />
+ <select idref="V-22580" selected="true" />
+ <select idref="V-22582" selected="true" />
+ <select idref="V-22583" selected="true" />
+ <select idref="V-22584" selected="true" />
+ <select idref="V-22585" selected="true" />
+ <select idref="V-22586" selected="true" />
+ <select idref="V-22587" selected="true" />
+ <select idref="V-22588" selected="true" />
+ <select idref="V-22589" selected="true" />
+ <select idref="V-22595" selected="true" />
+ <select idref="V-22596" selected="true" />
+ <select idref="V-22598" selected="true" />
+ <select idref="V-22665" selected="true" />
+ <select idref="V-22702" selected="true" />
+ <select idref="V-23732" selected="true" />
+ <select idref="V-23736" selected="true" />
+ <select idref="V-23738" selected="true" />
+ <select idref="V-23739" selected="true" />
+ <select idref="V-23741" selected="true" />
+ <select idref="V-23952" selected="true" />
+ <select idref="V-23953" selected="true" />
+ <select idref="V-23972" selected="true" />
+ <select idref="V-24331" selected="true" />
+ <select idref="V-24347" selected="true" />
+ <select idref="V-24357" selected="true" />
+ <select idref="V-24384" selected="true" />
+ <select idref="V-24386" selected="true" />
+ <select idref="V-24624" selected="true" />
+ <select idref="V-27250" selected="true" />
+ <select idref="V-27251" selected="true" />
+ <select idref="V-27275" selected="true" />
+ <select idref="V-27276" selected="true" />
+ <select idref="V-27279" selected="true" />
+ <select idref="V-27283" selected="true" />
+ <select idref="V-27284" selected="true" />
+ <select idref="V-27285" selected="true" />
+ <select idref="V-29236" selected="true" />
+ <select idref="V-29237" selected="true" />
+ <select idref="V-29238" selected="true" />
+ <select idref="V-29239" selected="true" />
+ <select idref="V-29240" selected="true" />
+ <select idref="V-29241" selected="true" />
+ <select idref="V-29242" selected="true" />
+ <select idref="V-29243" selected="true" />
+ <select idref="V-29244" selected="true" />
+ <select idref="V-29245" selected="true" />
+ <select idref="V-29246" selected="true" />
+ <select idref="V-29247" selected="true" />
+ <select idref="V-29248" selected="true" />
+ <select idref="V-29249" selected="true" />
+ <select idref="V-29250" selected="true" />
+ <select idref="V-29251" selected="true" />
+ <select idref="V-29252" selected="true" />
+ <select idref="V-29253" selected="true" />
+ <select idref="V-29255" selected="true" />
+ <select idref="V-29257" selected="true" />
+ <select idref="V-29259" selected="true" />
+ <select idref="V-29261" selected="true" />
+ <select idref="V-29272" selected="true" />
+ <select idref="V-29274" selected="true" />
+ <select idref="V-29275" selected="true" />
+ <select idref="V-29279" selected="true" />
+ <select idref="V-29281" selected="true" />
+ <select idref="V-29284" selected="true" />
+ <select idref="V-29286" selected="true" />
+ <select idref="V-29288" selected="true" />
+ <select idref="V-29289" selected="true" />
+ <select idref="V-29376" selected="true" />
+ </Profile>
+ <Profile id="MAC-1_Classified">
+ <title>I - Mission Critical Classified</title>
+
<description><ProfileDescription></ProfileDescription></description>
+ <select idref="V-756" selected="true" />
+ <select idref="V-760" selected="true" />
+ <select idref="V-761" selected="true" />
+ <select idref="V-762" selected="true" />
+ <select idref="V-763" selected="true" />
+ <select idref="V-765" selected="true" />
+ <select idref="V-766" selected="true" />
+ <select idref="V-768" selected="true" />
+ <select idref="V-769" selected="true" />
+ <select idref="V-770" selected="true" />
+ <select idref="V-773" selected="true" />
+ <select idref="V-774" selected="true" />
+ <select idref="V-775" selected="true" />
+ <select idref="V-776" selected="true" />
+ <select idref="V-777" selected="true" />
+ <select idref="V-778" selected="true" />
+ <select idref="V-780" selected="true" />
+ <select idref="V-781" selected="true" />
+ <select idref="V-782" selected="true" />
+ <select idref="V-783" selected="true" />
+ <select idref="V-784" selected="true" />
+ <select idref="V-785" selected="true" />
+ <select idref="V-786" selected="true" />
+ <select idref="V-787" selected="true" />
+ <select idref="V-788" selected="true" />
+ <select idref="V-789" selected="true" />
+ <select idref="V-790" selected="true" />
+ <select idref="V-791" selected="true" />
+ <select idref="V-792" selected="true" />
+ <select idref="V-793" selected="true" />
+ <select idref="V-794" selected="true" />
+ <select idref="V-795" selected="true" />
+ <select idref="V-796" selected="true" />
+ <select idref="V-797" selected="true" />
+ <select idref="V-798" selected="true" />
+ <select idref="V-800" selected="true" />
+ <select idref="V-801" selected="true" />
+ <select idref="V-802" selected="true" />
+ <select idref="V-803" selected="true" />
+ <select idref="V-804" selected="true" />
+ <select idref="V-805" selected="true" />
+ <select idref="V-806" selected="true" />
+ <select idref="V-807" selected="true" />
+ <select idref="V-808" selected="true" />
+ <select idref="V-810" selected="true" />
+ <select idref="V-811" selected="true" />
+ <select idref="V-812" selected="true" />
+ <select idref="V-813" selected="true" />
+ <select idref="V-814" selected="true" />
+ <select idref="V-815" selected="true" />
+ <select idref="V-818" selected="true" />
+ <select idref="V-819" selected="true" />
+ <select idref="V-821" selected="true" />
+ <select idref="V-822" selected="true" />
+ <select idref="V-823" selected="true" />
+ <select idref="V-824" selected="true" />
+ <select idref="V-825" selected="true" />
+ <select idref="V-827" selected="true" />
+ <select idref="V-828" selected="true" />
+ <select idref="V-829" selected="true" />
+ <select idref="V-831" selected="true" />
+ <select idref="V-832" selected="true" />
+ <select idref="V-833" selected="true" />
+ <select idref="V-834" selected="true" />
+ <select idref="V-835" selected="true" />
+ <select idref="V-836" selected="true" />
+ <select idref="V-837" selected="true" />
+ <select idref="V-838" selected="true" />
+ <select idref="V-840" selected="true" />
+ <select idref="V-841" selected="true" />
+ <select idref="V-842" selected="true" />
+ <select idref="V-843" selected="true" />
+ <select idref="V-845" selected="true" />
+ <select idref="V-846" selected="true" />
+ <select idref="V-847" selected="true" />
+ <select idref="V-848" selected="true" />
+ <select idref="V-849" selected="true" />
+ <select idref="V-850" selected="true" />
+ <select idref="V-867" selected="true" />
+ <select idref="V-899" selected="true" />
+ <select idref="V-900" selected="true" />
+ <select idref="V-901" selected="true" />
+ <select idref="V-902" selected="true" />
+ <select idref="V-903" selected="true" />
+ <select idref="V-904" selected="true" />
+ <select idref="V-905" selected="true" />
+ <select idref="V-906" selected="true" />
+ <select idref="V-907" selected="true" />
+ <select idref="V-910" selected="true" />
+ <select idref="V-913" selected="true" />
+ <select idref="V-914" selected="true" />
+ <select idref="V-915" selected="true" />
+ <select idref="V-916" selected="true" />
+ <select idref="V-917" selected="true" />
+ <select idref="V-918" selected="true" />
+ <select idref="V-921" selected="true" />
+ <select idref="V-922" selected="true" />
+ <select idref="V-923" selected="true" />
+ <select idref="V-924" selected="true" />
+ <select idref="V-925" selected="true" />
+ <select idref="V-928" selected="true" />
+ <select idref="V-929" selected="true" />
+ <select idref="V-931" selected="true" />
+ <select idref="V-932" selected="true" />
+ <select idref="V-933" selected="true" />
+ <select idref="V-935" selected="true" />
+ <select idref="V-936" selected="true" />
+ <select idref="V-940" selected="true" />
+ <select idref="V-941" selected="true" />
+ <select idref="V-974" selected="true" />
+ <select idref="V-975" selected="true" />
+ <select idref="V-976" selected="true" />
+ <select idref="V-977" selected="true" />
+ <select idref="V-978" selected="true" />
+ <select idref="V-979" selected="true" />
+ <select idref="V-980" selected="true" />
+ <select idref="V-981" selected="true" />
+ <select idref="V-982" selected="true" />
+ <select idref="V-983" selected="true" />
+ <select idref="V-984" selected="true" />
+ <select idref="V-985" selected="true" />
+ <select idref="V-986" selected="true" />
+ <select idref="V-987" selected="true" />
+ <select idref="V-988" selected="true" />
+ <select idref="V-989" selected="true" />
+ <select idref="V-993" selected="true" />
+ <select idref="V-994" selected="true" />
+ <select idref="V-995" selected="true" />
+ <select idref="V-1010" selected="true" />
+ <select idref="V-1011" selected="true" />
+ <select idref="V-1013" selected="true" />
+ <select idref="V-1021" selected="true" />
+ <select idref="V-1022" selected="true" />
+ <select idref="V-1023" selected="true" />
+ <select idref="V-1025" selected="true" />
+ <select idref="V-1026" selected="true" />
+ <select idref="V-1027" selected="true" />
+ <select idref="V-1028" selected="true" />
+ <select idref="V-1029" selected="true" />
+ <select idref="V-1030" selected="true" />
+ <select idref="V-1032" selected="true" />
+ <select idref="V-1046" selected="true" />
+ <select idref="V-1047" selected="true" />
+ <select idref="V-1048" selected="true" />
+ <select idref="V-1049" selected="true" />
+ <select idref="V-1054" selected="true" />
+ <select idref="V-1055" selected="true" />
+ <select idref="V-1056" selected="true" />
+ <select idref="V-1058" selected="true" />
+ <select idref="V-1059" selected="true" />
+ <select idref="V-1061" selected="true" />
+ <select idref="V-1062" selected="true" />
+ <select idref="V-4083" selected="true" />
+ <select idref="V-4084" selected="true" />
+ <select idref="V-4087" selected="true" />
+ <select idref="V-4089" selected="true" />
+ <select idref="V-4090" selected="true" />
+ <select idref="V-4091" selected="true" />
+ <select idref="V-4246" selected="true" />
+ <select idref="V-4247" selected="true" />
+ <select idref="V-4248" selected="true" />
+ <select idref="V-4249" selected="true" />
+ <select idref="V-4250" selected="true" />
+ <select idref="V-4255" selected="true" />
+ <select idref="V-4268" selected="true" />
+ <select idref="V-4269" selected="true" />
+ <select idref="V-4273" selected="true" />
+ <select idref="V-4274" selected="true" />
+ <select idref="V-4275" selected="true" />
+ <select idref="V-4276" selected="true" />
+ <select idref="V-4277" selected="true" />
+ <select idref="V-4278" selected="true" />
+ <select idref="V-4295" selected="true" />
+ <select idref="V-4298" selected="true" />
+ <select idref="V-4301" selected="true" />
+ <select idref="V-4304" selected="true" />
+ <select idref="V-4321" selected="true" />
+ <select idref="V-4334" selected="true" />
+ <select idref="V-4335" selected="true" />
+ <select idref="V-4336" selected="true" />
+ <select idref="V-4339" selected="true" />
+ <select idref="V-4342" selected="true" />
+ <select idref="V-4346" selected="true" />
+ <select idref="V-4357" selected="true" />
+ <select idref="V-4358" selected="true" />
+ <select idref="V-4360" selected="true" />
+ <select idref="V-4361" selected="true" />
+ <select idref="V-4364" selected="true" />
+ <select idref="V-4365" selected="true" />
+ <select idref="V-4366" selected="true" />
+ <select idref="V-4367" selected="true" />
+ <select idref="V-4368" selected="true" />
+ <select idref="V-4369" selected="true" />
+ <select idref="V-4370" selected="true" />
+ <select idref="V-4371" selected="true" />
+ <select idref="V-4382" selected="true" />
+ <select idref="V-4384" selected="true" />
+ <select idref="V-4385" selected="true" />
+ <select idref="V-4387" selected="true" />
+ <select idref="V-4392" selected="true" />
+ <select idref="V-4393" selected="true" />
+ <select idref="V-4394" selected="true" />
+ <select idref="V-4395" selected="true" />
+ <select idref="V-4397" selected="true" />
+ <select idref="V-4398" selected="true" />
+ <select idref="V-4399" selected="true" />
+ <select idref="V-4427" selected="true" />
+ <select idref="V-4428" selected="true" />
+ <select idref="V-4430" selected="true" />
+ <select idref="V-4687" selected="true" />
+ <select idref="V-4688" selected="true" />
+ <select idref="V-4689" selected="true" />
+ <select idref="V-4690" selected="true" />
+ <select idref="V-4691" selected="true" />
+ <select idref="V-4692" selected="true" />
+ <select idref="V-4693" selected="true" />
+ <select idref="V-4694" selected="true" />
+ <select idref="V-4695" selected="true" />
+ <select idref="V-4696" selected="true" />
+ <select idref="V-4697" selected="true" />
+ <select idref="V-4701" selected="true" />
+ <select idref="V-4702" selected="true" />
+ <select idref="V-11940" selected="true" />
+ <select idref="V-11945" selected="true" />
+ <select idref="V-11946" selected="true" />
+ <select idref="V-11947" selected="true" />
+ <select idref="V-11948" selected="true" />
+ <select idref="V-11972" selected="true" />
+ <select idref="V-11973" selected="true" />
+ <select idref="V-11975" selected="true" />
+ <select idref="V-11976" selected="true" />
+ <select idref="V-11977" selected="true" />
+ <select idref="V-11979" selected="true" />
+ <select idref="V-11980" selected="true" />
+ <select idref="V-11981" selected="true" />
+ <select idref="V-11982" selected="true" />
+ <select idref="V-11983" selected="true" />
+ <select idref="V-11984" selected="true" />
+ <select idref="V-11985" selected="true" />
+ <select idref="V-11986" selected="true" />
+ <select idref="V-11987" selected="true" />
+ <select idref="V-11988" selected="true" />
+ <select idref="V-11989" selected="true" />
+ <select idref="V-11990" selected="true" />
+ <select idref="V-11994" selected="true" />
+ <select idref="V-11995" selected="true" />
+ <select idref="V-11996" selected="true" />
+ <select idref="V-11997" selected="true" />
+ <select idref="V-11999" selected="true" />
+ <select idref="V-12002" selected="true" />
+ <select idref="V-12003" selected="true" />
+ <select idref="V-12004" selected="true" />
+ <select idref="V-12005" selected="true" />
+ <select idref="V-12006" selected="true" />
+ <select idref="V-12010" selected="true" />
+ <select idref="V-12011" selected="true" />
+ <select idref="V-12014" selected="true" />
+ <select idref="V-12016" selected="true" />
+ <select idref="V-12017" selected="true" />
+ <select idref="V-12018" selected="true" />
+ <select idref="V-12019" selected="true" />
+ <select idref="V-12020" selected="true" />
+ <select idref="V-12021" selected="true" />
+ <select idref="V-12022" selected="true" />
+ <select idref="V-12023" selected="true" />
+ <select idref="V-12024" selected="true" />
+ <select idref="V-12025" selected="true" />
+ <select idref="V-12026" selected="true" />
+ <select idref="V-12028" selected="true" />
+ <select idref="V-12030" selected="true" />
+ <select idref="V-12038" selected="true" />
+ <select idref="V-12039" selected="true" />
+ <select idref="V-12040" selected="true" />
+ <select idref="V-12049" selected="true" />
+ <select idref="V-12765" selected="true" />
+ <select idref="V-22290" selected="true" />
+ <select idref="V-22291" selected="true" />
+ <select idref="V-22292" selected="true" />
+ <select idref="V-22294" selected="true" />
+ <select idref="V-22295" selected="true" />
+ <select idref="V-22296" selected="true" />
+ <select idref="V-22297" selected="true" />
+ <select idref="V-22298" selected="true" />
+ <select idref="V-22299" selected="true" />
+ <select idref="V-22301" selected="true" />
+ <select idref="V-22302" selected="true" />
+ <select idref="V-22303" selected="true" />
+ <select idref="V-22304" selected="true" />
+ <select idref="V-22305" selected="true" />
+ <select idref="V-22306" selected="true" />
+ <select idref="V-22307" selected="true" />
+ <select idref="V-22308" selected="true" />
+ <select idref="V-22309" selected="true" />
+ <select idref="V-22310" selected="true" />
+ <select idref="V-22311" selected="true" />
+ <select idref="V-22312" selected="true" />
+ <select idref="V-22313" selected="true" />
+ <select idref="V-22314" selected="true" />
+ <select idref="V-22315" selected="true" />
+ <select idref="V-22316" selected="true" />
+ <select idref="V-22317" selected="true" />
+ <select idref="V-22318" selected="true" />
+ <select idref="V-22319" selected="true" />
+ <select idref="V-22320" selected="true" />
+ <select idref="V-22321" selected="true" />
+ <select idref="V-22322" selected="true" />
+ <select idref="V-22323" selected="true" />
+ <select idref="V-22324" selected="true" />
+ <select idref="V-22325" selected="true" />
+ <select idref="V-22326" selected="true" />
+ <select idref="V-22327" selected="true" />
+ <select idref="V-22328" selected="true" />
+ <select idref="V-22329" selected="true" />
+ <select idref="V-22330" selected="true" />
+ <select idref="V-22332" selected="true" />
+ <select idref="V-22333" selected="true" />
+ <select idref="V-22334" selected="true" />
+ <select idref="V-22335" selected="true" />
+ <select idref="V-22336" selected="true" />
+ <select idref="V-22337" selected="true" />
+ <select idref="V-22338" selected="true" />
+ <select idref="V-22339" selected="true" />
+ <select idref="V-22340" selected="true" />
+ <select idref="V-22341" selected="true" />
+ <select idref="V-22342" selected="true" />
+ <select idref="V-22343" selected="true" />
+ <select idref="V-22344" selected="true" />
+ <select idref="V-22347" selected="true" />
+ <select idref="V-22348" selected="true" />
+ <select idref="V-22349" selected="true" />
+ <select idref="V-22350" selected="true" />
+ <select idref="V-22351" selected="true" />
+ <select idref="V-22352" selected="true" />
+ <select idref="V-22353" selected="true" />
+ <select idref="V-22354" selected="true" />
+ <select idref="V-22355" selected="true" />
+ <select idref="V-22356" selected="true" />
+ <select idref="V-22357" selected="true" />
+ <select idref="V-22358" selected="true" />
+ <select idref="V-22359" selected="true" />
+ <select idref="V-22360" selected="true" />
+ <select idref="V-22361" selected="true" />
+ <select idref="V-22362" selected="true" />
+ <select idref="V-22363" selected="true" />
+ <select idref="V-22364" selected="true" />
+ <select idref="V-22365" selected="true" />
+ <select idref="V-22366" selected="true" />
+ <select idref="V-22367" selected="true" />
+ <select idref="V-22368" selected="true" />
+ <select idref="V-22369" selected="true" />
+ <select idref="V-22370" selected="true" />
+ <select idref="V-22371" selected="true" />
+ <select idref="V-22372" selected="true" />
+ <select idref="V-22373" selected="true" />
+ <select idref="V-22374" selected="true" />
+ <select idref="V-22375" selected="true" />
+ <select idref="V-22376" selected="true" />
+ <select idref="V-22377" selected="true" />
+ <select idref="V-22378" selected="true" />
+ <select idref="V-22382" selected="true" />
+ <select idref="V-22383" selected="true" />
+ <select idref="V-22384" selected="true" />
+ <select idref="V-22385" selected="true" />
+ <select idref="V-22386" selected="true" />
+ <select idref="V-22387" selected="true" />
+ <select idref="V-22388" selected="true" />
+ <select idref="V-22389" selected="true" />
+ <select idref="V-22390" selected="true" />
+ <select idref="V-22391" selected="true" />
+ <select idref="V-22392" selected="true" />
+ <select idref="V-22393" selected="true" />
+ <select idref="V-22394" selected="true" />
+ <select idref="V-22395" selected="true" />
+ <select idref="V-22396" selected="true" />
+ <select idref="V-22397" selected="true" />
+ <select idref="V-22398" selected="true" />
+ <select idref="V-22404" selected="true" />
+ <select idref="V-22405" selected="true" />
+ <select idref="V-22406" selected="true" />
+ <select idref="V-22407" selected="true" />
+ <select idref="V-22408" selected="true" />
+ <select idref="V-22409" selected="true" />
+ <select idref="V-22410" selected="true" />
+ <select idref="V-22411" selected="true" />
+ <select idref="V-22414" selected="true" />
+ <select idref="V-22415" selected="true" />
+ <select idref="V-22416" selected="true" />
+ <select idref="V-22417" selected="true" />
+ <select idref="V-22418" selected="true" />
+ <select idref="V-22419" selected="true" />
+ <select idref="V-22421" selected="true" />
+ <select idref="V-22422" selected="true" />
+ <select idref="V-22423" selected="true" />
+ <select idref="V-22424" selected="true" />
+ <select idref="V-22425" selected="true" />
+ <select idref="V-22426" selected="true" />
+ <select idref="V-22427" selected="true" />
+ <select idref="V-22428" selected="true" />
+ <select idref="V-22429" selected="true" />
+ <select idref="V-22430" selected="true" />
+ <select idref="V-22431" selected="true" />
+ <select idref="V-22432" selected="true" />
+ <select idref="V-22433" selected="true" />
+ <select idref="V-22434" selected="true" />
+ <select idref="V-22435" selected="true" />
+ <select idref="V-22436" selected="true" />
+ <select idref="V-22437" selected="true" />
+ <select idref="V-22438" selected="true" />
+ <select idref="V-22439" selected="true" />
+ <select idref="V-22440" selected="true" />
+ <select idref="V-22441" selected="true" />
+ <select idref="V-22442" selected="true" />
+ <select idref="V-22444" selected="true" />
+ <select idref="V-22445" selected="true" />
+ <select idref="V-22446" selected="true" />
+ <select idref="V-22447" selected="true" />
+ <select idref="V-22448" selected="true" />
+ <select idref="V-22449" selected="true" />
+ <select idref="V-22450" selected="true" />
+ <select idref="V-22451" selected="true" />
+ <select idref="V-22452" selected="true" />
+ <select idref="V-22453" selected="true" />
+ <select idref="V-22454" selected="true" />
+ <select idref="V-22455" selected="true" />
+ <select idref="V-22456" selected="true" />
+ <select idref="V-22457" selected="true" />
+ <select idref="V-22458" selected="true" />
+ <select idref="V-22459" selected="true" />
+ <select idref="V-22460" selected="true" />
+ <select idref="V-22461" selected="true" />
+ <select idref="V-22462" selected="true" />
+ <select idref="V-22463" selected="true" />
+ <select idref="V-22470" selected="true" />
+ <select idref="V-22471" selected="true" />
+ <select idref="V-22472" selected="true" />
+ <select idref="V-22473" selected="true" />
+ <select idref="V-22474" selected="true" />
+ <select idref="V-22475" selected="true" />
+ <select idref="V-22485" selected="true" />
+ <select idref="V-22486" selected="true" />
+ <select idref="V-22487" selected="true" />
+ <select idref="V-22488" selected="true" />
+ <select idref="V-22489" selected="true" />
+ <select idref="V-22490" selected="true" />
+ <select idref="V-22491" selected="true" />
+ <select idref="V-22492" selected="true" />
+ <select idref="V-22493" selected="true" />
+ <select idref="V-22496" selected="true" />
+ <select idref="V-22497" selected="true" />
+ <select idref="V-22498" selected="true" />
+ <select idref="V-22499" selected="true" />
+ <select idref="V-22500" selected="true" />
+ <select idref="V-22501" selected="true" />
+ <select idref="V-22502" selected="true" />
+ <select idref="V-22503" selected="true" />
+ <select idref="V-22504" selected="true" />
+ <select idref="V-22505" selected="true" />
+ <select idref="V-22506" selected="true" />
+ <select idref="V-22507" selected="true" />
+ <select idref="V-22508" selected="true" />
+ <select idref="V-22509" selected="true" />
+ <select idref="V-22511" selected="true" />
+ <select idref="V-22514" selected="true" />
+ <select idref="V-22524" selected="true" />
+ <select idref="V-22530" selected="true" />
+ <select idref="V-22533" selected="true" />
+ <select idref="V-22539" selected="true" />
+ <select idref="V-22541" selected="true" />
+ <select idref="V-22542" selected="true" />
+ <select idref="V-22545" selected="true" />
+ <select idref="V-22546" selected="true" />
+ <select idref="V-22547" selected="true" />
+ <select idref="V-22548" selected="true" />
+ <select idref="V-22549" selected="true" />
+ <select idref="V-22550" selected="true" />
+ <select idref="V-22553" selected="true" />
+ <select idref="V-22555" selected="true" />
+ <select idref="V-22556" selected="true" />
+ <select idref="V-22557" selected="true" />
+ <select idref="V-22558" selected="true" />
+ <select idref="V-22559" selected="true" />
+ <select idref="V-22560" selected="true" />
+ <select idref="V-22561" selected="true" />
+ <select idref="V-22562" selected="true" />
+ <select idref="V-22563" selected="true" />
+ <select idref="V-22564" selected="true" />
+ <select idref="V-22565" selected="true" />
+ <select idref="V-22566" selected="true" />
+ <select idref="V-22567" selected="true" />
+ <select idref="V-22568" selected="true" />
+ <select idref="V-22569" selected="true" />
+ <select idref="V-22570" selected="true" />
+ <select idref="V-22571" selected="true" />
+ <select idref="V-22572" selected="true" />
+ <select idref="V-22573" selected="true" />
+ <select idref="V-22574" selected="true" />
+ <select idref="V-22575" selected="true" />
+ <select idref="V-22576" selected="true" />
+ <select idref="V-22577" selected="true" />
+ <select idref="V-22578" selected="true" />
+ <select idref="V-22579" selected="true" />
+ <select idref="V-22580" selected="true" />
+ <select idref="V-22582" selected="true" />
+ <select idref="V-22583" selected="true" />
+ <select idref="V-22584" selected="true" />
+ <select idref="V-22585" selected="true" />
+ <select idref="V-22586" selected="true" />
+ <select idref="V-22587" selected="true" />
+ <select idref="V-22588" selected="true" />
+ <select idref="V-22589" selected="true" />
+ <select idref="V-22595" selected="true" />
+ <select idref="V-22596" selected="true" />
+ <select idref="V-22598" selected="true" />
+ <select idref="V-22665" selected="true" />
+ <select idref="V-22702" selected="true" />
+ <select idref="V-23732" selected="true" />
+ <select idref="V-23736" selected="true" />
+ <select idref="V-23738" selected="true" />
+ <select idref="V-23739" selected="true" />
+ <select idref="V-23741" selected="true" />
+ <select idref="V-23952" selected="true" />
+ <select idref="V-23953" selected="true" />
+ <select idref="V-23972" selected="true" />
+ <select idref="V-24331" selected="true" />
+ <select idref="V-24347" selected="true" />
+ <select idref="V-24357" selected="true" />
+ <select idref="V-24384" selected="true" />
+ <select idref="V-24386" selected="true" />
+ <select idref="V-24624" selected="true" />
+ <select idref="V-27250" selected="true" />
+ <select idref="V-27251" selected="true" />
+ <select idref="V-27275" selected="true" />
+ <select idref="V-27276" selected="true" />
+ <select idref="V-27279" selected="true" />
+ <select idref="V-27283" selected="true" />
+ <select idref="V-27284" selected="true" />
+ <select idref="V-27285" selected="true" />
+ <select idref="V-29236" selected="true" />
+ <select idref="V-29237" selected="true" />
+ <select idref="V-29238" selected="true" />
+ <select idref="V-29239" selected="true" />
+ <select idref="V-29240" selected="true" />
+ <select idref="V-29241" selected="true" />
+ <select idref="V-29242" selected="true" />
+ <select idref="V-29243" selected="true" />
+ <select idref="V-29244" selected="true" />
+ <select idref="V-29245" selected="true" />
+ <select idref="V-29246" selected="true" />
+ <select idref="V-29247" selected="true" />
+ <select idref="V-29248" selected="true" />
+ <select idref="V-29249" selected="true" />
+ <select idref="V-29250" selected="true" />
+ <select idref="V-29251" selected="true" />
+ <select idref="V-29252" selected="true" />
+ <select idref="V-29253" selected="true" />
+ <select idref="V-29255" selected="true" />
+ <select idref="V-29257" selected="true" />
+ <select idref="V-29259" selected="true" />
+ <select idref="V-29261" selected="true" />
+ <select idref="V-29272" selected="true" />
+ <select idref="V-29274" selected="true" />
+ <select idref="V-29275" selected="true" />
+ <select idref="V-29279" selected="true" />
+ <select idref="V-29281" selected="true" />
+ <select idref="V-29284" selected="true" />
+ <select idref="V-29286" selected="true" />
+ <select idref="V-29288" selected="true" />
+ <select idref="V-29289" selected="true" />
+ <select idref="V-29376" selected="true" />
+ </Profile>
+ <Profile id="MAC-2_Public">
+ <title>II - Mission Support Public</title>
+
<description><ProfileDescription></ProfileDescription></description>
+ <select idref="V-756" selected="true" />
+ <select idref="V-761" selected="true" />
+ <select idref="V-763" selected="true" />
+ <select idref="V-765" selected="true" />
+ <select idref="V-769" selected="true" />
+ <select idref="V-770" selected="true" />
+ <select idref="V-773" selected="true" />
+ <select idref="V-774" selected="true" />
+ <select idref="V-775" selected="true" />
+ <select idref="V-776" selected="true" />
+ <select idref="V-777" selected="true" />
+ <select idref="V-780" selected="true" />
+ <select idref="V-781" selected="true" />
+ <select idref="V-782" selected="true" />
+ <select idref="V-783" selected="true" />
+ <select idref="V-784" selected="true" />
+ <select idref="V-785" selected="true" />
+ <select idref="V-786" selected="true" />
+ <select idref="V-787" selected="true" />
+ <select idref="V-788" selected="true" />
+ <select idref="V-789" selected="true" />
+ <select idref="V-790" selected="true" />
+ <select idref="V-791" selected="true" />
+ <select idref="V-792" selected="true" />
+ <select idref="V-793" selected="true" />
+ <select idref="V-794" selected="true" />
+ <select idref="V-795" selected="true" />
+ <select idref="V-796" selected="true" />
+ <select idref="V-797" selected="true" />
+ <select idref="V-798" selected="true" />
+ <select idref="V-800" selected="true" />
+ <select idref="V-801" selected="true" />
+ <select idref="V-802" selected="true" />
+ <select idref="V-803" selected="true" />
+ <select idref="V-804" selected="true" />
+ <select idref="V-805" selected="true" />
+ <select idref="V-806" selected="true" />
+ <select idref="V-807" selected="true" />
+ <select idref="V-808" selected="true" />
+ <select idref="V-812" selected="true" />
+ <select idref="V-813" selected="true" />
+ <select idref="V-814" selected="true" />
+ <select idref="V-815" selected="true" />
+ <select idref="V-818" selected="true" />
+ <select idref="V-819" selected="true" />
+ <select idref="V-821" selected="true" />
+ <select idref="V-822" selected="true" />
+ <select idref="V-823" selected="true" />
+ <select idref="V-824" selected="true" />
+ <select idref="V-825" selected="true" />
+ <select idref="V-827" selected="true" />
+ <select idref="V-828" selected="true" />
+ <select idref="V-829" selected="true" />
+ <select idref="V-831" selected="true" />
+ <select idref="V-832" selected="true" />
+ <select idref="V-833" selected="true" />
+ <select idref="V-834" selected="true" />
+ <select idref="V-835" selected="true" />
+ <select idref="V-836" selected="true" />
+ <select idref="V-837" selected="true" />
+ <select idref="V-838" selected="true" />
+ <select idref="V-840" selected="true" />
+ <select idref="V-841" selected="true" />
+ <select idref="V-842" selected="true" />
+ <select idref="V-843" selected="true" />
+ <select idref="V-845" selected="true" />
+ <select idref="V-846" selected="true" />
+ <select idref="V-847" selected="true" />
+ <select idref="V-848" selected="true" />
+ <select idref="V-849" selected="true" />
+ <select idref="V-850" selected="true" />
+ <select idref="V-867" selected="true" />
+ <select idref="V-899" selected="true" />
+ <select idref="V-900" selected="true" />
+ <select idref="V-901" selected="true" />
+ <select idref="V-902" selected="true" />
+ <select idref="V-903" selected="true" />
+ <select idref="V-904" selected="true" />
+ <select idref="V-905" selected="true" />
+ <select idref="V-906" selected="true" />
+ <select idref="V-907" selected="true" />
+ <select idref="V-910" selected="true" />
+ <select idref="V-913" selected="true" />
+ <select idref="V-914" selected="true" />
+ <select idref="V-915" selected="true" />
+ <select idref="V-916" selected="true" />
+ <select idref="V-917" selected="true" />
+ <select idref="V-918" selected="true" />
+ <select idref="V-921" selected="true" />
+ <select idref="V-922" selected="true" />
+ <select idref="V-923" selected="true" />
+ <select idref="V-924" selected="true" />
+ <select idref="V-925" selected="true" />
+ <select idref="V-928" selected="true" />
+ <select idref="V-929" selected="true" />
+ <select idref="V-931" selected="true" />
+ <select idref="V-932" selected="true" />
+ <select idref="V-933" selected="true" />
+ <select idref="V-935" selected="true" />
+ <select idref="V-936" selected="true" />
+ <select idref="V-940" selected="true" />
+ <select idref="V-941" selected="true" />
+ <select idref="V-974" selected="true" />
+ <select idref="V-975" selected="true" />
+ <select idref="V-976" selected="true" />
+ <select idref="V-977" selected="true" />
+ <select idref="V-978" selected="true" />
+ <select idref="V-979" selected="true" />
+ <select idref="V-980" selected="true" />
+ <select idref="V-981" selected="true" />
+ <select idref="V-982" selected="true" />
+ <select idref="V-983" selected="true" />
+ <select idref="V-984" selected="true" />
+ <select idref="V-985" selected="true" />
+ <select idref="V-986" selected="true" />
+ <select idref="V-987" selected="true" />
+ <select idref="V-988" selected="true" />
+ <select idref="V-989" selected="true" />
+ <select idref="V-993" selected="true" />
+ <select idref="V-994" selected="true" />
+ <select idref="V-995" selected="true" />
+ <select idref="V-1010" selected="true" />
+ <select idref="V-1011" selected="true" />
+ <select idref="V-1013" selected="true" />
+ <select idref="V-1021" selected="true" />
+ <select idref="V-1022" selected="true" />
+ <select idref="V-1023" selected="true" />
+ <select idref="V-1025" selected="true" />
+ <select idref="V-1026" selected="true" />
+ <select idref="V-1027" selected="true" />
+ <select idref="V-1028" selected="true" />
+ <select idref="V-1029" selected="true" />
+ <select idref="V-1030" selected="true" />
+ <select idref="V-1032" selected="true" />
+ <select idref="V-1046" selected="true" />
+ <select idref="V-1047" selected="true" />
+ <select idref="V-1048" selected="true" />
+ <select idref="V-1049" selected="true" />
+ <select idref="V-1054" selected="true" />
+ <select idref="V-1055" selected="true" />
+ <select idref="V-1056" selected="true" />
+ <select idref="V-1058" selected="true" />
+ <select idref="V-1059" selected="true" />
+ <select idref="V-1061" selected="true" />
+ <select idref="V-1062" selected="true" />
+ <select idref="V-4083" selected="true" />
+ <select idref="V-4084" selected="true" />
+ <select idref="V-4087" selected="true" />
+ <select idref="V-4089" selected="true" />
+ <select idref="V-4090" selected="true" />
+ <select idref="V-4091" selected="true" />
+ <select idref="V-4246" selected="true" />
+ <select idref="V-4247" selected="true" />
+ <select idref="V-4248" selected="true" />
+ <select idref="V-4249" selected="true" />
+ <select idref="V-4250" selected="true" />
+ <select idref="V-4255" selected="true" />
+ <select idref="V-4268" selected="true" />
+ <select idref="V-4269" selected="true" />
+ <select idref="V-4273" selected="true" />
+ <select idref="V-4274" selected="true" />
+ <select idref="V-4275" selected="true" />
+ <select idref="V-4276" selected="true" />
+ <select idref="V-4277" selected="true" />
+ <select idref="V-4278" selected="true" />
+ <select idref="V-4295" selected="true" />
+ <select idref="V-4298" selected="true" />
+ <select idref="V-4301" selected="true" />
+ <select idref="V-4304" selected="true" />
+ <select idref="V-4321" selected="true" />
+ <select idref="V-4334" selected="true" />
+ <select idref="V-4335" selected="true" />
+ <select idref="V-4336" selected="true" />
+ <select idref="V-4339" selected="true" />
+ <select idref="V-4342" selected="true" />
+ <select idref="V-4346" selected="true" />
+ <select idref="V-4357" selected="true" />
+ <select idref="V-4358" selected="true" />
+ <select idref="V-4360" selected="true" />
+ <select idref="V-4361" selected="true" />
+ <select idref="V-4364" selected="true" />
+ <select idref="V-4365" selected="true" />
+ <select idref="V-4366" selected="true" />
+ <select idref="V-4367" selected="true" />
+ <select idref="V-4368" selected="true" />
+ <select idref="V-4369" selected="true" />
+ <select idref="V-4370" selected="true" />
+ <select idref="V-4371" selected="true" />
+ <select idref="V-4382" selected="true" />
+ <select idref="V-4384" selected="true" />
+ <select idref="V-4385" selected="true" />
+ <select idref="V-4387" selected="true" />
+ <select idref="V-4392" selected="true" />
+ <select idref="V-4393" selected="true" />
+ <select idref="V-4394" selected="true" />
+ <select idref="V-4395" selected="true" />
+ <select idref="V-4397" selected="true" />
+ <select idref="V-4398" selected="true" />
+ <select idref="V-4399" selected="true" />
+ <select idref="V-4427" selected="true" />
+ <select idref="V-4428" selected="true" />
+ <select idref="V-4430" selected="true" />
+ <select idref="V-4687" selected="true" />
+ <select idref="V-4688" selected="true" />
+ <select idref="V-4689" selected="true" />
+ <select idref="V-4690" selected="true" />
+ <select idref="V-4691" selected="true" />
+ <select idref="V-4692" selected="true" />
+ <select idref="V-4693" selected="true" />
+ <select idref="V-4694" selected="true" />
+ <select idref="V-4695" selected="true" />
+ <select idref="V-4696" selected="true" />
+ <select idref="V-4697" selected="true" />
+ <select idref="V-4701" selected="true" />
+ <select idref="V-4702" selected="true" />
+ <select idref="V-11940" selected="true" />
+ <select idref="V-11945" selected="true" />
+ <select idref="V-11946" selected="true" />
+ <select idref="V-11947" selected="true" />
+ <select idref="V-11948" selected="true" />
+ <select idref="V-11972" selected="true" />
+ <select idref="V-11973" selected="true" />
+ <select idref="V-11975" selected="true" />
+ <select idref="V-11976" selected="true" />
+ <select idref="V-11977" selected="true" />
+ <select idref="V-11979" selected="true" />
+ <select idref="V-11980" selected="true" />
+ <select idref="V-11981" selected="true" />
+ <select idref="V-11982" selected="true" />
+ <select idref="V-11983" selected="true" />
+ <select idref="V-11984" selected="true" />
+ <select idref="V-11985" selected="true" />
+ <select idref="V-11986" selected="true" />
+ <select idref="V-11987" selected="true" />
+ <select idref="V-11988" selected="true" />
+ <select idref="V-11989" selected="true" />
+ <select idref="V-11990" selected="true" />
+ <select idref="V-11994" selected="true" />
+ <select idref="V-11995" selected="true" />
+ <select idref="V-11996" selected="true" />
+ <select idref="V-11997" selected="true" />
+ <select idref="V-11999" selected="true" />
+ <select idref="V-12002" selected="true" />
+ <select idref="V-12003" selected="true" />
+ <select idref="V-12004" selected="true" />
+ <select idref="V-12005" selected="true" />
+ <select idref="V-12006" selected="true" />
+ <select idref="V-12010" selected="true" />
+ <select idref="V-12011" selected="true" />
+ <select idref="V-12014" selected="true" />
+ <select idref="V-12016" selected="true" />
+ <select idref="V-12017" selected="true" />
+ <select idref="V-12018" selected="true" />
+ <select idref="V-12019" selected="true" />
+ <select idref="V-12020" selected="true" />
+ <select idref="V-12021" selected="true" />
+ <select idref="V-12022" selected="true" />
+ <select idref="V-12023" selected="true" />
+ <select idref="V-12024" selected="true" />
+ <select idref="V-12025" selected="true" />
+ <select idref="V-12026" selected="true" />
+ <select idref="V-12028" selected="true" />
+ <select idref="V-12030" selected="true" />
+ <select idref="V-12038" selected="true" />
+ <select idref="V-12039" selected="true" />
+ <select idref="V-12040" selected="true" />
+ <select idref="V-12049" selected="true" />
+ <select idref="V-12765" selected="true" />
+ <select idref="V-22290" selected="true" />
+ <select idref="V-22291" selected="true" />
+ <select idref="V-22292" selected="true" />
+ <select idref="V-22294" selected="true" />
+ <select idref="V-22295" selected="true" />
+ <select idref="V-22296" selected="true" />
+ <select idref="V-22297" selected="true" />
+ <select idref="V-22298" selected="true" />
+ <select idref="V-22299" selected="true" />
+ <select idref="V-22301" selected="true" />
+ <select idref="V-22302" selected="true" />
+ <select idref="V-22303" selected="true" />
+ <select idref="V-22304" selected="true" />
+ <select idref="V-22305" selected="true" />
+ <select idref="V-22306" selected="true" />
+ <select idref="V-22307" selected="true" />
+ <select idref="V-22308" selected="true" />
+ <select idref="V-22309" selected="true" />
+ <select idref="V-22310" selected="true" />
+ <select idref="V-22311" selected="true" />
+ <select idref="V-22312" selected="true" />
+ <select idref="V-22313" selected="true" />
+ <select idref="V-22314" selected="true" />
+ <select idref="V-22315" selected="true" />
+ <select idref="V-22316" selected="true" />
+ <select idref="V-22317" selected="true" />
+ <select idref="V-22318" selected="true" />
+ <select idref="V-22319" selected="true" />
+ <select idref="V-22320" selected="true" />
+ <select idref="V-22321" selected="true" />
+ <select idref="V-22322" selected="true" />
+ <select idref="V-22323" selected="true" />
+ <select idref="V-22324" selected="true" />
+ <select idref="V-22325" selected="true" />
+ <select idref="V-22326" selected="true" />
+ <select idref="V-22327" selected="true" />
+ <select idref="V-22328" selected="true" />
+ <select idref="V-22329" selected="true" />
+ <select idref="V-22330" selected="true" />
+ <select idref="V-22332" selected="true" />
+ <select idref="V-22333" selected="true" />
+ <select idref="V-22334" selected="true" />
+ <select idref="V-22335" selected="true" />
+ <select idref="V-22336" selected="true" />
+ <select idref="V-22337" selected="true" />
+ <select idref="V-22338" selected="true" />
+ <select idref="V-22339" selected="true" />
+ <select idref="V-22340" selected="true" />
+ <select idref="V-22341" selected="true" />
+ <select idref="V-22342" selected="true" />
+ <select idref="V-22343" selected="true" />
+ <select idref="V-22344" selected="true" />
+ <select idref="V-22347" selected="true" />
+ <select idref="V-22348" selected="true" />
+ <select idref="V-22349" selected="true" />
+ <select idref="V-22350" selected="true" />
+ <select idref="V-22351" selected="true" />
+ <select idref="V-22352" selected="true" />
+ <select idref="V-22353" selected="true" />
+ <select idref="V-22354" selected="true" />
+ <select idref="V-22355" selected="true" />
+ <select idref="V-22356" selected="true" />
+ <select idref="V-22357" selected="true" />
+ <select idref="V-22358" selected="true" />
+ <select idref="V-22359" selected="true" />
+ <select idref="V-22360" selected="true" />
+ <select idref="V-22361" selected="true" />
+ <select idref="V-22362" selected="true" />
+ <select idref="V-22363" selected="true" />
+ <select idref="V-22364" selected="true" />
+ <select idref="V-22365" selected="true" />
+ <select idref="V-22366" selected="true" />
+ <select idref="V-22367" selected="true" />
+ <select idref="V-22368" selected="true" />
+ <select idref="V-22369" selected="true" />
+ <select idref="V-22370" selected="true" />
+ <select idref="V-22371" selected="true" />
+ <select idref="V-22372" selected="true" />
+ <select idref="V-22373" selected="true" />
+ <select idref="V-22374" selected="true" />
+ <select idref="V-22375" selected="true" />
+ <select idref="V-22376" selected="true" />
+ <select idref="V-22377" selected="true" />
+ <select idref="V-22378" selected="true" />
+ <select idref="V-22382" selected="true" />
+ <select idref="V-22383" selected="true" />
+ <select idref="V-22384" selected="true" />
+ <select idref="V-22385" selected="true" />
+ <select idref="V-22386" selected="true" />
+ <select idref="V-22387" selected="true" />
+ <select idref="V-22388" selected="true" />
+ <select idref="V-22389" selected="true" />
+ <select idref="V-22390" selected="true" />
+ <select idref="V-22391" selected="true" />
+ <select idref="V-22392" selected="true" />
+ <select idref="V-22393" selected="true" />
+ <select idref="V-22394" selected="true" />
+ <select idref="V-22395" selected="true" />
+ <select idref="V-22396" selected="true" />
+ <select idref="V-22397" selected="true" />
+ <select idref="V-22398" selected="true" />
+ <select idref="V-22404" selected="true" />
+ <select idref="V-22405" selected="true" />
+ <select idref="V-22406" selected="true" />
+ <select idref="V-22407" selected="true" />
+ <select idref="V-22408" selected="true" />
+ <select idref="V-22409" selected="true" />
+ <select idref="V-22410" selected="true" />
+ <select idref="V-22411" selected="true" />
+ <select idref="V-22414" selected="true" />
+ <select idref="V-22415" selected="true" />
+ <select idref="V-22416" selected="true" />
+ <select idref="V-22417" selected="true" />
+ <select idref="V-22418" selected="true" />
+ <select idref="V-22419" selected="true" />
+ <select idref="V-22421" selected="true" />
+ <select idref="V-22422" selected="true" />
+ <select idref="V-22423" selected="true" />
+ <select idref="V-22424" selected="true" />
+ <select idref="V-22425" selected="true" />
+ <select idref="V-22426" selected="true" />
+ <select idref="V-22427" selected="true" />
+ <select idref="V-22428" selected="true" />
+ <select idref="V-22429" selected="true" />
+ <select idref="V-22430" selected="true" />
+ <select idref="V-22431" selected="true" />
+ <select idref="V-22432" selected="true" />
+ <select idref="V-22433" selected="true" />
+ <select idref="V-22434" selected="true" />
+ <select idref="V-22435" selected="true" />
+ <select idref="V-22436" selected="true" />
+ <select idref="V-22437" selected="true" />
+ <select idref="V-22438" selected="true" />
+ <select idref="V-22439" selected="true" />
+ <select idref="V-22440" selected="true" />
+ <select idref="V-22441" selected="true" />
+ <select idref="V-22442" selected="true" />
+ <select idref="V-22444" selected="true" />
+ <select idref="V-22445" selected="true" />
+ <select idref="V-22446" selected="true" />
+ <select idref="V-22447" selected="true" />
+ <select idref="V-22448" selected="true" />
+ <select idref="V-22449" selected="true" />
+ <select idref="V-22450" selected="true" />
+ <select idref="V-22451" selected="true" />
+ <select idref="V-22452" selected="true" />
+ <select idref="V-22453" selected="true" />
+ <select idref="V-22454" selected="true" />
+ <select idref="V-22455" selected="true" />
+ <select idref="V-22456" selected="true" />
+ <select idref="V-22457" selected="true" />
+ <select idref="V-22458" selected="true" />
+ <select idref="V-22459" selected="true" />
+ <select idref="V-22460" selected="true" />
+ <select idref="V-22461" selected="true" />
+ <select idref="V-22462" selected="true" />
+ <select idref="V-22463" selected="true" />
+ <select idref="V-22470" selected="true" />
+ <select idref="V-22471" selected="true" />
+ <select idref="V-22472" selected="true" />
+ <select idref="V-22473" selected="true" />
+ <select idref="V-22474" selected="true" />
+ <select idref="V-22475" selected="true" />
+ <select idref="V-22485" selected="true" />
+ <select idref="V-22486" selected="true" />
+ <select idref="V-22487" selected="true" />
+ <select idref="V-22488" selected="true" />
+ <select idref="V-22489" selected="true" />
+ <select idref="V-22490" selected="true" />
+ <select idref="V-22491" selected="true" />
+ <select idref="V-22492" selected="true" />
+ <select idref="V-22493" selected="true" />
+ <select idref="V-22496" selected="true" />
+ <select idref="V-22497" selected="true" />
+ <select idref="V-22498" selected="true" />
+ <select idref="V-22499" selected="true" />
+ <select idref="V-22500" selected="true" />
+ <select idref="V-22501" selected="true" />
+ <select idref="V-22502" selected="true" />
+ <select idref="V-22503" selected="true" />
+ <select idref="V-22504" selected="true" />
+ <select idref="V-22505" selected="true" />
+ <select idref="V-22506" selected="true" />
+ <select idref="V-22507" selected="true" />
+ <select idref="V-22508" selected="true" />
+ <select idref="V-22509" selected="true" />
+ <select idref="V-22511" selected="true" />
+ <select idref="V-22514" selected="true" />
+ <select idref="V-22524" selected="true" />
+ <select idref="V-22530" selected="true" />
+ <select idref="V-22533" selected="true" />
+ <select idref="V-22539" selected="true" />
+ <select idref="V-22541" selected="true" />
+ <select idref="V-22542" selected="true" />
+ <select idref="V-22545" selected="true" />
+ <select idref="V-22546" selected="true" />
+ <select idref="V-22547" selected="true" />
+ <select idref="V-22548" selected="true" />
+ <select idref="V-22549" selected="true" />
+ <select idref="V-22550" selected="true" />
+ <select idref="V-22553" selected="true" />
+ <select idref="V-22555" selected="true" />
+ <select idref="V-22556" selected="true" />
+ <select idref="V-22557" selected="true" />
+ <select idref="V-22558" selected="true" />
+ <select idref="V-22559" selected="true" />
+ <select idref="V-22560" selected="true" />
+ <select idref="V-22561" selected="true" />
+ <select idref="V-22562" selected="true" />
+ <select idref="V-22563" selected="true" />
+ <select idref="V-22564" selected="true" />
+ <select idref="V-22565" selected="true" />
+ <select idref="V-22566" selected="true" />
+ <select idref="V-22567" selected="true" />
+ <select idref="V-22568" selected="true" />
+ <select idref="V-22569" selected="true" />
+ <select idref="V-22570" selected="true" />
+ <select idref="V-22571" selected="true" />
+ <select idref="V-22572" selected="true" />
+ <select idref="V-22573" selected="true" />
+ <select idref="V-22574" selected="true" />
+ <select idref="V-22575" selected="true" />
+ <select idref="V-22576" selected="true" />
+ <select idref="V-22577" selected="true" />
+ <select idref="V-22578" selected="true" />
+ <select idref="V-22579" selected="true" />
+ <select idref="V-22580" selected="true" />
+ <select idref="V-22582" selected="true" />
+ <select idref="V-22583" selected="true" />
+ <select idref="V-22584" selected="true" />
+ <select idref="V-22585" selected="true" />
+ <select idref="V-22586" selected="true" />
+ <select idref="V-22587" selected="true" />
+ <select idref="V-22588" selected="true" />
+ <select idref="V-22589" selected="true" />
+ <select idref="V-22595" selected="true" />
+ <select idref="V-22596" selected="true" />
+ <select idref="V-22598" selected="true" />
+ <select idref="V-22665" selected="true" />
+ <select idref="V-22702" selected="true" />
+ <select idref="V-23732" selected="true" />
+ <select idref="V-23736" selected="true" />
+ <select idref="V-23738" selected="true" />
+ <select idref="V-23739" selected="true" />
+ <select idref="V-23741" selected="true" />
+ <select idref="V-23952" selected="true" />
+ <select idref="V-23953" selected="true" />
+ <select idref="V-23972" selected="true" />
+ <select idref="V-24331" selected="true" />
+ <select idref="V-24347" selected="true" />
+ <select idref="V-24357" selected="true" />
+ <select idref="V-24384" selected="true" />
+ <select idref="V-24386" selected="true" />
+ <select idref="V-24624" selected="true" />
+ <select idref="V-27250" selected="true" />
+ <select idref="V-27251" selected="true" />
+ <select idref="V-27275" selected="true" />
+ <select idref="V-27276" selected="true" />
+ <select idref="V-27279" selected="true" />
+ <select idref="V-27283" selected="true" />
+ <select idref="V-27284" selected="true" />
+ <select idref="V-27285" selected="true" />
+ <select idref="V-29236" selected="true" />
+ <select idref="V-29237" selected="true" />
+ <select idref="V-29238" selected="true" />
+ <select idref="V-29239" selected="true" />
+ <select idref="V-29240" selected="true" />
+ <select idref="V-29241" selected="true" />
+ <select idref="V-29242" selected="true" />
+ <select idref="V-29243" selected="true" />
+ <select idref="V-29244" selected="true" />
+ <select idref="V-29245" selected="true" />
+ <select idref="V-29246" selected="true" />
+ <select idref="V-29247" selected="true" />
+ <select idref="V-29248" selected="true" />
+ <select idref="V-29249" selected="true" />
+ <select idref="V-29250" selected="true" />
+ <select idref="V-29251" selected="true" />
+ <select idref="V-29252" selected="true" />
+ <select idref="V-29253" selected="true" />
+ <select idref="V-29255" selected="true" />
+ <select idref="V-29257" selected="true" />
+ <select idref="V-29259" selected="true" />
+ <select idref="V-29261" selected="true" />
+ <select idref="V-29272" selected="true" />
+ <select idref="V-29274" selected="true" />
+ <select idref="V-29275" selected="true" />
+ <select idref="V-29279" selected="true" />
+ <select idref="V-29281" selected="true" />
+ <select idref="V-29284" selected="true" />
+ <select idref="V-29286" selected="true" />
+ <select idref="V-29288" selected="true" />
+ <select idref="V-29289" selected="true" />
+ <select idref="V-29376" selected="true" />
+ </Profile>
+ <Profile id="MAC-2_Sensitive">
+ <title>II - Mission Support Sensitive</title>
+
<description><ProfileDescription></ProfileDescription></description>
+ <select idref="V-756" selected="true" />
+ <select idref="V-760" selected="true" />
+ <select idref="V-761" selected="true" />
+ <select idref="V-762" selected="true" />
+ <select idref="V-763" selected="true" />
+ <select idref="V-765" selected="true" />
+ <select idref="V-766" selected="true" />
+ <select idref="V-768" selected="true" />
+ <select idref="V-769" selected="true" />
+ <select idref="V-770" selected="true" />
+ <select idref="V-773" selected="true" />
+ <select idref="V-774" selected="true" />
+ <select idref="V-775" selected="true" />
+ <select idref="V-776" selected="true" />
+ <select idref="V-777" selected="true" />
+ <select idref="V-778" selected="true" />
+ <select idref="V-780" selected="true" />
+ <select idref="V-781" selected="true" />
+ <select idref="V-782" selected="true" />
+ <select idref="V-783" selected="true" />
+ <select idref="V-784" selected="true" />
+ <select idref="V-785" selected="true" />
+ <select idref="V-786" selected="true" />
+ <select idref="V-787" selected="true" />
+ <select idref="V-788" selected="true" />
+ <select idref="V-789" selected="true" />
+ <select idref="V-790" selected="true" />
+ <select idref="V-791" selected="true" />
+ <select idref="V-792" selected="true" />
+ <select idref="V-793" selected="true" />
+ <select idref="V-794" selected="true" />
+ <select idref="V-795" selected="true" />
+ <select idref="V-796" selected="true" />
+ <select idref="V-797" selected="true" />
+ <select idref="V-798" selected="true" />
+ <select idref="V-800" selected="true" />
+ <select idref="V-801" selected="true" />
+ <select idref="V-802" selected="true" />
+ <select idref="V-803" selected="true" />
+ <select idref="V-804" selected="true" />
+ <select idref="V-805" selected="true" />
+ <select idref="V-806" selected="true" />
+ <select idref="V-807" selected="true" />
+ <select idref="V-808" selected="true" />
+ <select idref="V-810" selected="true" />
+ <select idref="V-811" selected="true" />
+ <select idref="V-812" selected="true" />
+ <select idref="V-813" selected="true" />
+ <select idref="V-814" selected="true" />
+ <select idref="V-815" selected="true" />
+ <select idref="V-818" selected="true" />
+ <select idref="V-819" selected="true" />
+ <select idref="V-821" selected="true" />
+ <select idref="V-822" selected="true" />
+ <select idref="V-823" selected="true" />
+ <select idref="V-824" selected="true" />
+ <select idref="V-825" selected="true" />
+ <select idref="V-827" selected="true" />
+ <select idref="V-828" selected="true" />
+ <select idref="V-829" selected="true" />
+ <select idref="V-831" selected="true" />
+ <select idref="V-832" selected="true" />
+ <select idref="V-833" selected="true" />
+ <select idref="V-834" selected="true" />
+ <select idref="V-835" selected="true" />
+ <select idref="V-836" selected="true" />
+ <select idref="V-837" selected="true" />
+ <select idref="V-838" selected="true" />
+ <select idref="V-840" selected="true" />
+ <select idref="V-841" selected="true" />
+ <select idref="V-842" selected="true" />
+ <select idref="V-843" selected="true" />
+ <select idref="V-845" selected="true" />
+ <select idref="V-846" selected="true" />
+ <select idref="V-847" selected="true" />
+ <select idref="V-848" selected="true" />
+ <select idref="V-849" selected="true" />
+ <select idref="V-850" selected="true" />
+ <select idref="V-867" selected="true" />
+ <select idref="V-899" selected="true" />
+ <select idref="V-900" selected="true" />
+ <select idref="V-901" selected="true" />
+ <select idref="V-902" selected="true" />
+ <select idref="V-903" selected="true" />
+ <select idref="V-904" selected="true" />
+ <select idref="V-905" selected="true" />
+ <select idref="V-906" selected="true" />
+ <select idref="V-907" selected="true" />
+ <select idref="V-910" selected="true" />
+ <select idref="V-913" selected="true" />
+ <select idref="V-914" selected="true" />
+ <select idref="V-915" selected="true" />
+ <select idref="V-916" selected="true" />
+ <select idref="V-917" selected="true" />
+ <select idref="V-918" selected="true" />
+ <select idref="V-921" selected="true" />
+ <select idref="V-922" selected="true" />
+ <select idref="V-923" selected="true" />
+ <select idref="V-924" selected="true" />
+ <select idref="V-925" selected="true" />
+ <select idref="V-928" selected="true" />
+ <select idref="V-929" selected="true" />
+ <select idref="V-931" selected="true" />
+ <select idref="V-932" selected="true" />
+ <select idref="V-933" selected="true" />
+ <select idref="V-935" selected="true" />
+ <select idref="V-936" selected="true" />
+ <select idref="V-940" selected="true" />
+ <select idref="V-941" selected="true" />
+ <select idref="V-974" selected="true" />
+ <select idref="V-975" selected="true" />
+ <select idref="V-976" selected="true" />
+ <select idref="V-977" selected="true" />
+ <select idref="V-978" selected="true" />
+ <select idref="V-979" selected="true" />
+ <select idref="V-980" selected="true" />
+ <select idref="V-981" selected="true" />
+ <select idref="V-982" selected="true" />
+ <select idref="V-983" selected="true" />
+ <select idref="V-984" selected="true" />
+ <select idref="V-985" selected="true" />
+ <select idref="V-986" selected="true" />
+ <select idref="V-987" selected="true" />
+ <select idref="V-988" selected="true" />
+ <select idref="V-989" selected="true" />
+ <select idref="V-993" selected="true" />
+ <select idref="V-994" selected="true" />
+ <select idref="V-995" selected="true" />
+ <select idref="V-1010" selected="true" />
+ <select idref="V-1011" selected="true" />
+ <select idref="V-1013" selected="true" />
+ <select idref="V-1021" selected="true" />
+ <select idref="V-1022" selected="true" />
+ <select idref="V-1023" selected="true" />
+ <select idref="V-1025" selected="true" />
+ <select idref="V-1026" selected="true" />
+ <select idref="V-1027" selected="true" />
+ <select idref="V-1028" selected="true" />
+ <select idref="V-1029" selected="true" />
+ <select idref="V-1030" selected="true" />
+ <select idref="V-1032" selected="true" />
+ <select idref="V-1046" selected="true" />
+ <select idref="V-1047" selected="true" />
+ <select idref="V-1048" selected="true" />
+ <select idref="V-1049" selected="true" />
+ <select idref="V-1054" selected="true" />
+ <select idref="V-1055" selected="true" />
+ <select idref="V-1056" selected="true" />
+ <select idref="V-1058" selected="true" />
+ <select idref="V-1059" selected="true" />
+ <select idref="V-1061" selected="true" />
+ <select idref="V-1062" selected="true" />
+ <select idref="V-4083" selected="true" />
+ <select idref="V-4084" selected="true" />
+ <select idref="V-4087" selected="true" />
+ <select idref="V-4089" selected="true" />
+ <select idref="V-4090" selected="true" />
+ <select idref="V-4091" selected="true" />
+ <select idref="V-4246" selected="true" />
+ <select idref="V-4247" selected="true" />
+ <select idref="V-4248" selected="true" />
+ <select idref="V-4249" selected="true" />
+ <select idref="V-4250" selected="true" />
+ <select idref="V-4255" selected="true" />
+ <select idref="V-4268" selected="true" />
+ <select idref="V-4269" selected="true" />
+ <select idref="V-4273" selected="true" />
+ <select idref="V-4274" selected="true" />
+ <select idref="V-4275" selected="true" />
+ <select idref="V-4276" selected="true" />
+ <select idref="V-4277" selected="true" />
+ <select idref="V-4278" selected="true" />
+ <select idref="V-4295" selected="true" />
+ <select idref="V-4298" selected="true" />
+ <select idref="V-4301" selected="true" />
+ <select idref="V-4304" selected="true" />
+ <select idref="V-4321" selected="true" />
+ <select idref="V-4334" selected="true" />
+ <select idref="V-4335" selected="true" />
+ <select idref="V-4336" selected="true" />
+ <select idref="V-4339" selected="true" />
+ <select idref="V-4342" selected="true" />
+ <select idref="V-4346" selected="true" />
+ <select idref="V-4357" selected="true" />
+ <select idref="V-4358" selected="true" />
+ <select idref="V-4360" selected="true" />
+ <select idref="V-4361" selected="true" />
+ <select idref="V-4364" selected="true" />
+ <select idref="V-4365" selected="true" />
+ <select idref="V-4366" selected="true" />
+ <select idref="V-4367" selected="true" />
+ <select idref="V-4368" selected="true" />
+ <select idref="V-4369" selected="true" />
+ <select idref="V-4370" selected="true" />
+ <select idref="V-4371" selected="true" />
+ <select idref="V-4382" selected="true" />
+ <select idref="V-4384" selected="true" />
+ <select idref="V-4385" selected="true" />
+ <select idref="V-4387" selected="true" />
+ <select idref="V-4392" selected="true" />
+ <select idref="V-4393" selected="true" />
+ <select idref="V-4394" selected="true" />
+ <select idref="V-4395" selected="true" />
+ <select idref="V-4397" selected="true" />
+ <select idref="V-4398" selected="true" />
+ <select idref="V-4399" selected="true" />
+ <select idref="V-4427" selected="true" />
+ <select idref="V-4428" selected="true" />
+ <select idref="V-4430" selected="true" />
+ <select idref="V-4687" selected="true" />
+ <select idref="V-4688" selected="true" />
+ <select idref="V-4689" selected="true" />
+ <select idref="V-4690" selected="true" />
+ <select idref="V-4691" selected="true" />
+ <select idref="V-4692" selected="true" />
+ <select idref="V-4693" selected="true" />
+ <select idref="V-4694" selected="true" />
+ <select idref="V-4695" selected="true" />
+ <select idref="V-4696" selected="true" />
+ <select idref="V-4697" selected="true" />
+ <select idref="V-4701" selected="true" />
+ <select idref="V-4702" selected="true" />
+ <select idref="V-11940" selected="true" />
+ <select idref="V-11945" selected="true" />
+ <select idref="V-11946" selected="true" />
+ <select idref="V-11947" selected="true" />
+ <select idref="V-11948" selected="true" />
+ <select idref="V-11972" selected="true" />
+ <select idref="V-11973" selected="true" />
+ <select idref="V-11975" selected="true" />
+ <select idref="V-11976" selected="true" />
+ <select idref="V-11977" selected="true" />
+ <select idref="V-11979" selected="true" />
+ <select idref="V-11980" selected="true" />
+ <select idref="V-11981" selected="true" />
+ <select idref="V-11982" selected="true" />
+ <select idref="V-11983" selected="true" />
+ <select idref="V-11984" selected="true" />
+ <select idref="V-11985" selected="true" />
+ <select idref="V-11986" selected="true" />
+ <select idref="V-11987" selected="true" />
+ <select idref="V-11988" selected="true" />
+ <select idref="V-11989" selected="true" />
+ <select idref="V-11990" selected="true" />
+ <select idref="V-11994" selected="true" />
+ <select idref="V-11995" selected="true" />
+ <select idref="V-11996" selected="true" />
+ <select idref="V-11997" selected="true" />
+ <select idref="V-11999" selected="true" />
+ <select idref="V-12002" selected="true" />
+ <select idref="V-12003" selected="true" />
+ <select idref="V-12004" selected="true" />
+ <select idref="V-12005" selected="true" />
+ <select idref="V-12006" selected="true" />
+ <select idref="V-12010" selected="true" />
+ <select idref="V-12011" selected="true" />
+ <select idref="V-12014" selected="true" />
+ <select idref="V-12016" selected="true" />
+ <select idref="V-12017" selected="true" />
+ <select idref="V-12018" selected="true" />
+ <select idref="V-12019" selected="true" />
+ <select idref="V-12020" selected="true" />
+ <select idref="V-12021" selected="true" />
+ <select idref="V-12022" selected="true" />
+ <select idref="V-12023" selected="true" />
+ <select idref="V-12024" selected="true" />
+ <select idref="V-12025" selected="true" />
+ <select idref="V-12026" selected="true" />
+ <select idref="V-12028" selected="true" />
+ <select idref="V-12030" selected="true" />
+ <select idref="V-12038" selected="true" />
+ <select idref="V-12039" selected="true" />
+ <select idref="V-12040" selected="true" />
+ <select idref="V-12049" selected="true" />
+ <select idref="V-12765" selected="true" />
+ <select idref="V-22290" selected="true" />
+ <select idref="V-22291" selected="true" />
+ <select idref="V-22292" selected="true" />
+ <select idref="V-22294" selected="true" />
+ <select idref="V-22295" selected="true" />
+ <select idref="V-22296" selected="true" />
+ <select idref="V-22297" selected="true" />
+ <select idref="V-22298" selected="true" />
+ <select idref="V-22299" selected="true" />
+ <select idref="V-22301" selected="true" />
+ <select idref="V-22302" selected="true" />
+ <select idref="V-22303" selected="true" />
+ <select idref="V-22304" selected="true" />
+ <select idref="V-22305" selected="true" />
+ <select idref="V-22306" selected="true" />
+ <select idref="V-22307" selected="true" />
+ <select idref="V-22308" selected="true" />
+ <select idref="V-22309" selected="true" />
+ <select idref="V-22310" selected="true" />
+ <select idref="V-22311" selected="true" />
+ <select idref="V-22312" selected="true" />
+ <select idref="V-22313" selected="true" />
+ <select idref="V-22314" selected="true" />
+ <select idref="V-22315" selected="true" />
+ <select idref="V-22316" selected="true" />
+ <select idref="V-22317" selected="true" />
+ <select idref="V-22318" selected="true" />
+ <select idref="V-22319" selected="true" />
+ <select idref="V-22320" selected="true" />
+ <select idref="V-22321" selected="true" />
+ <select idref="V-22322" selected="true" />
+ <select idref="V-22323" selected="true" />
+ <select idref="V-22324" selected="true" />
+ <select idref="V-22325" selected="true" />
+ <select idref="V-22326" selected="true" />
+ <select idref="V-22327" selected="true" />
+ <select idref="V-22328" selected="true" />
+ <select idref="V-22329" selected="true" />
+ <select idref="V-22330" selected="true" />
+ <select idref="V-22332" selected="true" />
+ <select idref="V-22333" selected="true" />
+ <select idref="V-22334" selected="true" />
+ <select idref="V-22335" selected="true" />
+ <select idref="V-22336" selected="true" />
+ <select idref="V-22337" selected="true" />
+ <select idref="V-22338" selected="true" />
+ <select idref="V-22339" selected="true" />
+ <select idref="V-22340" selected="true" />
+ <select idref="V-22341" selected="true" />
+ <select idref="V-22342" selected="true" />
+ <select idref="V-22343" selected="true" />
+ <select idref="V-22344" selected="true" />
+ <select idref="V-22347" selected="true" />
+ <select idref="V-22348" selected="true" />
+ <select idref="V-22349" selected="true" />
+ <select idref="V-22350" selected="true" />
+ <select idref="V-22351" selected="true" />
+ <select idref="V-22352" selected="true" />
+ <select idref="V-22353" selected="true" />
+ <select idref="V-22354" selected="true" />
+ <select idref="V-22355" selected="true" />
+ <select idref="V-22356" selected="true" />
+ <select idref="V-22357" selected="true" />
+ <select idref="V-22358" selected="true" />
+ <select idref="V-22359" selected="true" />
+ <select idref="V-22360" selected="true" />
+ <select idref="V-22361" selected="true" />
+ <select idref="V-22362" selected="true" />
+ <select idref="V-22363" selected="true" />
+ <select idref="V-22364" selected="true" />
+ <select idref="V-22365" selected="true" />
+ <select idref="V-22366" selected="true" />
+ <select idref="V-22367" selected="true" />
+ <select idref="V-22368" selected="true" />
+ <select idref="V-22369" selected="true" />
+ <select idref="V-22370" selected="true" />
+ <select idref="V-22371" selected="true" />
+ <select idref="V-22372" selected="true" />
+ <select idref="V-22373" selected="true" />
+ <select idref="V-22374" selected="true" />
+ <select idref="V-22375" selected="true" />
+ <select idref="V-22376" selected="true" />
+ <select idref="V-22377" selected="true" />
+ <select idref="V-22378" selected="true" />
+ <select idref="V-22382" selected="true" />
+ <select idref="V-22383" selected="true" />
+ <select idref="V-22384" selected="true" />
+ <select idref="V-22385" selected="true" />
+ <select idref="V-22386" selected="true" />
+ <select idref="V-22387" selected="true" />
+ <select idref="V-22388" selected="true" />
+ <select idref="V-22389" selected="true" />
+ <select idref="V-22390" selected="true" />
+ <select idref="V-22391" selected="true" />
+ <select idref="V-22392" selected="true" />
+ <select idref="V-22393" selected="true" />
+ <select idref="V-22394" selected="true" />
+ <select idref="V-22395" selected="true" />
+ <select idref="V-22396" selected="true" />
+ <select idref="V-22397" selected="true" />
+ <select idref="V-22398" selected="true" />
+ <select idref="V-22404" selected="true" />
+ <select idref="V-22405" selected="true" />
+ <select idref="V-22406" selected="true" />
+ <select idref="V-22407" selected="true" />
+ <select idref="V-22408" selected="true" />
+ <select idref="V-22409" selected="true" />
+ <select idref="V-22410" selected="true" />
+ <select idref="V-22411" selected="true" />
+ <select idref="V-22414" selected="true" />
+ <select idref="V-22415" selected="true" />
+ <select idref="V-22416" selected="true" />
+ <select idref="V-22417" selected="true" />
+ <select idref="V-22418" selected="true" />
+ <select idref="V-22419" selected="true" />
+ <select idref="V-22421" selected="true" />
+ <select idref="V-22422" selected="true" />
+ <select idref="V-22423" selected="true" />
+ <select idref="V-22424" selected="true" />
+ <select idref="V-22425" selected="true" />
+ <select idref="V-22426" selected="true" />
+ <select idref="V-22427" selected="true" />
+ <select idref="V-22428" selected="true" />
+ <select idref="V-22429" selected="true" />
+ <select idref="V-22430" selected="true" />
+ <select idref="V-22431" selected="true" />
+ <select idref="V-22432" selected="true" />
+ <select idref="V-22433" selected="true" />
+ <select idref="V-22434" selected="true" />
+ <select idref="V-22435" selected="true" />
+ <select idref="V-22436" selected="true" />
+ <select idref="V-22437" selected="true" />
+ <select idref="V-22438" selected="true" />
+ <select idref="V-22439" selected="true" />
+ <select idref="V-22440" selected="true" />
+ <select idref="V-22441" selected="true" />
+ <select idref="V-22442" selected="true" />
+ <select idref="V-22444" selected="true" />
+ <select idref="V-22445" selected="true" />
+ <select idref="V-22446" selected="true" />
+ <select idref="V-22447" selected="true" />
+ <select idref="V-22448" selected="true" />
+ <select idref="V-22449" selected="true" />
+ <select idref="V-22450" selected="true" />
+ <select idref="V-22451" selected="true" />
+ <select idref="V-22452" selected="true" />
+ <select idref="V-22453" selected="true" />
+ <select idref="V-22454" selected="true" />
+ <select idref="V-22455" selected="true" />
+ <select idref="V-22456" selected="true" />
+ <select idref="V-22457" selected="true" />
+ <select idref="V-22458" selected="true" />
+ <select idref="V-22459" selected="true" />
+ <select idref="V-22460" selected="true" />
+ <select idref="V-22461" selected="true" />
+ <select idref="V-22462" selected="true" />
+ <select idref="V-22463" selected="true" />
+ <select idref="V-22470" selected="true" />
+ <select idref="V-22471" selected="true" />
+ <select idref="V-22472" selected="true" />
+ <select idref="V-22473" selected="true" />
+ <select idref="V-22474" selected="true" />
+ <select idref="V-22475" selected="true" />
+ <select idref="V-22485" selected="true" />
+ <select idref="V-22486" selected="true" />
+ <select idref="V-22487" selected="true" />
+ <select idref="V-22488" selected="true" />
+ <select idref="V-22489" selected="true" />
+ <select idref="V-22490" selected="true" />
+ <select idref="V-22491" selected="true" />
+ <select idref="V-22492" selected="true" />
+ <select idref="V-22493" selected="true" />
+ <select idref="V-22496" selected="true" />
+ <select idref="V-22497" selected="true" />
+ <select idref="V-22498" selected="true" />
+ <select idref="V-22499" selected="true" />
+ <select idref="V-22500" selected="true" />
+ <select idref="V-22501" selected="true" />
+ <select idref="V-22502" selected="true" />
+ <select idref="V-22503" selected="true" />
+ <select idref="V-22504" selected="true" />
+ <select idref="V-22505" selected="true" />
+ <select idref="V-22506" selected="true" />
+ <select idref="V-22507" selected="true" />
+ <select idref="V-22508" selected="true" />
+ <select idref="V-22509" selected="true" />
+ <select idref="V-22511" selected="true" />
+ <select idref="V-22514" selected="true" />
+ <select idref="V-22524" selected="true" />
+ <select idref="V-22530" selected="true" />
+ <select idref="V-22533" selected="true" />
+ <select idref="V-22539" selected="true" />
+ <select idref="V-22541" selected="true" />
+ <select idref="V-22542" selected="true" />
+ <select idref="V-22545" selected="true" />
+ <select idref="V-22546" selected="true" />
+ <select idref="V-22547" selected="true" />
+ <select idref="V-22548" selected="true" />
+ <select idref="V-22549" selected="true" />
+ <select idref="V-22550" selected="true" />
+ <select idref="V-22553" selected="true" />
+ <select idref="V-22555" selected="true" />
+ <select idref="V-22556" selected="true" />
+ <select idref="V-22557" selected="true" />
+ <select idref="V-22558" selected="true" />
+ <select idref="V-22559" selected="true" />
+ <select idref="V-22560" selected="true" />
+ <select idref="V-22561" selected="true" />
+ <select idref="V-22562" selected="true" />
+ <select idref="V-22563" selected="true" />
+ <select idref="V-22564" selected="true" />
+ <select idref="V-22565" selected="true" />
+ <select idref="V-22566" selected="true" />
+ <select idref="V-22567" selected="true" />
+ <select idref="V-22568" selected="true" />
+ <select idref="V-22569" selected="true" />
+ <select idref="V-22570" selected="true" />
+ <select idref="V-22571" selected="true" />
+ <select idref="V-22572" selected="true" />
+ <select idref="V-22573" selected="true" />
+ <select idref="V-22574" selected="true" />
+ <select idref="V-22575" selected="true" />
+ <select idref="V-22576" selected="true" />
+ <select idref="V-22577" selected="true" />
+ <select idref="V-22578" selected="true" />
+ <select idref="V-22579" selected="true" />
+ <select idref="V-22580" selected="true" />
+ <select idref="V-22582" selected="true" />
+ <select idref="V-22583" selected="true" />
+ <select idref="V-22584" selected="true" />
+ <select idref="V-22585" selected="true" />
+ <select idref="V-22586" selected="true" />
+ <select idref="V-22587" selected="true" />
+ <select idref="V-22588" selected="true" />
+ <select idref="V-22589" selected="true" />
+ <select idref="V-22595" selected="true" />
+ <select idref="V-22596" selected="true" />
+ <select idref="V-22598" selected="true" />
+ <select idref="V-22665" selected="true" />
+ <select idref="V-22702" selected="true" />
+ <select idref="V-23732" selected="true" />
+ <select idref="V-23736" selected="true" />
+ <select idref="V-23738" selected="true" />
+ <select idref="V-23739" selected="true" />
+ <select idref="V-23741" selected="true" />
+ <select idref="V-23952" selected="true" />
+ <select idref="V-23953" selected="true" />
+ <select idref="V-23972" selected="true" />
+ <select idref="V-24331" selected="true" />
+ <select idref="V-24347" selected="true" />
+ <select idref="V-24357" selected="true" />
+ <select idref="V-24384" selected="true" />
+ <select idref="V-24386" selected="true" />
+ <select idref="V-24624" selected="true" />
+ <select idref="V-27250" selected="true" />
+ <select idref="V-27251" selected="true" />
+ <select idref="V-27275" selected="true" />
+ <select idref="V-27276" selected="true" />
+ <select idref="V-27279" selected="true" />
+ <select idref="V-27283" selected="true" />
+ <select idref="V-27284" selected="true" />
+ <select idref="V-27285" selected="true" />
+ <select idref="V-29236" selected="true" />
+ <select idref="V-29237" selected="true" />
+ <select idref="V-29238" selected="true" />
+ <select idref="V-29239" selected="true" />
+ <select idref="V-29240" selected="true" />
+ <select idref="V-29241" selected="true" />
+ <select idref="V-29242" selected="true" />
+ <select idref="V-29243" selected="true" />
+ <select idref="V-29244" selected="true" />
+ <select idref="V-29245" selected="true" />
+ <select idref="V-29246" selected="true" />
+ <select idref="V-29247" selected="true" />
+ <select idref="V-29248" selected="true" />
+ <select idref="V-29249" selected="true" />
+ <select idref="V-29250" selected="true" />
+ <select idref="V-29251" selected="true" />
+ <select idref="V-29252" selected="true" />
+ <select idref="V-29253" selected="true" />
+ <select idref="V-29255" selected="true" />
+ <select idref="V-29257" selected="true" />
+ <select idref="V-29259" selected="true" />
+ <select idref="V-29261" selected="true" />
+ <select idref="V-29272" selected="true" />
+ <select idref="V-29274" selected="true" />
+ <select idref="V-29275" selected="true" />
+ <select idref="V-29279" selected="true" />
+ <select idref="V-29281" selected="true" />
+ <select idref="V-29284" selected="true" />
+ <select idref="V-29286" selected="true" />
+ <select idref="V-29288" selected="true" />
+ <select idref="V-29289" selected="true" />
+ <select idref="V-29376" selected="true" />
+ </Profile>
+ <Profile id="MAC-2_Classified">
+ <title>II - Mission Support Classified</title>
+
<description><ProfileDescription></ProfileDescription></description>
+ <select idref="V-756" selected="true" />
+ <select idref="V-760" selected="true" />
+ <select idref="V-761" selected="true" />
+ <select idref="V-762" selected="true" />
+ <select idref="V-763" selected="true" />
+ <select idref="V-765" selected="true" />
+ <select idref="V-766" selected="true" />
+ <select idref="V-768" selected="true" />
+ <select idref="V-769" selected="true" />
+ <select idref="V-770" selected="true" />
+ <select idref="V-773" selected="true" />
+ <select idref="V-774" selected="true" />
+ <select idref="V-775" selected="true" />
+ <select idref="V-776" selected="true" />
+ <select idref="V-777" selected="true" />
+ <select idref="V-778" selected="true" />
+ <select idref="V-780" selected="true" />
+ <select idref="V-781" selected="true" />
+ <select idref="V-782" selected="true" />
+ <select idref="V-783" selected="true" />
+ <select idref="V-784" selected="true" />
+ <select idref="V-785" selected="true" />
+ <select idref="V-786" selected="true" />
+ <select idref="V-787" selected="true" />
+ <select idref="V-788" selected="true" />
+ <select idref="V-789" selected="true" />
+ <select idref="V-790" selected="true" />
+ <select idref="V-791" selected="true" />
+ <select idref="V-792" selected="true" />
+ <select idref="V-793" selected="true" />
+ <select idref="V-794" selected="true" />
+ <select idref="V-795" selected="true" />
+ <select idref="V-796" selected="true" />
+ <select idref="V-797" selected="true" />
+ <select idref="V-798" selected="true" />
+ <select idref="V-800" selected="true" />
+ <select idref="V-801" selected="true" />
+ <select idref="V-802" selected="true" />
+ <select idref="V-803" selected="true" />
+ <select idref="V-804" selected="true" />
+ <select idref="V-805" selected="true" />
+ <select idref="V-806" selected="true" />
+ <select idref="V-807" selected="true" />
+ <select idref="V-808" selected="true" />
+ <select idref="V-810" selected="true" />
+ <select idref="V-811" selected="true" />
+ <select idref="V-812" selected="true" />
+ <select idref="V-813" selected="true" />
+ <select idref="V-814" selected="true" />
+ <select idref="V-815" selected="true" />
+ <select idref="V-818" selected="true" />
+ <select idref="V-819" selected="true" />
+ <select idref="V-821" selected="true" />
+ <select idref="V-822" selected="true" />
+ <select idref="V-823" selected="true" />
+ <select idref="V-824" selected="true" />
+ <select idref="V-825" selected="true" />
+ <select idref="V-827" selected="true" />
+ <select idref="V-828" selected="true" />
+ <select idref="V-829" selected="true" />
+ <select idref="V-831" selected="true" />
+ <select idref="V-832" selected="true" />
+ <select idref="V-833" selected="true" />
+ <select idref="V-834" selected="true" />
+ <select idref="V-835" selected="true" />
+ <select idref="V-836" selected="true" />
+ <select idref="V-837" selected="true" />
+ <select idref="V-838" selected="true" />
+ <select idref="V-840" selected="true" />
+ <select idref="V-841" selected="true" />
+ <select idref="V-842" selected="true" />
+ <select idref="V-843" selected="true" />
+ <select idref="V-845" selected="true" />
+ <select idref="V-846" selected="true" />
+ <select idref="V-847" selected="true" />
+ <select idref="V-848" selected="true" />
+ <select idref="V-849" selected="true" />
+ <select idref="V-850" selected="true" />
+ <select idref="V-867" selected="true" />
+ <select idref="V-899" selected="true" />
+ <select idref="V-900" selected="true" />
+ <select idref="V-901" selected="true" />
+ <select idref="V-902" selected="true" />
+ <select idref="V-903" selected="true" />
+ <select idref="V-904" selected="true" />
+ <select idref="V-905" selected="true" />
+ <select idref="V-906" selected="true" />
+ <select idref="V-907" selected="true" />
+ <select idref="V-910" selected="true" />
+ <select idref="V-913" selected="true" />
+ <select idref="V-914" selected="true" />
+ <select idref="V-915" selected="true" />
+ <select idref="V-916" selected="true" />
+ <select idref="V-917" selected="true" />
+ <select idref="V-918" selected="true" />
+ <select idref="V-921" selected="true" />
+ <select idref="V-922" selected="true" />
+ <select idref="V-923" selected="true" />
+ <select idref="V-924" selected="true" />
+ <select idref="V-925" selected="true" />
+ <select idref="V-928" selected="true" />
+ <select idref="V-929" selected="true" />
+ <select idref="V-931" selected="true" />
+ <select idref="V-932" selected="true" />
+ <select idref="V-933" selected="true" />
+ <select idref="V-935" selected="true" />
+ <select idref="V-936" selected="true" />
+ <select idref="V-940" selected="true" />
+ <select idref="V-941" selected="true" />
+ <select idref="V-974" selected="true" />
+ <select idref="V-975" selected="true" />
+ <select idref="V-976" selected="true" />
+ <select idref="V-977" selected="true" />
+ <select idref="V-978" selected="true" />
+ <select idref="V-979" selected="true" />
+ <select idref="V-980" selected="true" />
+ <select idref="V-981" selected="true" />
+ <select idref="V-982" selected="true" />
+ <select idref="V-983" selected="true" />
+ <select idref="V-984" selected="true" />
+ <select idref="V-985" selected="true" />
+ <select idref="V-986" selected="true" />
+ <select idref="V-987" selected="true" />
+ <select idref="V-988" selected="true" />
+ <select idref="V-989" selected="true" />
+ <select idref="V-993" selected="true" />
+ <select idref="V-994" selected="true" />
+ <select idref="V-995" selected="true" />
+ <select idref="V-1010" selected="true" />
+ <select idref="V-1011" selected="true" />
+ <select idref="V-1013" selected="true" />
+ <select idref="V-1021" selected="true" />
+ <select idref="V-1022" selected="true" />
+ <select idref="V-1023" selected="true" />
+ <select idref="V-1025" selected="true" />
+ <select idref="V-1026" selected="true" />
+ <select idref="V-1027" selected="true" />
+ <select idref="V-1028" selected="true" />
+ <select idref="V-1029" selected="true" />
+ <select idref="V-1030" selected="true" />
+ <select idref="V-1032" selected="true" />
+ <select idref="V-1046" selected="true" />
+ <select idref="V-1047" selected="true" />
+ <select idref="V-1048" selected="true" />
+ <select idref="V-1049" selected="true" />
+ <select idref="V-1054" selected="true" />
+ <select idref="V-1055" selected="true" />
+ <select idref="V-1056" selected="true" />
+ <select idref="V-1058" selected="true" />
+ <select idref="V-1059" selected="true" />
+ <select idref="V-1061" selected="true" />
+ <select idref="V-1062" selected="true" />
+ <select idref="V-4083" selected="true" />
+ <select idref="V-4084" selected="true" />
+ <select idref="V-4087" selected="true" />
+ <select idref="V-4089" selected="true" />
+ <select idref="V-4090" selected="true" />
+ <select idref="V-4091" selected="true" />
+ <select idref="V-4246" selected="true" />
+ <select idref="V-4247" selected="true" />
+ <select idref="V-4248" selected="true" />
+ <select idref="V-4249" selected="true" />
+ <select idref="V-4250" selected="true" />
+ <select idref="V-4255" selected="true" />
+ <select idref="V-4268" selected="true" />
+ <select idref="V-4269" selected="true" />
+ <select idref="V-4273" selected="true" />
+ <select idref="V-4274" selected="true" />
+ <select idref="V-4275" selected="true" />
+ <select idref="V-4276" selected="true" />
+ <select idref="V-4277" selected="true" />
+ <select idref="V-4278" selected="true" />
+ <select idref="V-4295" selected="true" />
+ <select idref="V-4298" selected="true" />
+ <select idref="V-4301" selected="true" />
+ <select idref="V-4304" selected="true" />
+ <select idref="V-4321" selected="true" />
+ <select idref="V-4334" selected="true" />
+ <select idref="V-4335" selected="true" />
+ <select idref="V-4336" selected="true" />
+ <select idref="V-4339" selected="true" />
+ <select idref="V-4342" selected="true" />
+ <select idref="V-4346" selected="true" />
+ <select idref="V-4357" selected="true" />
+ <select idref="V-4358" selected="true" />
+ <select idref="V-4360" selected="true" />
+ <select idref="V-4361" selected="true" />
+ <select idref="V-4364" selected="true" />
+ <select idref="V-4365" selected="true" />
+ <select idref="V-4366" selected="true" />
+ <select idref="V-4367" selected="true" />
+ <select idref="V-4368" selected="true" />
+ <select idref="V-4369" selected="true" />
+ <select idref="V-4370" selected="true" />
+ <select idref="V-4371" selected="true" />
+ <select idref="V-4382" selected="true" />
+ <select idref="V-4384" selected="true" />
+ <select idref="V-4385" selected="true" />
+ <select idref="V-4387" selected="true" />
+ <select idref="V-4392" selected="true" />
+ <select idref="V-4393" selected="true" />
+ <select idref="V-4394" selected="true" />
+ <select idref="V-4395" selected="true" />
+ <select idref="V-4397" selected="true" />
+ <select idref="V-4398" selected="true" />
+ <select idref="V-4399" selected="true" />
+ <select idref="V-4427" selected="true" />
+ <select idref="V-4428" selected="true" />
+ <select idref="V-4430" selected="true" />
+ <select idref="V-4687" selected="true" />
+ <select idref="V-4688" selected="true" />
+ <select idref="V-4689" selected="true" />
+ <select idref="V-4690" selected="true" />
+ <select idref="V-4691" selected="true" />
+ <select idref="V-4692" selected="true" />
+ <select idref="V-4693" selected="true" />
+ <select idref="V-4694" selected="true" />
+ <select idref="V-4695" selected="true" />
+ <select idref="V-4696" selected="true" />
+ <select idref="V-4697" selected="true" />
+ <select idref="V-4701" selected="true" />
+ <select idref="V-4702" selected="true" />
+ <select idref="V-11940" selected="true" />
+ <select idref="V-11945" selected="true" />
+ <select idref="V-11946" selected="true" />
+ <select idref="V-11947" selected="true" />
+ <select idref="V-11948" selected="true" />
+ <select idref="V-11972" selected="true" />
+ <select idref="V-11973" selected="true" />
+ <select idref="V-11975" selected="true" />
+ <select idref="V-11976" selected="true" />
+ <select idref="V-11977" selected="true" />
+ <select idref="V-11979" selected="true" />
+ <select idref="V-11980" selected="true" />
+ <select idref="V-11981" selected="true" />
+ <select idref="V-11982" selected="true" />
+ <select idref="V-11983" selected="true" />
+ <select idref="V-11984" selected="true" />
+ <select idref="V-11985" selected="true" />
+ <select idref="V-11986" selected="true" />
+ <select idref="V-11987" selected="true" />
+ <select idref="V-11988" selected="true" />
+ <select idref="V-11989" selected="true" />
+ <select idref="V-11990" selected="true" />
+ <select idref="V-11994" selected="true" />
+ <select idref="V-11995" selected="true" />
+ <select idref="V-11996" selected="true" />
+ <select idref="V-11997" selected="true" />
+ <select idref="V-11999" selected="true" />
+ <select idref="V-12002" selected="true" />
+ <select idref="V-12003" selected="true" />
+ <select idref="V-12004" selected="true" />
+ <select idref="V-12005" selected="true" />
+ <select idref="V-12006" selected="true" />
+ <select idref="V-12010" selected="true" />
+ <select idref="V-12011" selected="true" />
+ <select idref="V-12014" selected="true" />
+ <select idref="V-12016" selected="true" />
+ <select idref="V-12017" selected="true" />
+ <select idref="V-12018" selected="true" />
+ <select idref="V-12019" selected="true" />
+ <select idref="V-12020" selected="true" />
+ <select idref="V-12021" selected="true" />
+ <select idref="V-12022" selected="true" />
+ <select idref="V-12023" selected="true" />
+ <select idref="V-12024" selected="true" />
+ <select idref="V-12025" selected="true" />
+ <select idref="V-12026" selected="true" />
+ <select idref="V-12028" selected="true" />
+ <select idref="V-12030" selected="true" />
+ <select idref="V-12038" selected="true" />
+ <select idref="V-12039" selected="true" />
+ <select idref="V-12040" selected="true" />
+ <select idref="V-12049" selected="true" />
+ <select idref="V-12765" selected="true" />
+ <select idref="V-22290" selected="true" />
+ <select idref="V-22291" selected="true" />
+ <select idref="V-22292" selected="true" />
+ <select idref="V-22294" selected="true" />
+ <select idref="V-22295" selected="true" />
+ <select idref="V-22296" selected="true" />
+ <select idref="V-22297" selected="true" />
+ <select idref="V-22298" selected="true" />
+ <select idref="V-22299" selected="true" />
+ <select idref="V-22301" selected="true" />
+ <select idref="V-22302" selected="true" />
+ <select idref="V-22303" selected="true" />
+ <select idref="V-22304" selected="true" />
+ <select idref="V-22305" selected="true" />
+ <select idref="V-22306" selected="true" />
+ <select idref="V-22307" selected="true" />
+ <select idref="V-22308" selected="true" />
+ <select idref="V-22309" selected="true" />
+ <select idref="V-22310" selected="true" />
+ <select idref="V-22311" selected="true" />
+ <select idref="V-22312" selected="true" />
+ <select idref="V-22313" selected="true" />
+ <select idref="V-22314" selected="true" />
+ <select idref="V-22315" selected="true" />
+ <select idref="V-22316" selected="true" />
+ <select idref="V-22317" selected="true" />
+ <select idref="V-22318" selected="true" />
+ <select idref="V-22319" selected="true" />
+ <select idref="V-22320" selected="true" />
+ <select idref="V-22321" selected="true" />
+ <select idref="V-22322" selected="true" />
+ <select idref="V-22323" selected="true" />
+ <select idref="V-22324" selected="true" />
+ <select idref="V-22325" selected="true" />
+ <select idref="V-22326" selected="true" />
+ <select idref="V-22327" selected="true" />
+ <select idref="V-22328" selected="true" />
+ <select idref="V-22329" selected="true" />
+ <select idref="V-22330" selected="true" />
+ <select idref="V-22332" selected="true" />
+ <select idref="V-22333" selected="true" />
+ <select idref="V-22334" selected="true" />
+ <select idref="V-22335" selected="true" />
+ <select idref="V-22336" selected="true" />
+ <select idref="V-22337" selected="true" />
+ <select idref="V-22338" selected="true" />
+ <select idref="V-22339" selected="true" />
+ <select idref="V-22340" selected="true" />
+ <select idref="V-22341" selected="true" />
+ <select idref="V-22342" selected="true" />
+ <select idref="V-22343" selected="true" />
+ <select idref="V-22344" selected="true" />
+ <select idref="V-22347" selected="true" />
+ <select idref="V-22348" selected="true" />
+ <select idref="V-22349" selected="true" />
+ <select idref="V-22350" selected="true" />
+ <select idref="V-22351" selected="true" />
+ <select idref="V-22352" selected="true" />
+ <select idref="V-22353" selected="true" />
+ <select idref="V-22354" selected="true" />
+ <select idref="V-22355" selected="true" />
+ <select idref="V-22356" selected="true" />
+ <select idref="V-22357" selected="true" />
+ <select idref="V-22358" selected="true" />
+ <select idref="V-22359" selected="true" />
+ <select idref="V-22360" selected="true" />
+ <select idref="V-22361" selected="true" />
+ <select idref="V-22362" selected="true" />
+ <select idref="V-22363" selected="true" />
+ <select idref="V-22364" selected="true" />
+ <select idref="V-22365" selected="true" />
+ <select idref="V-22366" selected="true" />
+ <select idref="V-22367" selected="true" />
+ <select idref="V-22368" selected="true" />
+ <select idref="V-22369" selected="true" />
+ <select idref="V-22370" selected="true" />
+ <select idref="V-22371" selected="true" />
+ <select idref="V-22372" selected="true" />
+ <select idref="V-22373" selected="true" />
+ <select idref="V-22374" selected="true" />
+ <select idref="V-22375" selected="true" />
+ <select idref="V-22376" selected="true" />
+ <select idref="V-22377" selected="true" />
+ <select idref="V-22378" selected="true" />
+ <select idref="V-22382" selected="true" />
+ <select idref="V-22383" selected="true" />
+ <select idref="V-22384" selected="true" />
+ <select idref="V-22385" selected="true" />
+ <select idref="V-22386" selected="true" />
+ <select idref="V-22387" selected="true" />
+ <select idref="V-22388" selected="true" />
+ <select idref="V-22389" selected="true" />
+ <select idref="V-22390" selected="true" />
+ <select idref="V-22391" selected="true" />
+ <select idref="V-22392" selected="true" />
+ <select idref="V-22393" selected="true" />
+ <select idref="V-22394" selected="true" />
+ <select idref="V-22395" selected="true" />
+ <select idref="V-22396" selected="true" />
+ <select idref="V-22397" selected="true" />
+ <select idref="V-22398" selected="true" />
+ <select idref="V-22404" selected="true" />
+ <select idref="V-22405" selected="true" />
+ <select idref="V-22406" selected="true" />
+ <select idref="V-22407" selected="true" />
+ <select idref="V-22408" selected="true" />
+ <select idref="V-22409" selected="true" />
+ <select idref="V-22410" selected="true" />
+ <select idref="V-22411" selected="true" />
+ <select idref="V-22414" selected="true" />
+ <select idref="V-22415" selected="true" />
+ <select idref="V-22416" selected="true" />
+ <select idref="V-22417" selected="true" />
+ <select idref="V-22418" selected="true" />
+ <select idref="V-22419" selected="true" />
+ <select idref="V-22421" selected="true" />
+ <select idref="V-22422" selected="true" />
+ <select idref="V-22423" selected="true" />
+ <select idref="V-22424" selected="true" />
+ <select idref="V-22425" selected="true" />
+ <select idref="V-22426" selected="true" />
+ <select idref="V-22427" selected="true" />
+ <select idref="V-22428" selected="true" />
+ <select idref="V-22429" selected="true" />
+ <select idref="V-22430" selected="true" />
+ <select idref="V-22431" selected="true" />
+ <select idref="V-22432" selected="true" />
+ <select idref="V-22433" selected="true" />
+ <select idref="V-22434" selected="true" />
+ <select idref="V-22435" selected="true" />
+ <select idref="V-22436" selected="true" />
+ <select idref="V-22437" selected="true" />
+ <select idref="V-22438" selected="true" />
+ <select idref="V-22439" selected="true" />
+ <select idref="V-22440" selected="true" />
+ <select idref="V-22441" selected="true" />
+ <select idref="V-22442" selected="true" />
+ <select idref="V-22444" selected="true" />
+ <select idref="V-22445" selected="true" />
+ <select idref="V-22446" selected="true" />
+ <select idref="V-22447" selected="true" />
+ <select idref="V-22448" selected="true" />
+ <select idref="V-22449" selected="true" />
+ <select idref="V-22450" selected="true" />
+ <select idref="V-22451" selected="true" />
+ <select idref="V-22452" selected="true" />
+ <select idref="V-22453" selected="true" />
+ <select idref="V-22454" selected="true" />
+ <select idref="V-22455" selected="true" />
+ <select idref="V-22456" selected="true" />
+ <select idref="V-22457" selected="true" />
+ <select idref="V-22458" selected="true" />
+ <select idref="V-22459" selected="true" />
+ <select idref="V-22460" selected="true" />
+ <select idref="V-22461" selected="true" />
+ <select idref="V-22462" selected="true" />
+ <select idref="V-22463" selected="true" />
+ <select idref="V-22470" selected="true" />
+ <select idref="V-22471" selected="true" />
+ <select idref="V-22472" selected="true" />
+ <select idref="V-22473" selected="true" />
+ <select idref="V-22474" selected="true" />
+ <select idref="V-22475" selected="true" />
+ <select idref="V-22485" selected="true" />
+ <select idref="V-22486" selected="true" />
+ <select idref="V-22487" selected="true" />
+ <select idref="V-22488" selected="true" />
+ <select idref="V-22489" selected="true" />
+ <select idref="V-22490" selected="true" />
+ <select idref="V-22491" selected="true" />
+ <select idref="V-22492" selected="true" />
+ <select idref="V-22493" selected="true" />
+ <select idref="V-22496" selected="true" />
+ <select idref="V-22497" selected="true" />
+ <select idref="V-22498" selected="true" />
+ <select idref="V-22499" selected="true" />
+ <select idref="V-22500" selected="true" />
+ <select idref="V-22501" selected="true" />
+ <select idref="V-22502" selected="true" />
+ <select idref="V-22503" selected="true" />
+ <select idref="V-22504" selected="true" />
+ <select idref="V-22505" selected="true" />
+ <select idref="V-22506" selected="true" />
+ <select idref="V-22507" selected="true" />
+ <select idref="V-22508" selected="true" />
+ <select idref="V-22509" selected="true" />
+ <select idref="V-22511" selected="true" />
+ <select idref="V-22514" selected="true" />
+ <select idref="V-22524" selected="true" />
+ <select idref="V-22530" selected="true" />
+ <select idref="V-22533" selected="true" />
+ <select idref="V-22539" selected="true" />
+ <select idref="V-22541" selected="true" />
+ <select idref="V-22542" selected="true" />
+ <select idref="V-22545" selected="true" />
+ <select idref="V-22546" selected="true" />
+ <select idref="V-22547" selected="true" />
+ <select idref="V-22548" selected="true" />
+ <select idref="V-22549" selected="true" />
+ <select idref="V-22550" selected="true" />
+ <select idref="V-22553" selected="true" />
+ <select idref="V-22555" selected="true" />
+ <select idref="V-22556" selected="true" />
+ <select idref="V-22557" selected="true" />
+ <select idref="V-22558" selected="true" />
+ <select idref="V-22559" selected="true" />
+ <select idref="V-22560" selected="true" />
+ <select idref="V-22561" selected="true" />
+ <select idref="V-22562" selected="true" />
+ <select idref="V-22563" selected="true" />
+ <select idref="V-22564" selected="true" />
+ <select idref="V-22565" selected="true" />
+ <select idref="V-22566" selected="true" />
+ <select idref="V-22567" selected="true" />
+ <select idref="V-22568" selected="true" />
+ <select idref="V-22569" selected="true" />
+ <select idref="V-22570" selected="true" />
+ <select idref="V-22571" selected="true" />
+ <select idref="V-22572" selected="true" />
+ <select idref="V-22573" selected="true" />
+ <select idref="V-22574" selected="true" />
+ <select idref="V-22575" selected="true" />
+ <select idref="V-22576" selected="true" />
+ <select idref="V-22577" selected="true" />
+ <select idref="V-22578" selected="true" />
+ <select idref="V-22579" selected="true" />
+ <select idref="V-22580" selected="true" />
+ <select idref="V-22582" selected="true" />
+ <select idref="V-22583" selected="true" />
+ <select idref="V-22584" selected="true" />
+ <select idref="V-22585" selected="true" />
+ <select idref="V-22586" selected="true" />
+ <select idref="V-22587" selected="true" />
+ <select idref="V-22588" selected="true" />
+ <select idref="V-22589" selected="true" />
+ <select idref="V-22595" selected="true" />
+ <select idref="V-22596" selected="true" />
+ <select idref="V-22598" selected="true" />
+ <select idref="V-22665" selected="true" />
+ <select idref="V-22702" selected="true" />
+ <select idref="V-23732" selected="true" />
+ <select idref="V-23736" selected="true" />
+ <select idref="V-23738" selected="true" />
+ <select idref="V-23739" selected="true" />
+ <select idref="V-23741" selected="true" />
+ <select idref="V-23952" selected="true" />
+ <select idref="V-23953" selected="true" />
+ <select idref="V-23972" selected="true" />
+ <select idref="V-24331" selected="true" />
+ <select idref="V-24347" selected="true" />
+ <select idref="V-24357" selected="true" />
+ <select idref="V-24384" selected="true" />
+ <select idref="V-24386" selected="true" />
+ <select idref="V-24624" selected="true" />
+ <select idref="V-27250" selected="true" />
+ <select idref="V-27251" selected="true" />
+ <select idref="V-27275" selected="true" />
+ <select idref="V-27276" selected="true" />
+ <select idref="V-27279" selected="true" />
+ <select idref="V-27283" selected="true" />
+ <select idref="V-27284" selected="true" />
+ <select idref="V-27285" selected="true" />
+ <select idref="V-29236" selected="true" />
+ <select idref="V-29237" selected="true" />
+ <select idref="V-29238" selected="true" />
+ <select idref="V-29239" selected="true" />
+ <select idref="V-29240" selected="true" />
+ <select idref="V-29241" selected="true" />
+ <select idref="V-29242" selected="true" />
+ <select idref="V-29243" selected="true" />
+ <select idref="V-29244" selected="true" />
+ <select idref="V-29245" selected="true" />
+ <select idref="V-29246" selected="true" />
+ <select idref="V-29247" selected="true" />
+ <select idref="V-29248" selected="true" />
+ <select idref="V-29249" selected="true" />
+ <select idref="V-29250" selected="true" />
+ <select idref="V-29251" selected="true" />
+ <select idref="V-29252" selected="true" />
+ <select idref="V-29253" selected="true" />
+ <select idref="V-29255" selected="true" />
+ <select idref="V-29257" selected="true" />
+ <select idref="V-29259" selected="true" />
+ <select idref="V-29261" selected="true" />
+ <select idref="V-29272" selected="true" />
+ <select idref="V-29274" selected="true" />
+ <select idref="V-29275" selected="true" />
+ <select idref="V-29279" selected="true" />
+ <select idref="V-29281" selected="true" />
+ <select idref="V-29284" selected="true" />
+ <select idref="V-29286" selected="true" />
+ <select idref="V-29288" selected="true" />
+ <select idref="V-29289" selected="true" />
+ <select idref="V-29376" selected="true" />
+ </Profile>
+ <Profile id="MAC-3_Public">
+ <title>III - Administrative Public</title>
+
<description><ProfileDescription></ProfileDescription></description>
+ <select idref="V-756" selected="true" />
+ <select idref="V-761" selected="true" />
+ <select idref="V-763" selected="true" />
+ <select idref="V-765" selected="true" />
+ <select idref="V-769" selected="true" />
+ <select idref="V-770" selected="true" />
+ <select idref="V-773" selected="true" />
+ <select idref="V-774" selected="true" />
+ <select idref="V-775" selected="true" />
+ <select idref="V-776" selected="true" />
+ <select idref="V-777" selected="true" />
+ <select idref="V-780" selected="true" />
+ <select idref="V-781" selected="true" />
+ <select idref="V-782" selected="true" />
+ <select idref="V-783" selected="true" />
+ <select idref="V-784" selected="true" />
+ <select idref="V-785" selected="true" />
+ <select idref="V-786" selected="true" />
+ <select idref="V-787" selected="true" />
+ <select idref="V-788" selected="true" />
+ <select idref="V-789" selected="true" />
+ <select idref="V-790" selected="true" />
+ <select idref="V-791" selected="true" />
+ <select idref="V-792" selected="true" />
+ <select idref="V-793" selected="true" />
+ <select idref="V-794" selected="true" />
+ <select idref="V-795" selected="true" />
+ <select idref="V-796" selected="true" />
+ <select idref="V-797" selected="true" />
+ <select idref="V-798" selected="true" />
+ <select idref="V-800" selected="true" />
+ <select idref="V-801" selected="true" />
+ <select idref="V-802" selected="true" />
+ <select idref="V-803" selected="true" />
+ <select idref="V-804" selected="true" />
+ <select idref="V-805" selected="true" />
+ <select idref="V-806" selected="true" />
+ <select idref="V-807" selected="true" />
+ <select idref="V-808" selected="true" />
+ <select idref="V-811" selected="true" />
+ <select idref="V-812" selected="true" />
+ <select idref="V-813" selected="true" />
+ <select idref="V-814" selected="true" />
+ <select idref="V-815" selected="true" />
+ <select idref="V-818" selected="true" />
+ <select idref="V-819" selected="true" />
+ <select idref="V-821" selected="true" />
+ <select idref="V-822" selected="true" />
+ <select idref="V-823" selected="true" />
+ <select idref="V-824" selected="true" />
+ <select idref="V-825" selected="true" />
+ <select idref="V-827" selected="true" />
+ <select idref="V-828" selected="true" />
+ <select idref="V-829" selected="true" />
+ <select idref="V-831" selected="true" />
+ <select idref="V-832" selected="true" />
+ <select idref="V-833" selected="true" />
+ <select idref="V-834" selected="true" />
+ <select idref="V-835" selected="true" />
+ <select idref="V-836" selected="true" />
+ <select idref="V-837" selected="true" />
+ <select idref="V-838" selected="true" />
+ <select idref="V-840" selected="true" />
+ <select idref="V-841" selected="true" />
+ <select idref="V-842" selected="true" />
+ <select idref="V-843" selected="true" />
+ <select idref="V-845" selected="true" />
+ <select idref="V-846" selected="true" />
+ <select idref="V-847" selected="true" />
+ <select idref="V-848" selected="true" />
+ <select idref="V-849" selected="true" />
+ <select idref="V-850" selected="true" />
+ <select idref="V-867" selected="true" />
+ <select idref="V-899" selected="true" />
+ <select idref="V-900" selected="true" />
+ <select idref="V-901" selected="true" />
+ <select idref="V-902" selected="true" />
+ <select idref="V-903" selected="true" />
+ <select idref="V-904" selected="true" />
+ <select idref="V-905" selected="true" />
+ <select idref="V-906" selected="true" />
+ <select idref="V-907" selected="true" />
+ <select idref="V-910" selected="true" />
+ <select idref="V-913" selected="true" />
+ <select idref="V-914" selected="true" />
+ <select idref="V-915" selected="true" />
+ <select idref="V-916" selected="true" />
+ <select idref="V-917" selected="true" />
+ <select idref="V-918" selected="true" />
+ <select idref="V-921" selected="true" />
+ <select idref="V-922" selected="true" />
+ <select idref="V-923" selected="true" />
+ <select idref="V-924" selected="true" />
+ <select idref="V-925" selected="true" />
+ <select idref="V-928" selected="true" />
+ <select idref="V-929" selected="true" />
+ <select idref="V-931" selected="true" />
+ <select idref="V-932" selected="true" />
+ <select idref="V-933" selected="true" />
+ <select idref="V-935" selected="true" />
+ <select idref="V-936" selected="true" />
+ <select idref="V-940" selected="true" />
+ <select idref="V-941" selected="true" />
+ <select idref="V-974" selected="true" />
+ <select idref="V-975" selected="true" />
+ <select idref="V-976" selected="true" />
+ <select idref="V-977" selected="true" />
+ <select idref="V-978" selected="true" />
+ <select idref="V-979" selected="true" />
+ <select idref="V-980" selected="true" />
+ <select idref="V-981" selected="true" />
+ <select idref="V-982" selected="true" />
+ <select idref="V-983" selected="true" />
+ <select idref="V-984" selected="true" />
+ <select idref="V-985" selected="true" />
+ <select idref="V-986" selected="true" />
+ <select idref="V-987" selected="true" />
+ <select idref="V-988" selected="true" />
+ <select idref="V-989" selected="true" />
+ <select idref="V-993" selected="true" />
+ <select idref="V-994" selected="true" />
+ <select idref="V-995" selected="true" />
+ <select idref="V-1010" selected="true" />
+ <select idref="V-1011" selected="true" />
+ <select idref="V-1013" selected="true" />
+ <select idref="V-1021" selected="true" />
+ <select idref="V-1022" selected="true" />
+ <select idref="V-1023" selected="true" />
+ <select idref="V-1025" selected="true" />
+ <select idref="V-1026" selected="true" />
+ <select idref="V-1027" selected="true" />
+ <select idref="V-1028" selected="true" />
+ <select idref="V-1029" selected="true" />
+ <select idref="V-1030" selected="true" />
+ <select idref="V-1032" selected="true" />
+ <select idref="V-1046" selected="true" />
+ <select idref="V-1047" selected="true" />
+ <select idref="V-1048" selected="true" />
+ <select idref="V-1049" selected="true" />
+ <select idref="V-1054" selected="true" />
+ <select idref="V-1055" selected="true" />
+ <select idref="V-1056" selected="true" />
+ <select idref="V-1058" selected="true" />
+ <select idref="V-1059" selected="true" />
+ <select idref="V-1061" selected="true" />
+ <select idref="V-1062" selected="true" />
+ <select idref="V-4083" selected="true" />
+ <select idref="V-4084" selected="true" />
+ <select idref="V-4087" selected="true" />
+ <select idref="V-4089" selected="true" />
+ <select idref="V-4090" selected="true" />
+ <select idref="V-4091" selected="true" />
+ <select idref="V-4246" selected="true" />
+ <select idref="V-4247" selected="true" />
+ <select idref="V-4248" selected="true" />
+ <select idref="V-4249" selected="true" />
+ <select idref="V-4250" selected="true" />
+ <select idref="V-4255" selected="true" />
+ <select idref="V-4268" selected="true" />
+ <select idref="V-4269" selected="true" />
+ <select idref="V-4273" selected="true" />
+ <select idref="V-4274" selected="true" />
+ <select idref="V-4275" selected="true" />
+ <select idref="V-4276" selected="true" />
+ <select idref="V-4277" selected="true" />
+ <select idref="V-4278" selected="true" />
+ <select idref="V-4295" selected="true" />
+ <select idref="V-4298" selected="true" />
+ <select idref="V-4301" selected="true" />
+ <select idref="V-4304" selected="true" />
+ <select idref="V-4321" selected="true" />
+ <select idref="V-4334" selected="true" />
+ <select idref="V-4335" selected="true" />
+ <select idref="V-4336" selected="true" />
+ <select idref="V-4339" selected="true" />
+ <select idref="V-4342" selected="true" />
+ <select idref="V-4346" selected="true" />
+ <select idref="V-4357" selected="true" />
+ <select idref="V-4358" selected="true" />
+ <select idref="V-4360" selected="true" />
+ <select idref="V-4361" selected="true" />
+ <select idref="V-4364" selected="true" />
+ <select idref="V-4365" selected="true" />
+ <select idref="V-4366" selected="true" />
+ <select idref="V-4367" selected="true" />
+ <select idref="V-4368" selected="true" />
+ <select idref="V-4369" selected="true" />
+ <select idref="V-4370" selected="true" />
+ <select idref="V-4371" selected="true" />
+ <select idref="V-4382" selected="true" />
+ <select idref="V-4384" selected="true" />
+ <select idref="V-4385" selected="true" />
+ <select idref="V-4387" selected="true" />
+ <select idref="V-4392" selected="true" />
+ <select idref="V-4393" selected="true" />
+ <select idref="V-4394" selected="true" />
+ <select idref="V-4395" selected="true" />
+ <select idref="V-4397" selected="true" />
+ <select idref="V-4398" selected="true" />
+ <select idref="V-4399" selected="true" />
+ <select idref="V-4427" selected="true" />
+ <select idref="V-4428" selected="true" />
+ <select idref="V-4430" selected="true" />
+ <select idref="V-4687" selected="true" />
+ <select idref="V-4688" selected="true" />
+ <select idref="V-4689" selected="true" />
+ <select idref="V-4690" selected="true" />
+ <select idref="V-4691" selected="true" />
+ <select idref="V-4692" selected="true" />
+ <select idref="V-4693" selected="true" />
+ <select idref="V-4694" selected="true" />
+ <select idref="V-4695" selected="true" />
+ <select idref="V-4696" selected="true" />
+ <select idref="V-4697" selected="true" />
+ <select idref="V-4701" selected="true" />
+ <select idref="V-4702" selected="true" />
+ <select idref="V-11940" selected="true" />
+ <select idref="V-11945" selected="true" />
+ <select idref="V-11946" selected="true" />
+ <select idref="V-11947" selected="true" />
+ <select idref="V-11948" selected="true" />
+ <select idref="V-11972" selected="true" />
+ <select idref="V-11973" selected="true" />
+ <select idref="V-11975" selected="true" />
+ <select idref="V-11976" selected="true" />
+ <select idref="V-11977" selected="true" />
+ <select idref="V-11979" selected="true" />
+ <select idref="V-11980" selected="true" />
+ <select idref="V-11981" selected="true" />
+ <select idref="V-11982" selected="true" />
+ <select idref="V-11983" selected="true" />
+ <select idref="V-11984" selected="true" />
+ <select idref="V-11985" selected="true" />
+ <select idref="V-11986" selected="true" />
+ <select idref="V-11987" selected="true" />
+ <select idref="V-11988" selected="true" />
+ <select idref="V-11989" selected="true" />
+ <select idref="V-11990" selected="true" />
+ <select idref="V-11994" selected="true" />
+ <select idref="V-11995" selected="true" />
+ <select idref="V-11996" selected="true" />
+ <select idref="V-11997" selected="true" />
+ <select idref="V-11999" selected="true" />
+ <select idref="V-12002" selected="true" />
+ <select idref="V-12003" selected="true" />
+ <select idref="V-12004" selected="true" />
+ <select idref="V-12005" selected="true" />
+ <select idref="V-12006" selected="true" />
+ <select idref="V-12010" selected="true" />
+ <select idref="V-12011" selected="true" />
+ <select idref="V-12014" selected="true" />
+ <select idref="V-12016" selected="true" />
+ <select idref="V-12017" selected="true" />
+ <select idref="V-12018" selected="true" />
+ <select idref="V-12019" selected="true" />
+ <select idref="V-12020" selected="true" />
+ <select idref="V-12021" selected="true" />
+ <select idref="V-12022" selected="true" />
+ <select idref="V-12023" selected="true" />
+ <select idref="V-12024" selected="true" />
+ <select idref="V-12025" selected="true" />
+ <select idref="V-12026" selected="true" />
+ <select idref="V-12028" selected="true" />
+ <select idref="V-12030" selected="true" />
+ <select idref="V-12038" selected="true" />
+ <select idref="V-12039" selected="true" />
+ <select idref="V-12040" selected="true" />
+ <select idref="V-12049" selected="true" />
+ <select idref="V-12765" selected="true" />
+ <select idref="V-22290" selected="true" />
+ <select idref="V-22291" selected="true" />
+ <select idref="V-22292" selected="true" />
+ <select idref="V-22294" selected="true" />
+ <select idref="V-22295" selected="true" />
+ <select idref="V-22296" selected="true" />
+ <select idref="V-22297" selected="true" />
+ <select idref="V-22298" selected="true" />
+ <select idref="V-22299" selected="true" />
+ <select idref="V-22301" selected="true" />
+ <select idref="V-22302" selected="true" />
+ <select idref="V-22303" selected="true" />
+ <select idref="V-22304" selected="true" />
+ <select idref="V-22305" selected="true" />
+ <select idref="V-22306" selected="true" />
+ <select idref="V-22307" selected="true" />
+ <select idref="V-22308" selected="true" />
+ <select idref="V-22309" selected="true" />
+ <select idref="V-22310" selected="true" />
+ <select idref="V-22311" selected="true" />
+ <select idref="V-22312" selected="true" />
+ <select idref="V-22313" selected="true" />
+ <select idref="V-22314" selected="true" />
+ <select idref="V-22315" selected="true" />
+ <select idref="V-22316" selected="true" />
+ <select idref="V-22317" selected="true" />
+ <select idref="V-22318" selected="true" />
+ <select idref="V-22319" selected="true" />
+ <select idref="V-22320" selected="true" />
+ <select idref="V-22321" selected="true" />
+ <select idref="V-22322" selected="true" />
+ <select idref="V-22323" selected="true" />
+ <select idref="V-22324" selected="true" />
+ <select idref="V-22325" selected="true" />
+ <select idref="V-22326" selected="true" />
+ <select idref="V-22327" selected="true" />
+ <select idref="V-22328" selected="true" />
+ <select idref="V-22329" selected="true" />
+ <select idref="V-22330" selected="true" />
+ <select idref="V-22332" selected="true" />
+ <select idref="V-22333" selected="true" />
+ <select idref="V-22334" selected="true" />
+ <select idref="V-22335" selected="true" />
+ <select idref="V-22336" selected="true" />
+ <select idref="V-22337" selected="true" />
+ <select idref="V-22338" selected="true" />
+ <select idref="V-22339" selected="true" />
+ <select idref="V-22340" selected="true" />
+ <select idref="V-22341" selected="true" />
+ <select idref="V-22342" selected="true" />
+ <select idref="V-22343" selected="true" />
+ <select idref="V-22344" selected="true" />
+ <select idref="V-22347" selected="true" />
+ <select idref="V-22348" selected="true" />
+ <select idref="V-22349" selected="true" />
+ <select idref="V-22350" selected="true" />
+ <select idref="V-22351" selected="true" />
+ <select idref="V-22352" selected="true" />
+ <select idref="V-22353" selected="true" />
+ <select idref="V-22354" selected="true" />
+ <select idref="V-22355" selected="true" />
+ <select idref="V-22356" selected="true" />
+ <select idref="V-22357" selected="true" />
+ <select idref="V-22358" selected="true" />
+ <select idref="V-22359" selected="true" />
+ <select idref="V-22360" selected="true" />
+ <select idref="V-22361" selected="true" />
+ <select idref="V-22362" selected="true" />
+ <select idref="V-22363" selected="true" />
+ <select idref="V-22364" selected="true" />
+ <select idref="V-22365" selected="true" />
+ <select idref="V-22366" selected="true" />
+ <select idref="V-22367" selected="true" />
+ <select idref="V-22368" selected="true" />
+ <select idref="V-22369" selected="true" />
+ <select idref="V-22370" selected="true" />
+ <select idref="V-22371" selected="true" />
+ <select idref="V-22372" selected="true" />
+ <select idref="V-22373" selected="true" />
+ <select idref="V-22374" selected="true" />
+ <select idref="V-22375" selected="true" />
+ <select idref="V-22376" selected="true" />
+ <select idref="V-22377" selected="true" />
+ <select idref="V-22378" selected="true" />
+ <select idref="V-22382" selected="true" />
+ <select idref="V-22383" selected="true" />
+ <select idref="V-22384" selected="true" />
+ <select idref="V-22385" selected="true" />
+ <select idref="V-22386" selected="true" />
+ <select idref="V-22387" selected="true" />
+ <select idref="V-22388" selected="true" />
+ <select idref="V-22389" selected="true" />
+ <select idref="V-22390" selected="true" />
+ <select idref="V-22391" selected="true" />
+ <select idref="V-22392" selected="true" />
+ <select idref="V-22393" selected="true" />
+ <select idref="V-22394" selected="true" />
+ <select idref="V-22395" selected="true" />
+ <select idref="V-22396" selected="true" />
+ <select idref="V-22397" selected="true" />
+ <select idref="V-22398" selected="true" />
+ <select idref="V-22404" selected="true" />
+ <select idref="V-22405" selected="true" />
+ <select idref="V-22406" selected="true" />
+ <select idref="V-22407" selected="true" />
+ <select idref="V-22408" selected="true" />
+ <select idref="V-22409" selected="true" />
+ <select idref="V-22410" selected="true" />
+ <select idref="V-22411" selected="true" />
+ <select idref="V-22414" selected="true" />
+ <select idref="V-22415" selected="true" />
+ <select idref="V-22416" selected="true" />
+ <select idref="V-22417" selected="true" />
+ <select idref="V-22418" selected="true" />
+ <select idref="V-22419" selected="true" />
+ <select idref="V-22421" selected="true" />
+ <select idref="V-22422" selected="true" />
+ <select idref="V-22423" selected="true" />
+ <select idref="V-22424" selected="true" />
+ <select idref="V-22425" selected="true" />
+ <select idref="V-22426" selected="true" />
+ <select idref="V-22427" selected="true" />
+ <select idref="V-22428" selected="true" />
+ <select idref="V-22429" selected="true" />
+ <select idref="V-22430" selected="true" />
+ <select idref="V-22431" selected="true" />
+ <select idref="V-22432" selected="true" />
+ <select idref="V-22433" selected="true" />
+ <select idref="V-22434" selected="true" />
+ <select idref="V-22435" selected="true" />
+ <select idref="V-22436" selected="true" />
+ <select idref="V-22437" selected="true" />
+ <select idref="V-22438" selected="true" />
+ <select idref="V-22439" selected="true" />
+ <select idref="V-22440" selected="true" />
+ <select idref="V-22441" selected="true" />
+ <select idref="V-22442" selected="true" />
+ <select idref="V-22444" selected="true" />
+ <select idref="V-22445" selected="true" />
+ <select idref="V-22446" selected="true" />
+ <select idref="V-22447" selected="true" />
+ <select idref="V-22448" selected="true" />
+ <select idref="V-22449" selected="true" />
+ <select idref="V-22450" selected="true" />
+ <select idref="V-22451" selected="true" />
+ <select idref="V-22452" selected="true" />
+ <select idref="V-22453" selected="true" />
+ <select idref="V-22454" selected="true" />
+ <select idref="V-22455" selected="true" />
+ <select idref="V-22456" selected="true" />
+ <select idref="V-22457" selected="true" />
+ <select idref="V-22458" selected="true" />
+ <select idref="V-22459" selected="true" />
+ <select idref="V-22460" selected="true" />
+ <select idref="V-22461" selected="true" />
+ <select idref="V-22462" selected="true" />
+ <select idref="V-22463" selected="true" />
+ <select idref="V-22470" selected="true" />
+ <select idref="V-22471" selected="true" />
+ <select idref="V-22472" selected="true" />
+ <select idref="V-22473" selected="true" />
+ <select idref="V-22474" selected="true" />
+ <select idref="V-22475" selected="true" />
+ <select idref="V-22485" selected="true" />
+ <select idref="V-22486" selected="true" />
+ <select idref="V-22487" selected="true" />
+ <select idref="V-22488" selected="true" />
+ <select idref="V-22489" selected="true" />
+ <select idref="V-22490" selected="true" />
+ <select idref="V-22491" selected="true" />
+ <select idref="V-22492" selected="true" />
+ <select idref="V-22493" selected="true" />
+ <select idref="V-22496" selected="true" />
+ <select idref="V-22497" selected="true" />
+ <select idref="V-22498" selected="true" />
+ <select idref="V-22499" selected="true" />
+ <select idref="V-22500" selected="true" />
+ <select idref="V-22501" selected="true" />
+ <select idref="V-22502" selected="true" />
+ <select idref="V-22503" selected="true" />
+ <select idref="V-22504" selected="true" />
+ <select idref="V-22505" selected="true" />
+ <select idref="V-22506" selected="true" />
+ <select idref="V-22507" selected="true" />
+ <select idref="V-22508" selected="true" />
+ <select idref="V-22509" selected="true" />
+ <select idref="V-22511" selected="true" />
+ <select idref="V-22514" selected="true" />
+ <select idref="V-22524" selected="true" />
+ <select idref="V-22530" selected="true" />
+ <select idref="V-22533" selected="true" />
+ <select idref="V-22539" selected="true" />
+ <select idref="V-22541" selected="true" />
+ <select idref="V-22542" selected="true" />
+ <select idref="V-22545" selected="true" />
+ <select idref="V-22546" selected="true" />
+ <select idref="V-22547" selected="true" />
+ <select idref="V-22548" selected="true" />
+ <select idref="V-22549" selected="true" />
+ <select idref="V-22550" selected="true" />
+ <select idref="V-22553" selected="true" />
+ <select idref="V-22555" selected="true" />
+ <select idref="V-22556" selected="true" />
+ <select idref="V-22557" selected="true" />
+ <select idref="V-22558" selected="true" />
+ <select idref="V-22559" selected="true" />
+ <select idref="V-22560" selected="true" />
+ <select idref="V-22561" selected="true" />
+ <select idref="V-22562" selected="true" />
+ <select idref="V-22563" selected="true" />
+ <select idref="V-22564" selected="true" />
+ <select idref="V-22565" selected="true" />
+ <select idref="V-22566" selected="true" />
+ <select idref="V-22567" selected="true" />
+ <select idref="V-22568" selected="true" />
+ <select idref="V-22569" selected="true" />
+ <select idref="V-22570" selected="true" />
+ <select idref="V-22571" selected="true" />
+ <select idref="V-22572" selected="true" />
+ <select idref="V-22573" selected="true" />
+ <select idref="V-22574" selected="true" />
+ <select idref="V-22575" selected="true" />
+ <select idref="V-22576" selected="true" />
+ <select idref="V-22577" selected="true" />
+ <select idref="V-22578" selected="true" />
+ <select idref="V-22579" selected="true" />
+ <select idref="V-22580" selected="true" />
+ <select idref="V-22582" selected="true" />
+ <select idref="V-22583" selected="true" />
+ <select idref="V-22584" selected="true" />
+ <select idref="V-22585" selected="true" />
+ <select idref="V-22586" selected="true" />
+ <select idref="V-22587" selected="true" />
+ <select idref="V-22588" selected="true" />
+ <select idref="V-22589" selected="true" />
+ <select idref="V-22595" selected="true" />
+ <select idref="V-22596" selected="true" />
+ <select idref="V-22598" selected="true" />
+ <select idref="V-22665" selected="true" />
+ <select idref="V-22702" selected="true" />
+ <select idref="V-23732" selected="true" />
+ <select idref="V-23736" selected="true" />
+ <select idref="V-23738" selected="true" />
+ <select idref="V-23739" selected="true" />
+ <select idref="V-23741" selected="true" />
+ <select idref="V-23952" selected="true" />
+ <select idref="V-23953" selected="true" />
+ <select idref="V-23972" selected="true" />
+ <select idref="V-24331" selected="true" />
+ <select idref="V-24347" selected="true" />
+ <select idref="V-24357" selected="true" />
+ <select idref="V-24384" selected="true" />
+ <select idref="V-24386" selected="true" />
+ <select idref="V-24624" selected="true" />
+ <select idref="V-27250" selected="true" />
+ <select idref="V-27251" selected="true" />
+ <select idref="V-27275" selected="true" />
+ <select idref="V-27276" selected="true" />
+ <select idref="V-27279" selected="true" />
+ <select idref="V-27283" selected="true" />
+ <select idref="V-27284" selected="true" />
+ <select idref="V-27285" selected="true" />
+ <select idref="V-29236" selected="true" />
+ <select idref="V-29237" selected="true" />
+ <select idref="V-29238" selected="true" />
+ <select idref="V-29239" selected="true" />
+ <select idref="V-29240" selected="true" />
+ <select idref="V-29241" selected="true" />
+ <select idref="V-29242" selected="true" />
+ <select idref="V-29243" selected="true" />
+ <select idref="V-29244" selected="true" />
+ <select idref="V-29245" selected="true" />
+ <select idref="V-29246" selected="true" />
+ <select idref="V-29247" selected="true" />
+ <select idref="V-29248" selected="true" />
+ <select idref="V-29249" selected="true" />
+ <select idref="V-29250" selected="true" />
+ <select idref="V-29251" selected="true" />
+ <select idref="V-29252" selected="true" />
+ <select idref="V-29253" selected="true" />
+ <select idref="V-29255" selected="true" />
+ <select idref="V-29257" selected="true" />
+ <select idref="V-29259" selected="true" />
+ <select idref="V-29261" selected="true" />
+ <select idref="V-29272" selected="true" />
+ <select idref="V-29274" selected="true" />
+ <select idref="V-29275" selected="true" />
+ <select idref="V-29279" selected="true" />
+ <select idref="V-29281" selected="true" />
+ <select idref="V-29284" selected="true" />
+ <select idref="V-29286" selected="true" />
+ <select idref="V-29288" selected="true" />
+ <select idref="V-29289" selected="true" />
+ <select idref="V-29376" selected="true" />
+ </Profile>
+ <Profile id="MAC-3_Sensitive">
+ <title>III - Administrative Sensitive</title>
+
<description><ProfileDescription></ProfileDescription></description>
+ <select idref="V-756" selected="true" />
+ <select idref="V-760" selected="true" />
+ <select idref="V-761" selected="true" />
+ <select idref="V-762" selected="true" />
+ <select idref="V-763" selected="true" />
+ <select idref="V-765" selected="true" />
+ <select idref="V-766" selected="true" />
+ <select idref="V-768" selected="true" />
+ <select idref="V-769" selected="true" />
+ <select idref="V-770" selected="true" />
+ <select idref="V-773" selected="true" />
+ <select idref="V-774" selected="true" />
+ <select idref="V-775" selected="true" />
+ <select idref="V-776" selected="true" />
+ <select idref="V-777" selected="true" />
+ <select idref="V-778" selected="true" />
+ <select idref="V-780" selected="true" />
+ <select idref="V-781" selected="true" />
+ <select idref="V-782" selected="true" />
+ <select idref="V-783" selected="true" />
+ <select idref="V-784" selected="true" />
+ <select idref="V-785" selected="true" />
+ <select idref="V-786" selected="true" />
+ <select idref="V-787" selected="true" />
+ <select idref="V-788" selected="true" />
+ <select idref="V-789" selected="true" />
+ <select idref="V-790" selected="true" />
+ <select idref="V-791" selected="true" />
+ <select idref="V-792" selected="true" />
+ <select idref="V-793" selected="true" />
+ <select idref="V-794" selected="true" />
+ <select idref="V-795" selected="true" />
+ <select idref="V-796" selected="true" />
+ <select idref="V-797" selected="true" />
+ <select idref="V-798" selected="true" />
+ <select idref="V-800" selected="true" />
+ <select idref="V-801" selected="true" />
+ <select idref="V-802" selected="true" />
+ <select idref="V-803" selected="true" />
+ <select idref="V-804" selected="true" />
+ <select idref="V-805" selected="true" />
+ <select idref="V-806" selected="true" />
+ <select idref="V-807" selected="true" />
+ <select idref="V-808" selected="true" />
+ <select idref="V-810" selected="true" />
+ <select idref="V-811" selected="true" />
+ <select idref="V-812" selected="true" />
+ <select idref="V-813" selected="true" />
+ <select idref="V-814" selected="true" />
+ <select idref="V-815" selected="true" />
+ <select idref="V-818" selected="true" />
+ <select idref="V-819" selected="true" />
+ <select idref="V-821" selected="true" />
+ <select idref="V-822" selected="true" />
+ <select idref="V-823" selected="true" />
+ <select idref="V-824" selected="true" />
+ <select idref="V-825" selected="true" />
+ <select idref="V-827" selected="true" />
+ <select idref="V-828" selected="true" />
+ <select idref="V-829" selected="true" />
+ <select idref="V-831" selected="true" />
+ <select idref="V-832" selected="true" />
+ <select idref="V-833" selected="true" />
+ <select idref="V-834" selected="true" />
+ <select idref="V-835" selected="true" />
+ <select idref="V-836" selected="true" />
+ <select idref="V-837" selected="true" />
+ <select idref="V-838" selected="true" />
+ <select idref="V-840" selected="true" />
+ <select idref="V-841" selected="true" />
+ <select idref="V-842" selected="true" />
+ <select idref="V-843" selected="true" />
+ <select idref="V-845" selected="true" />
+ <select idref="V-846" selected="true" />
+ <select idref="V-847" selected="true" />
+ <select idref="V-848" selected="true" />
+ <select idref="V-849" selected="true" />
+ <select idref="V-850" selected="true" />
+ <select idref="V-867" selected="true" />
+ <select idref="V-899" selected="true" />
+ <select idref="V-900" selected="true" />
+ <select idref="V-901" selected="true" />
+ <select idref="V-902" selected="true" />
+ <select idref="V-903" selected="true" />
+ <select idref="V-904" selected="true" />
+ <select idref="V-905" selected="true" />
+ <select idref="V-906" selected="true" />
+ <select idref="V-907" selected="true" />
+ <select idref="V-910" selected="true" />
+ <select idref="V-913" selected="true" />
+ <select idref="V-914" selected="true" />
+ <select idref="V-915" selected="true" />
+ <select idref="V-916" selected="true" />
+ <select idref="V-917" selected="true" />
+ <select idref="V-918" selected="true" />
+ <select idref="V-921" selected="true" />
+ <select idref="V-922" selected="true" />
+ <select idref="V-923" selected="true" />
+ <select idref="V-924" selected="true" />
+ <select idref="V-925" selected="true" />
+ <select idref="V-928" selected="true" />
+ <select idref="V-929" selected="true" />
+ <select idref="V-931" selected="true" />
+ <select idref="V-932" selected="true" />
+ <select idref="V-933" selected="true" />
+ <select idref="V-935" selected="true" />
+ <select idref="V-936" selected="true" />
+ <select idref="V-940" selected="true" />
+ <select idref="V-941" selected="true" />
+ <select idref="V-974" selected="true" />
+ <select idref="V-975" selected="true" />
+ <select idref="V-976" selected="true" />
+ <select idref="V-977" selected="true" />
+ <select idref="V-978" selected="true" />
+ <select idref="V-979" selected="true" />
+ <select idref="V-980" selected="true" />
+ <select idref="V-981" selected="true" />
+ <select idref="V-982" selected="true" />
+ <select idref="V-983" selected="true" />
+ <select idref="V-984" selected="true" />
+ <select idref="V-985" selected="true" />
+ <select idref="V-986" selected="true" />
+ <select idref="V-987" selected="true" />
+ <select idref="V-988" selected="true" />
+ <select idref="V-989" selected="true" />
+ <select idref="V-993" selected="true" />
+ <select idref="V-994" selected="true" />
+ <select idref="V-995" selected="true" />
+ <select idref="V-1010" selected="true" />
+ <select idref="V-1011" selected="true" />
+ <select idref="V-1013" selected="true" />
+ <select idref="V-1021" selected="true" />
+ <select idref="V-1022" selected="true" />
+ <select idref="V-1023" selected="true" />
+ <select idref="V-1025" selected="true" />
+ <select idref="V-1026" selected="true" />
+ <select idref="V-1027" selected="true" />
+ <select idref="V-1028" selected="true" />
+ <select idref="V-1029" selected="true" />
+ <select idref="V-1030" selected="true" />
+ <select idref="V-1032" selected="true" />
+ <select idref="V-1046" selected="true" />
+ <select idref="V-1047" selected="true" />
+ <select idref="V-1048" selected="true" />
+ <select idref="V-1049" selected="true" />
+ <select idref="V-1054" selected="true" />
+ <select idref="V-1055" selected="true" />
+ <select idref="V-1056" selected="true" />
+ <select idref="V-1058" selected="true" />
+ <select idref="V-1059" selected="true" />
+ <select idref="V-1061" selected="true" />
+ <select idref="V-1062" selected="true" />
+ <select idref="V-4083" selected="true" />
+ <select idref="V-4084" selected="true" />
+ <select idref="V-4087" selected="true" />
+ <select idref="V-4089" selected="true" />
+ <select idref="V-4090" selected="true" />
+ <select idref="V-4091" selected="true" />
+ <select idref="V-4246" selected="true" />
+ <select idref="V-4247" selected="true" />
+ <select idref="V-4248" selected="true" />
+ <select idref="V-4249" selected="true" />
+ <select idref="V-4250" selected="true" />
+ <select idref="V-4255" selected="true" />
+ <select idref="V-4268" selected="true" />
+ <select idref="V-4269" selected="true" />
+ <select idref="V-4273" selected="true" />
+ <select idref="V-4274" selected="true" />
+ <select idref="V-4275" selected="true" />
+ <select idref="V-4276" selected="true" />
+ <select idref="V-4277" selected="true" />
+ <select idref="V-4278" selected="true" />
+ <select idref="V-4295" selected="true" />
+ <select idref="V-4298" selected="true" />
+ <select idref="V-4301" selected="true" />
+ <select idref="V-4304" selected="true" />
+ <select idref="V-4321" selected="true" />
+ <select idref="V-4334" selected="true" />
+ <select idref="V-4335" selected="true" />
+ <select idref="V-4336" selected="true" />
+ <select idref="V-4339" selected="true" />
+ <select idref="V-4342" selected="true" />
+ <select idref="V-4346" selected="true" />
+ <select idref="V-4357" selected="true" />
+ <select idref="V-4358" selected="true" />
+ <select idref="V-4360" selected="true" />
+ <select idref="V-4361" selected="true" />
+ <select idref="V-4364" selected="true" />
+ <select idref="V-4365" selected="true" />
+ <select idref="V-4366" selected="true" />
+ <select idref="V-4367" selected="true" />
+ <select idref="V-4368" selected="true" />
+ <select idref="V-4369" selected="true" />
+ <select idref="V-4370" selected="true" />
+ <select idref="V-4371" selected="true" />
+ <select idref="V-4382" selected="true" />
+ <select idref="V-4384" selected="true" />
+ <select idref="V-4385" selected="true" />
+ <select idref="V-4387" selected="true" />
+ <select idref="V-4392" selected="true" />
+ <select idref="V-4393" selected="true" />
+ <select idref="V-4394" selected="true" />
+ <select idref="V-4395" selected="true" />
+ <select idref="V-4397" selected="true" />
+ <select idref="V-4398" selected="true" />
+ <select idref="V-4399" selected="true" />
+ <select idref="V-4427" selected="true" />
+ <select idref="V-4428" selected="true" />
+ <select idref="V-4430" selected="true" />
+ <select idref="V-4687" selected="true" />
+ <select idref="V-4688" selected="true" />
+ <select idref="V-4689" selected="true" />
+ <select idref="V-4690" selected="true" />
+ <select idref="V-4691" selected="true" />
+ <select idref="V-4692" selected="true" />
+ <select idref="V-4693" selected="true" />
+ <select idref="V-4694" selected="true" />
+ <select idref="V-4695" selected="true" />
+ <select idref="V-4696" selected="true" />
+ <select idref="V-4697" selected="true" />
+ <select idref="V-4701" selected="true" />
+ <select idref="V-4702" selected="true" />
+ <select idref="V-11940" selected="true" />
+ <select idref="V-11945" selected="true" />
+ <select idref="V-11946" selected="true" />
+ <select idref="V-11947" selected="true" />
+ <select idref="V-11948" selected="true" />
+ <select idref="V-11972" selected="true" />
+ <select idref="V-11973" selected="true" />
+ <select idref="V-11975" selected="true" />
+ <select idref="V-11976" selected="true" />
+ <select idref="V-11977" selected="true" />
+ <select idref="V-11979" selected="true" />
+ <select idref="V-11980" selected="true" />
+ <select idref="V-11981" selected="true" />
+ <select idref="V-11982" selected="true" />
+ <select idref="V-11983" selected="true" />
+ <select idref="V-11984" selected="true" />
+ <select idref="V-11985" selected="true" />
+ <select idref="V-11986" selected="true" />
+ <select idref="V-11987" selected="true" />
+ <select idref="V-11988" selected="true" />
+ <select idref="V-11989" selected="true" />
+ <select idref="V-11990" selected="true" />
+ <select idref="V-11994" selected="true" />
+ <select idref="V-11995" selected="true" />
+ <select idref="V-11996" selected="true" />
+ <select idref="V-11997" selected="true" />
+ <select idref="V-11999" selected="true" />
+ <select idref="V-12002" selected="true" />
+ <select idref="V-12003" selected="true" />
+ <select idref="V-12004" selected="true" />
+ <select idref="V-12005" selected="true" />
+ <select idref="V-12006" selected="true" />
+ <select idref="V-12010" selected="true" />
+ <select idref="V-12011" selected="true" />
+ <select idref="V-12014" selected="true" />
+ <select idref="V-12016" selected="true" />
+ <select idref="V-12017" selected="true" />
+ <select idref="V-12018" selected="true" />
+ <select idref="V-12019" selected="true" />
+ <select idref="V-12020" selected="true" />
+ <select idref="V-12021" selected="true" />
+ <select idref="V-12022" selected="true" />
+ <select idref="V-12023" selected="true" />
+ <select idref="V-12024" selected="true" />
+ <select idref="V-12025" selected="true" />
+ <select idref="V-12026" selected="true" />
+ <select idref="V-12028" selected="true" />
+ <select idref="V-12030" selected="true" />
+ <select idref="V-12038" selected="true" />
+ <select idref="V-12039" selected="true" />
+ <select idref="V-12040" selected="true" />
+ <select idref="V-12049" selected="true" />
+ <select idref="V-12765" selected="true" />
+ <select idref="V-22290" selected="true" />
+ <select idref="V-22291" selected="true" />
+ <select idref="V-22292" selected="true" />
+ <select idref="V-22294" selected="true" />
+ <select idref="V-22295" selected="true" />
+ <select idref="V-22296" selected="true" />
+ <select idref="V-22297" selected="true" />
+ <select idref="V-22298" selected="true" />
+ <select idref="V-22299" selected="true" />
+ <select idref="V-22301" selected="true" />
+ <select idref="V-22302" selected="true" />
+ <select idref="V-22303" selected="true" />
+ <select idref="V-22304" selected="true" />
+ <select idref="V-22305" selected="true" />
+ <select idref="V-22306" selected="true" />
+ <select idref="V-22307" selected="true" />
+ <select idref="V-22308" selected="true" />
+ <select idref="V-22309" selected="true" />
+ <select idref="V-22310" selected="true" />
+ <select idref="V-22311" selected="true" />
+ <select idref="V-22312" selected="true" />
+ <select idref="V-22313" selected="true" />
+ <select idref="V-22314" selected="true" />
+ <select idref="V-22315" selected="true" />
+ <select idref="V-22316" selected="true" />
+ <select idref="V-22317" selected="true" />
+ <select idref="V-22318" selected="true" />
+ <select idref="V-22319" selected="true" />
+ <select idref="V-22320" selected="true" />
+ <select idref="V-22321" selected="true" />
+ <select idref="V-22322" selected="true" />
+ <select idref="V-22323" selected="true" />
+ <select idref="V-22324" selected="true" />
+ <select idref="V-22325" selected="true" />
+ <select idref="V-22326" selected="true" />
+ <select idref="V-22327" selected="true" />
+ <select idref="V-22328" selected="true" />
+ <select idref="V-22329" selected="true" />
+ <select idref="V-22330" selected="true" />
+ <select idref="V-22332" selected="true" />
+ <select idref="V-22333" selected="true" />
+ <select idref="V-22334" selected="true" />
+ <select idref="V-22335" selected="true" />
+ <select idref="V-22336" selected="true" />
+ <select idref="V-22337" selected="true" />
+ <select idref="V-22338" selected="true" />
+ <select idref="V-22339" selected="true" />
+ <select idref="V-22340" selected="true" />
+ <select idref="V-22341" selected="true" />
+ <select idref="V-22342" selected="true" />
+ <select idref="V-22343" selected="true" />
+ <select idref="V-22344" selected="true" />
+ <select idref="V-22347" selected="true" />
+ <select idref="V-22348" selected="true" />
+ <select idref="V-22349" selected="true" />
+ <select idref="V-22350" selected="true" />
+ <select idref="V-22351" selected="true" />
+ <select idref="V-22352" selected="true" />
+ <select idref="V-22353" selected="true" />
+ <select idref="V-22354" selected="true" />
+ <select idref="V-22355" selected="true" />
+ <select idref="V-22356" selected="true" />
+ <select idref="V-22357" selected="true" />
+ <select idref="V-22358" selected="true" />
+ <select idref="V-22359" selected="true" />
+ <select idref="V-22360" selected="true" />
+ <select idref="V-22361" selected="true" />
+ <select idref="V-22362" selected="true" />
+ <select idref="V-22363" selected="true" />
+ <select idref="V-22364" selected="true" />
+ <select idref="V-22365" selected="true" />
+ <select idref="V-22366" selected="true" />
+ <select idref="V-22367" selected="true" />
+ <select idref="V-22368" selected="true" />
+ <select idref="V-22369" selected="true" />
+ <select idref="V-22370" selected="true" />
+ <select idref="V-22371" selected="true" />
+ <select idref="V-22372" selected="true" />
+ <select idref="V-22373" selected="true" />
+ <select idref="V-22374" selected="true" />
+ <select idref="V-22375" selected="true" />
+ <select idref="V-22376" selected="true" />
+ <select idref="V-22377" selected="true" />
+ <select idref="V-22378" selected="true" />
+ <select idref="V-22382" selected="true" />
+ <select idref="V-22383" selected="true" />
+ <select idref="V-22384" selected="true" />
+ <select idref="V-22385" selected="true" />
+ <select idref="V-22386" selected="true" />
+ <select idref="V-22387" selected="true" />
+ <select idref="V-22388" selected="true" />
+ <select idref="V-22389" selected="true" />
+ <select idref="V-22390" selected="true" />
+ <select idref="V-22391" selected="true" />
+ <select idref="V-22392" selected="true" />
+ <select idref="V-22393" selected="true" />
+ <select idref="V-22394" selected="true" />
+ <select idref="V-22395" selected="true" />
+ <select idref="V-22396" selected="true" />
+ <select idref="V-22397" selected="true" />
+ <select idref="V-22398" selected="true" />
+ <select idref="V-22404" selected="true" />
+ <select idref="V-22405" selected="true" />
+ <select idref="V-22406" selected="true" />
+ <select idref="V-22407" selected="true" />
+ <select idref="V-22408" selected="true" />
+ <select idref="V-22409" selected="true" />
+ <select idref="V-22410" selected="true" />
+ <select idref="V-22411" selected="true" />
+ <select idref="V-22414" selected="true" />
+ <select idref="V-22415" selected="true" />
+ <select idref="V-22416" selected="true" />
+ <select idref="V-22417" selected="true" />
+ <select idref="V-22418" selected="true" />
+ <select idref="V-22419" selected="true" />
+ <select idref="V-22421" selected="true" />
+ <select idref="V-22422" selected="true" />
+ <select idref="V-22423" selected="true" />
+ <select idref="V-22424" selected="true" />
+ <select idref="V-22425" selected="true" />
+ <select idref="V-22426" selected="true" />
+ <select idref="V-22427" selected="true" />
+ <select idref="V-22428" selected="true" />
+ <select idref="V-22429" selected="true" />
+ <select idref="V-22430" selected="true" />
+ <select idref="V-22431" selected="true" />
+ <select idref="V-22432" selected="true" />
+ <select idref="V-22433" selected="true" />
+ <select idref="V-22434" selected="true" />
+ <select idref="V-22435" selected="true" />
+ <select idref="V-22436" selected="true" />
+ <select idref="V-22437" selected="true" />
+ <select idref="V-22438" selected="true" />
+ <select idref="V-22439" selected="true" />
+ <select idref="V-22440" selected="true" />
+ <select idref="V-22441" selected="true" />
+ <select idref="V-22442" selected="true" />
+ <select idref="V-22444" selected="true" />
+ <select idref="V-22445" selected="true" />
+ <select idref="V-22446" selected="true" />
+ <select idref="V-22447" selected="true" />
+ <select idref="V-22448" selected="true" />
+ <select idref="V-22449" selected="true" />
+ <select idref="V-22450" selected="true" />
+ <select idref="V-22451" selected="true" />
+ <select idref="V-22452" selected="true" />
+ <select idref="V-22453" selected="true" />
+ <select idref="V-22454" selected="true" />
+ <select idref="V-22455" selected="true" />
+ <select idref="V-22456" selected="true" />
+ <select idref="V-22457" selected="true" />
+ <select idref="V-22458" selected="true" />
+ <select idref="V-22459" selected="true" />
+ <select idref="V-22460" selected="true" />
+ <select idref="V-22461" selected="true" />
+ <select idref="V-22462" selected="true" />
+ <select idref="V-22463" selected="true" />
+ <select idref="V-22470" selected="true" />
+ <select idref="V-22471" selected="true" />
+ <select idref="V-22472" selected="true" />
+ <select idref="V-22473" selected="true" />
+ <select idref="V-22474" selected="true" />
+ <select idref="V-22475" selected="true" />
+ <select idref="V-22485" selected="true" />
+ <select idref="V-22486" selected="true" />
+ <select idref="V-22487" selected="true" />
+ <select idref="V-22488" selected="true" />
+ <select idref="V-22489" selected="true" />
+ <select idref="V-22490" selected="true" />
+ <select idref="V-22491" selected="true" />
+ <select idref="V-22492" selected="true" />
+ <select idref="V-22493" selected="true" />
+ <select idref="V-22496" selected="true" />
+ <select idref="V-22497" selected="true" />
+ <select idref="V-22498" selected="true" />
+ <select idref="V-22499" selected="true" />
+ <select idref="V-22500" selected="true" />
+ <select idref="V-22501" selected="true" />
+ <select idref="V-22502" selected="true" />
+ <select idref="V-22503" selected="true" />
+ <select idref="V-22504" selected="true" />
+ <select idref="V-22505" selected="true" />
+ <select idref="V-22506" selected="true" />
+ <select idref="V-22507" selected="true" />
+ <select idref="V-22508" selected="true" />
+ <select idref="V-22509" selected="true" />
+ <select idref="V-22511" selected="true" />
+ <select idref="V-22514" selected="true" />
+ <select idref="V-22524" selected="true" />
+ <select idref="V-22530" selected="true" />
+ <select idref="V-22533" selected="true" />
+ <select idref="V-22539" selected="true" />
+ <select idref="V-22541" selected="true" />
+ <select idref="V-22542" selected="true" />
+ <select idref="V-22545" selected="true" />
+ <select idref="V-22546" selected="true" />
+ <select idref="V-22547" selected="true" />
+ <select idref="V-22548" selected="true" />
+ <select idref="V-22549" selected="true" />
+ <select idref="V-22550" selected="true" />
+ <select idref="V-22553" selected="true" />
+ <select idref="V-22555" selected="true" />
+ <select idref="V-22556" selected="true" />
+ <select idref="V-22557" selected="true" />
+ <select idref="V-22558" selected="true" />
+ <select idref="V-22559" selected="true" />
+ <select idref="V-22560" selected="true" />
+ <select idref="V-22561" selected="true" />
+ <select idref="V-22562" selected="true" />
+ <select idref="V-22563" selected="true" />
+ <select idref="V-22564" selected="true" />
+ <select idref="V-22565" selected="true" />
+ <select idref="V-22566" selected="true" />
+ <select idref="V-22567" selected="true" />
+ <select idref="V-22568" selected="true" />
+ <select idref="V-22569" selected="true" />
+ <select idref="V-22570" selected="true" />
+ <select idref="V-22571" selected="true" />
+ <select idref="V-22572" selected="true" />
+ <select idref="V-22573" selected="true" />
+ <select idref="V-22574" selected="true" />
+ <select idref="V-22575" selected="true" />
+ <select idref="V-22576" selected="true" />
+ <select idref="V-22577" selected="true" />
+ <select idref="V-22578" selected="true" />
+ <select idref="V-22579" selected="true" />
+ <select idref="V-22580" selected="true" />
+ <select idref="V-22582" selected="true" />
+ <select idref="V-22583" selected="true" />
+ <select idref="V-22584" selected="true" />
+ <select idref="V-22585" selected="true" />
+ <select idref="V-22586" selected="true" />
+ <select idref="V-22587" selected="true" />
+ <select idref="V-22588" selected="true" />
+ <select idref="V-22589" selected="true" />
+ <select idref="V-22595" selected="true" />
+ <select idref="V-22596" selected="true" />
+ <select idref="V-22598" selected="true" />
+ <select idref="V-22665" selected="true" />
+ <select idref="V-22702" selected="true" />
+ <select idref="V-23732" selected="true" />
+ <select idref="V-23736" selected="true" />
+ <select idref="V-23738" selected="true" />
+ <select idref="V-23739" selected="true" />
+ <select idref="V-23741" selected="true" />
+ <select idref="V-23952" selected="true" />
+ <select idref="V-23953" selected="true" />
+ <select idref="V-23972" selected="true" />
+ <select idref="V-24331" selected="true" />
+ <select idref="V-24347" selected="true" />
+ <select idref="V-24357" selected="true" />
+ <select idref="V-24384" selected="true" />
+ <select idref="V-24386" selected="true" />
+ <select idref="V-24624" selected="true" />
+ <select idref="V-27250" selected="true" />
+ <select idref="V-27251" selected="true" />
+ <select idref="V-27275" selected="true" />
+ <select idref="V-27276" selected="true" />
+ <select idref="V-27279" selected="true" />
+ <select idref="V-27283" selected="true" />
+ <select idref="V-27284" selected="true" />
+ <select idref="V-27285" selected="true" />
+ <select idref="V-29236" selected="true" />
+ <select idref="V-29237" selected="true" />
+ <select idref="V-29238" selected="true" />
+ <select idref="V-29239" selected="true" />
+ <select idref="V-29240" selected="true" />
+ <select idref="V-29241" selected="true" />
+ <select idref="V-29242" selected="true" />
+ <select idref="V-29243" selected="true" />
+ <select idref="V-29244" selected="true" />
+ <select idref="V-29245" selected="true" />
+ <select idref="V-29246" selected="true" />
+ <select idref="V-29247" selected="true" />
+ <select idref="V-29248" selected="true" />
+ <select idref="V-29249" selected="true" />
+ <select idref="V-29250" selected="true" />
+ <select idref="V-29251" selected="true" />
+ <select idref="V-29252" selected="true" />
+ <select idref="V-29253" selected="true" />
+ <select idref="V-29255" selected="true" />
+ <select idref="V-29257" selected="true" />
+ <select idref="V-29259" selected="true" />
+ <select idref="V-29261" selected="true" />
+ <select idref="V-29272" selected="true" />
+ <select idref="V-29274" selected="true" />
+ <select idref="V-29275" selected="true" />
+ <select idref="V-29279" selected="true" />
+ <select idref="V-29281" selected="true" />
+ <select idref="V-29284" selected="true" />
+ <select idref="V-29286" selected="true" />
+ <select idref="V-29288" selected="true" />
+ <select idref="V-29289" selected="true" />
+ <select idref="V-29376" selected="true" />
+ </Profile>
+ <Profile id="MAC-3_Classified">
+ <title>III - Administrative Classified</title>
+
<description><ProfileDescription></ProfileDescription></description>
+ <select idref="V-756" selected="true" />
+ <select idref="V-760" selected="true" />
+ <select idref="V-761" selected="true" />
+ <select idref="V-762" selected="true" />
+ <select idref="V-763" selected="true" />
+ <select idref="V-765" selected="true" />
+ <select idref="V-766" selected="true" />
+ <select idref="V-768" selected="true" />
+ <select idref="V-769" selected="true" />
+ <select idref="V-770" selected="true" />
+ <select idref="V-773" selected="true" />
+ <select idref="V-774" selected="true" />
+ <select idref="V-775" selected="true" />
+ <select idref="V-776" selected="true" />
+ <select idref="V-777" selected="true" />
+ <select idref="V-778" selected="true" />
+ <select idref="V-780" selected="true" />
+ <select idref="V-781" selected="true" />
+ <select idref="V-782" selected="true" />
+ <select idref="V-783" selected="true" />
+ <select idref="V-784" selected="true" />
+ <select idref="V-785" selected="true" />
+ <select idref="V-786" selected="true" />
+ <select idref="V-787" selected="true" />
+ <select idref="V-788" selected="true" />
+ <select idref="V-789" selected="true" />
+ <select idref="V-790" selected="true" />
+ <select idref="V-791" selected="true" />
+ <select idref="V-792" selected="true" />
+ <select idref="V-793" selected="true" />
+ <select idref="V-794" selected="true" />
+ <select idref="V-795" selected="true" />
+ <select idref="V-796" selected="true" />
+ <select idref="V-797" selected="true" />
+ <select idref="V-798" selected="true" />
+ <select idref="V-800" selected="true" />
+ <select idref="V-801" selected="true" />
+ <select idref="V-802" selected="true" />
+ <select idref="V-803" selected="true" />
+ <select idref="V-804" selected="true" />
+ <select idref="V-805" selected="true" />
+ <select idref="V-806" selected="true" />
+ <select idref="V-807" selected="true" />
+ <select idref="V-808" selected="true" />
+ <select idref="V-810" selected="true" />
+ <select idref="V-811" selected="true" />
+ <select idref="V-812" selected="true" />
+ <select idref="V-813" selected="true" />
+ <select idref="V-814" selected="true" />
+ <select idref="V-815" selected="true" />
+ <select idref="V-818" selected="true" />
+ <select idref="V-819" selected="true" />
+ <select idref="V-821" selected="true" />
+ <select idref="V-822" selected="true" />
+ <select idref="V-823" selected="true" />
+ <select idref="V-824" selected="true" />
+ <select idref="V-825" selected="true" />
+ <select idref="V-827" selected="true" />
+ <select idref="V-828" selected="true" />
+ <select idref="V-829" selected="true" />
+ <select idref="V-831" selected="true" />
+ <select idref="V-832" selected="true" />
+ <select idref="V-833" selected="true" />
+ <select idref="V-834" selected="true" />
+ <select idref="V-835" selected="true" />
+ <select idref="V-836" selected="true" />
+ <select idref="V-837" selected="true" />
+ <select idref="V-838" selected="true" />
+ <select idref="V-840" selected="true" />
+ <select idref="V-841" selected="true" />
+ <select idref="V-842" selected="true" />
+ <select idref="V-843" selected="true" />
+ <select idref="V-845" selected="true" />
+ <select idref="V-846" selected="true" />
+ <select idref="V-847" selected="true" />
+ <select idref="V-848" selected="true" />
+ <select idref="V-849" selected="true" />
+ <select idref="V-850" selected="true" />
+ <select idref="V-867" selected="true" />
+ <select idref="V-899" selected="true" />
+ <select idref="V-900" selected="true" />
+ <select idref="V-901" selected="true" />
+ <select idref="V-902" selected="true" />
+ <select idref="V-903" selected="true" />
+ <select idref="V-904" selected="true" />
+ <select idref="V-905" selected="true" />
+ <select idref="V-906" selected="true" />
+ <select idref="V-907" selected="true" />
+ <select idref="V-910" selected="true" />
+ <select idref="V-913" selected="true" />
+ <select idref="V-914" selected="true" />
+ <select idref="V-915" selected="true" />
+ <select idref="V-916" selected="true" />
+ <select idref="V-917" selected="true" />
+ <select idref="V-918" selected="true" />
+ <select idref="V-921" selected="true" />
+ <select idref="V-922" selected="true" />
+ <select idref="V-923" selected="true" />
+ <select idref="V-924" selected="true" />
+ <select idref="V-925" selected="true" />
+ <select idref="V-928" selected="true" />
+ <select idref="V-929" selected="true" />
+ <select idref="V-931" selected="true" />
+ <select idref="V-932" selected="true" />
+ <select idref="V-933" selected="true" />
+ <select idref="V-935" selected="true" />
+ <select idref="V-936" selected="true" />
+ <select idref="V-940" selected="true" />
+ <select idref="V-941" selected="true" />
+ <select idref="V-974" selected="true" />
+ <select idref="V-975" selected="true" />
+ <select idref="V-976" selected="true" />
+ <select idref="V-977" selected="true" />
+ <select idref="V-978" selected="true" />
+ <select idref="V-979" selected="true" />
+ <select idref="V-980" selected="true" />
+ <select idref="V-981" selected="true" />
+ <select idref="V-982" selected="true" />
+ <select idref="V-983" selected="true" />
+ <select idref="V-984" selected="true" />
+ <select idref="V-985" selected="true" />
+ <select idref="V-986" selected="true" />
+ <select idref="V-987" selected="true" />
+ <select idref="V-988" selected="true" />
+ <select idref="V-989" selected="true" />
+ <select idref="V-993" selected="true" />
+ <select idref="V-994" selected="true" />
+ <select idref="V-995" selected="true" />
+ <select idref="V-1010" selected="true" />
+ <select idref="V-1011" selected="true" />
+ <select idref="V-1013" selected="true" />
+ <select idref="V-1021" selected="true" />
+ <select idref="V-1022" selected="true" />
+ <select idref="V-1023" selected="true" />
+ <select idref="V-1025" selected="true" />
+ <select idref="V-1026" selected="true" />
+ <select idref="V-1027" selected="true" />
+ <select idref="V-1028" selected="true" />
+ <select idref="V-1029" selected="true" />
+ <select idref="V-1030" selected="true" />
+ <select idref="V-1032" selected="true" />
+ <select idref="V-1046" selected="true" />
+ <select idref="V-1047" selected="true" />
+ <select idref="V-1048" selected="true" />
+ <select idref="V-1049" selected="true" />
+ <select idref="V-1054" selected="true" />
+ <select idref="V-1055" selected="true" />
+ <select idref="V-1056" selected="true" />
+ <select idref="V-1058" selected="true" />
+ <select idref="V-1059" selected="true" />
+ <select idref="V-1061" selected="true" />
+ <select idref="V-1062" selected="true" />
+ <select idref="V-4083" selected="true" />
+ <select idref="V-4084" selected="true" />
+ <select idref="V-4087" selected="true" />
+ <select idref="V-4089" selected="true" />
+ <select idref="V-4090" selected="true" />
+ <select idref="V-4091" selected="true" />
+ <select idref="V-4246" selected="true" />
+ <select idref="V-4247" selected="true" />
+ <select idref="V-4248" selected="true" />
+ <select idref="V-4249" selected="true" />
+ <select idref="V-4250" selected="true" />
+ <select idref="V-4255" selected="true" />
+ <select idref="V-4268" selected="true" />
+ <select idref="V-4269" selected="true" />
+ <select idref="V-4273" selected="true" />
+ <select idref="V-4274" selected="true" />
+ <select idref="V-4275" selected="true" />
+ <select idref="V-4276" selected="true" />
+ <select idref="V-4277" selected="true" />
+ <select idref="V-4278" selected="true" />
+ <select idref="V-4295" selected="true" />
+ <select idref="V-4298" selected="true" />
+ <select idref="V-4301" selected="true" />
+ <select idref="V-4304" selected="true" />
+ <select idref="V-4321" selected="true" />
+ <select idref="V-4334" selected="true" />
+ <select idref="V-4335" selected="true" />
+ <select idref="V-4336" selected="true" />
+ <select idref="V-4339" selected="true" />
+ <select idref="V-4342" selected="true" />
+ <select idref="V-4346" selected="true" />
+ <select idref="V-4357" selected="true" />
+ <select idref="V-4358" selected="true" />
+ <select idref="V-4360" selected="true" />
+ <select idref="V-4361" selected="true" />
+ <select idref="V-4364" selected="true" />
+ <select idref="V-4365" selected="true" />
+ <select idref="V-4366" selected="true" />
+ <select idref="V-4367" selected="true" />
+ <select idref="V-4368" selected="true" />
+ <select idref="V-4369" selected="true" />
+ <select idref="V-4370" selected="true" />
+ <select idref="V-4371" selected="true" />
+ <select idref="V-4382" selected="true" />
+ <select idref="V-4384" selected="true" />
+ <select idref="V-4385" selected="true" />
+ <select idref="V-4387" selected="true" />
+ <select idref="V-4392" selected="true" />
+ <select idref="V-4393" selected="true" />
+ <select idref="V-4394" selected="true" />
+ <select idref="V-4395" selected="true" />
+ <select idref="V-4397" selected="true" />
+ <select idref="V-4398" selected="true" />
+ <select idref="V-4399" selected="true" />
+ <select idref="V-4427" selected="true" />
+ <select idref="V-4428" selected="true" />
+ <select idref="V-4430" selected="true" />
+ <select idref="V-4687" selected="true" />
+ <select idref="V-4688" selected="true" />
+ <select idref="V-4689" selected="true" />
+ <select idref="V-4690" selected="true" />
+ <select idref="V-4691" selected="true" />
+ <select idref="V-4692" selected="true" />
+ <select idref="V-4693" selected="true" />
+ <select idref="V-4694" selected="true" />
+ <select idref="V-4695" selected="true" />
+ <select idref="V-4696" selected="true" />
+ <select idref="V-4697" selected="true" />
+ <select idref="V-4701" selected="true" />
+ <select idref="V-4702" selected="true" />
+ <select idref="V-11940" selected="true" />
+ <select idref="V-11945" selected="true" />
+ <select idref="V-11946" selected="true" />
+ <select idref="V-11947" selected="true" />
+ <select idref="V-11948" selected="true" />
+ <select idref="V-11972" selected="true" />
+ <select idref="V-11973" selected="true" />
+ <select idref="V-11975" selected="true" />
+ <select idref="V-11976" selected="true" />
+ <select idref="V-11977" selected="true" />
+ <select idref="V-11979" selected="true" />
+ <select idref="V-11980" selected="true" />
+ <select idref="V-11981" selected="true" />
+ <select idref="V-11982" selected="true" />
+ <select idref="V-11983" selected="true" />
+ <select idref="V-11984" selected="true" />
+ <select idref="V-11985" selected="true" />
+ <select idref="V-11986" selected="true" />
+ <select idref="V-11987" selected="true" />
+ <select idref="V-11988" selected="true" />
+ <select idref="V-11989" selected="true" />
+ <select idref="V-11990" selected="true" />
+ <select idref="V-11994" selected="true" />
+ <select idref="V-11995" selected="true" />
+ <select idref="V-11996" selected="true" />
+ <select idref="V-11997" selected="true" />
+ <select idref="V-11999" selected="true" />
+ <select idref="V-12002" selected="true" />
+ <select idref="V-12003" selected="true" />
+ <select idref="V-12004" selected="true" />
+ <select idref="V-12005" selected="true" />
+ <select idref="V-12006" selected="true" />
+ <select idref="V-12010" selected="true" />
+ <select idref="V-12011" selected="true" />
+ <select idref="V-12014" selected="true" />
+ <select idref="V-12016" selected="true" />
+ <select idref="V-12017" selected="true" />
+ <select idref="V-12018" selected="true" />
+ <select idref="V-12019" selected="true" />
+ <select idref="V-12020" selected="true" />
+ <select idref="V-12021" selected="true" />
+ <select idref="V-12022" selected="true" />
+ <select idref="V-12023" selected="true" />
+ <select idref="V-12024" selected="true" />
+ <select idref="V-12025" selected="true" />
+ <select idref="V-12026" selected="true" />
+ <select idref="V-12028" selected="true" />
+ <select idref="V-12030" selected="true" />
+ <select idref="V-12038" selected="true" />
+ <select idref="V-12039" selected="true" />
+ <select idref="V-12040" selected="true" />
+ <select idref="V-12049" selected="true" />
+ <select idref="V-12765" selected="true" />
+ <select idref="V-22290" selected="true" />
+ <select idref="V-22291" selected="true" />
+ <select idref="V-22292" selected="true" />
+ <select idref="V-22294" selected="true" />
+ <select idref="V-22295" selected="true" />
+ <select idref="V-22296" selected="true" />
+ <select idref="V-22297" selected="true" />
+ <select idref="V-22298" selected="true" />
+ <select idref="V-22299" selected="true" />
+ <select idref="V-22301" selected="true" />
+ <select idref="V-22302" selected="true" />
+ <select idref="V-22303" selected="true" />
+ <select idref="V-22304" selected="true" />
+ <select idref="V-22305" selected="true" />
+ <select idref="V-22306" selected="true" />
+ <select idref="V-22307" selected="true" />
+ <select idref="V-22308" selected="true" />
+ <select idref="V-22309" selected="true" />
+ <select idref="V-22310" selected="true" />
+ <select idref="V-22311" selected="true" />
+ <select idref="V-22312" selected="true" />
+ <select idref="V-22313" selected="true" />
+ <select idref="V-22314" selected="true" />
+ <select idref="V-22315" selected="true" />
+ <select idref="V-22316" selected="true" />
+ <select idref="V-22317" selected="true" />
+ <select idref="V-22318" selected="true" />
+ <select idref="V-22319" selected="true" />
+ <select idref="V-22320" selected="true" />
+ <select idref="V-22321" selected="true" />
+ <select idref="V-22322" selected="true" />
+ <select idref="V-22323" selected="true" />
+ <select idref="V-22324" selected="true" />
+ <select idref="V-22325" selected="true" />
+ <select idref="V-22326" selected="true" />
+ <select idref="V-22327" selected="true" />
+ <select idref="V-22328" selected="true" />
+ <select idref="V-22329" selected="true" />
+ <select idref="V-22330" selected="true" />
+ <select idref="V-22332" selected="true" />
+ <select idref="V-22333" selected="true" />
+ <select idref="V-22334" selected="true" />
+ <select idref="V-22335" selected="true" />
+ <select idref="V-22336" selected="true" />
+ <select idref="V-22337" selected="true" />
+ <select idref="V-22338" selected="true" />
+ <select idref="V-22339" selected="true" />
+ <select idref="V-22340" selected="true" />
+ <select idref="V-22341" selected="true" />
+ <select idref="V-22342" selected="true" />
+ <select idref="V-22343" selected="true" />
+ <select idref="V-22344" selected="true" />
+ <select idref="V-22347" selected="true" />
+ <select idref="V-22348" selected="true" />
+ <select idref="V-22349" selected="true" />
+ <select idref="V-22350" selected="true" />
+ <select idref="V-22351" selected="true" />
+ <select idref="V-22352" selected="true" />
+ <select idref="V-22353" selected="true" />
+ <select idref="V-22354" selected="true" />
+ <select idref="V-22355" selected="true" />
+ <select idref="V-22356" selected="true" />
+ <select idref="V-22357" selected="true" />
+ <select idref="V-22358" selected="true" />
+ <select idref="V-22359" selected="true" />
+ <select idref="V-22360" selected="true" />
+ <select idref="V-22361" selected="true" />
+ <select idref="V-22362" selected="true" />
+ <select idref="V-22363" selected="true" />
+ <select idref="V-22364" selected="true" />
+ <select idref="V-22365" selected="true" />
+ <select idref="V-22366" selected="true" />
+ <select idref="V-22367" selected="true" />
+ <select idref="V-22368" selected="true" />
+ <select idref="V-22369" selected="true" />
+ <select idref="V-22370" selected="true" />
+ <select idref="V-22371" selected="true" />
+ <select idref="V-22372" selected="true" />
+ <select idref="V-22373" selected="true" />
+ <select idref="V-22374" selected="true" />
+ <select idref="V-22375" selected="true" />
+ <select idref="V-22376" selected="true" />
+ <select idref="V-22377" selected="true" />
+ <select idref="V-22378" selected="true" />
+ <select idref="V-22382" selected="true" />
+ <select idref="V-22383" selected="true" />
+ <select idref="V-22384" selected="true" />
+ <select idref="V-22385" selected="true" />
+ <select idref="V-22386" selected="true" />
+ <select idref="V-22387" selected="true" />
+ <select idref="V-22388" selected="true" />
+ <select idref="V-22389" selected="true" />
+ <select idref="V-22390" selected="true" />
+ <select idref="V-22391" selected="true" />
+ <select idref="V-22392" selected="true" />
+ <select idref="V-22393" selected="true" />
+ <select idref="V-22394" selected="true" />
+ <select idref="V-22395" selected="true" />
+ <select idref="V-22396" selected="true" />
+ <select idref="V-22397" selected="true" />
+ <select idref="V-22398" selected="true" />
+ <select idref="V-22404" selected="true" />
+ <select idref="V-22405" selected="true" />
+ <select idref="V-22406" selected="true" />
+ <select idref="V-22407" selected="true" />
+ <select idref="V-22408" selected="true" />
+ <select idref="V-22409" selected="true" />
+ <select idref="V-22410" selected="true" />
+ <select idref="V-22411" selected="true" />
+ <select idref="V-22414" selected="true" />
+ <select idref="V-22415" selected="true" />
+ <select idref="V-22416" selected="true" />
+ <select idref="V-22417" selected="true" />
+ <select idref="V-22418" selected="true" />
+ <select idref="V-22419" selected="true" />
+ <select idref="V-22421" selected="true" />
+ <select idref="V-22422" selected="true" />
+ <select idref="V-22423" selected="true" />
+ <select idref="V-22424" selected="true" />
+ <select idref="V-22425" selected="true" />
+ <select idref="V-22426" selected="true" />
+ <select idref="V-22427" selected="true" />
+ <select idref="V-22428" selected="true" />
+ <select idref="V-22429" selected="true" />
+ <select idref="V-22430" selected="true" />
+ <select idref="V-22431" selected="true" />
+ <select idref="V-22432" selected="true" />
+ <select idref="V-22433" selected="true" />
+ <select idref="V-22434" selected="true" />
+ <select idref="V-22435" selected="true" />
+ <select idref="V-22436" selected="true" />
+ <select idref="V-22437" selected="true" />
+ <select idref="V-22438" selected="true" />
+ <select idref="V-22439" selected="true" />
+ <select idref="V-22440" selected="true" />
+ <select idref="V-22441" selected="true" />
+ <select idref="V-22442" selected="true" />
+ <select idref="V-22444" selected="true" />
+ <select idref="V-22445" selected="true" />
+ <select idref="V-22446" selected="true" />
+ <select idref="V-22447" selected="true" />
+ <select idref="V-22448" selected="true" />
+ <select idref="V-22449" selected="true" />
+ <select idref="V-22450" selected="true" />
+ <select idref="V-22451" selected="true" />
+ <select idref="V-22452" selected="true" />
+ <select idref="V-22453" selected="true" />
+ <select idref="V-22454" selected="true" />
+ <select idref="V-22455" selected="true" />
+ <select idref="V-22456" selected="true" />
+ <select idref="V-22457" selected="true" />
+ <select idref="V-22458" selected="true" />
+ <select idref="V-22459" selected="true" />
+ <select idref="V-22460" selected="true" />
+ <select idref="V-22461" selected="true" />
+ <select idref="V-22462" selected="true" />
+ <select idref="V-22463" selected="true" />
+ <select idref="V-22470" selected="true" />
+ <select idref="V-22471" selected="true" />
+ <select idref="V-22472" selected="true" />
+ <select idref="V-22473" selected="true" />
+ <select idref="V-22474" selected="true" />
+ <select idref="V-22475" selected="true" />
+ <select idref="V-22485" selected="true" />
+ <select idref="V-22486" selected="true" />
+ <select idref="V-22487" selected="true" />
+ <select idref="V-22488" selected="true" />
+ <select idref="V-22489" selected="true" />
+ <select idref="V-22490" selected="true" />
+ <select idref="V-22491" selected="true" />
+ <select idref="V-22492" selected="true" />
+ <select idref="V-22493" selected="true" />
+ <select idref="V-22496" selected="true" />
+ <select idref="V-22497" selected="true" />
+ <select idref="V-22498" selected="true" />
+ <select idref="V-22499" selected="true" />
+ <select idref="V-22500" selected="true" />
+ <select idref="V-22501" selected="true" />
+ <select idref="V-22502" selected="true" />
+ <select idref="V-22503" selected="true" />
+ <select idref="V-22504" selected="true" />
+ <select idref="V-22505" selected="true" />
+ <select idref="V-22506" selected="true" />
+ <select idref="V-22507" selected="true" />
+ <select idref="V-22508" selected="true" />
+ <select idref="V-22509" selected="true" />
+ <select idref="V-22511" selected="true" />
+ <select idref="V-22514" selected="true" />
+ <select idref="V-22524" selected="true" />
+ <select idref="V-22530" selected="true" />
+ <select idref="V-22533" selected="true" />
+ <select idref="V-22539" selected="true" />
+ <select idref="V-22541" selected="true" />
+ <select idref="V-22542" selected="true" />
+ <select idref="V-22545" selected="true" />
+ <select idref="V-22546" selected="true" />
+ <select idref="V-22547" selected="true" />
+ <select idref="V-22548" selected="true" />
+ <select idref="V-22549" selected="true" />
+ <select idref="V-22550" selected="true" />
+ <select idref="V-22553" selected="true" />
+ <select idref="V-22555" selected="true" />
+ <select idref="V-22556" selected="true" />
+ <select idref="V-22557" selected="true" />
+ <select idref="V-22558" selected="true" />
+ <select idref="V-22559" selected="true" />
+ <select idref="V-22560" selected="true" />
+ <select idref="V-22561" selected="true" />
+ <select idref="V-22562" selected="true" />
+ <select idref="V-22563" selected="true" />
+ <select idref="V-22564" selected="true" />
+ <select idref="V-22565" selected="true" />
+ <select idref="V-22566" selected="true" />
+ <select idref="V-22567" selected="true" />
+ <select idref="V-22568" selected="true" />
+ <select idref="V-22569" selected="true" />
+ <select idref="V-22570" selected="true" />
+ <select idref="V-22571" selected="true" />
+ <select idref="V-22572" selected="true" />
+ <select idref="V-22573" selected="true" />
+ <select idref="V-22574" selected="true" />
+ <select idref="V-22575" selected="true" />
+ <select idref="V-22576" selected="true" />
+ <select idref="V-22577" selected="true" />
+ <select idref="V-22578" selected="true" />
+ <select idref="V-22579" selected="true" />
+ <select idref="V-22580" selected="true" />
+ <select idref="V-22582" selected="true" />
+ <select idref="V-22583" selected="true" />
+ <select idref="V-22584" selected="true" />
+ <select idref="V-22585" selected="true" />
+ <select idref="V-22586" selected="true" />
+ <select idref="V-22587" selected="true" />
+ <select idref="V-22588" selected="true" />
+ <select idref="V-22589" selected="true" />
+ <select idref="V-22595" selected="true" />
+ <select idref="V-22596" selected="true" />
+ <select idref="V-22598" selected="true" />
+ <select idref="V-22665" selected="true" />
+ <select idref="V-22702" selected="true" />
+ <select idref="V-23732" selected="true" />
+ <select idref="V-23736" selected="true" />
+ <select idref="V-23738" selected="true" />
+ <select idref="V-23739" selected="true" />
+ <select idref="V-23741" selected="true" />
+ <select idref="V-23952" selected="true" />
+ <select idref="V-23953" selected="true" />
+ <select idref="V-23972" selected="true" />
+ <select idref="V-24331" selected="true" />
+ <select idref="V-24347" selected="true" />
+ <select idref="V-24357" selected="true" />
+ <select idref="V-24384" selected="true" />
+ <select idref="V-24386" selected="true" />
+ <select idref="V-24624" selected="true" />
+ <select idref="V-27250" selected="true" />
+ <select idref="V-27251" selected="true" />
+ <select idref="V-27275" selected="true" />
+ <select idref="V-27276" selected="true" />
+ <select idref="V-27279" selected="true" />
+ <select idref="V-27283" selected="true" />
+ <select idref="V-27284" selected="true" />
+ <select idref="V-27285" selected="true" />
+ <select idref="V-29236" selected="true" />
+ <select idref="V-29237" selected="true" />
+ <select idref="V-29238" selected="true" />
+ <select idref="V-29239" selected="true" />
+ <select idref="V-29240" selected="true" />
+ <select idref="V-29241" selected="true" />
+ <select idref="V-29242" selected="true" />
+ <select idref="V-29243" selected="true" />
+ <select idref="V-29244" selected="true" />
+ <select idref="V-29245" selected="true" />
+ <select idref="V-29246" selected="true" />
+ <select idref="V-29247" selected="true" />
+ <select idref="V-29248" selected="true" />
+ <select idref="V-29249" selected="true" />
+ <select idref="V-29250" selected="true" />
+ <select idref="V-29251" selected="true" />
+ <select idref="V-29252" selected="true" />
+ <select idref="V-29253" selected="true" />
+ <select idref="V-29255" selected="true" />
+ <select idref="V-29257" selected="true" />
+ <select idref="V-29259" selected="true" />
+ <select idref="V-29261" selected="true" />
+ <select idref="V-29272" selected="true" />
+ <select idref="V-29274" selected="true" />
+ <select idref="V-29275" selected="true" />
+ <select idref="V-29279" selected="true" />
+ <select idref="V-29281" selected="true" />
+ <select idref="V-29284" selected="true" />
+ <select idref="V-29286" selected="true" />
+ <select idref="V-29288" selected="true" />
+ <select idref="V-29289" selected="true" />
+ <select idref="V-29376" selected="true" />
+ </Profile>
+ <Group id="V-756">
+ <title>GEN000020</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37350r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000020</version>
+ <title>The system must require authentication upon booting into single-user
and maintenance modes.</title>
+ <description><VulnDiscussion>If the system does not require
valid root authentication before it boots into single-user or maintenance mode, anyone who
invokes single-user or maintenance mode is granted privileged access to all files on the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000213</ident>
+ <fixtext fixref="F-31285r1_fix">Edit /etc/inittab and set sulogin
to run in single-user mode. Example line in /etc/inittab:
~:S:wait:/sbin/sulogin</fixtext>
+ <fix id="F-31285r1_fix" />
+ <check system="C-36041r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check if the system requires a password for entering
single-user mode. # grep ':S:' /etc/inittab If /sbin/sulogin is not listed, this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-761">
+ <title>GEN000300</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27063r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000300</version>
+ <title>All accounts on the system must have unique user or account
names.</title>
+ <description><VulnDiscussion>A unique user name is the first
part of the identification and authentication process. If user names are not unique, there
can be no accountability on the system for auditing purposes. Multiple accounts sharing
+ the same name could result in the denial of service to one or both of the accounts
or unauthorized access to files or
+
privileges.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000764</ident>
+ <fixtext fixref="F-31349r1_fix">Change user account names, or
delete accounts, so each account has a unique name.</fixtext>
+ <fix id="F-31349r1_fix" />
+ <check system="C-36103r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system for duplicate account names. Example: #
pwck -r If any duplicate account names are found, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-763">
+ <title>GEN000400</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37169r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000400</version>
+ <title>The Department of Defense (DoD) login banner must be displayed
immediately prior to, or as part of, console login prompts.</title>
+ <description><VulnDiscussion>Failure to display the logon
banner prior to a logon attempt will negate legal proceedings resulting from unauthorized
access to system
+
resources.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECWM-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000048</ident>
+ <fixtext fixref="F-31128r1_fix">Edit /etc/issue and add one of the
DoD login banners (based on the character limitations imposed by the system). DoD Login
Banners: You are accessing a U.S. Government (USG) Information System (IS) that is
provided
+ for USG-authorized use only. By using this IS (which includes any device attached
to this IS), you consent to the following conditions: -The USG routinely intercepts and
monitors communications on this IS for purposes including, but not limited to,
+ penetration testing, COMSEC monitoring, network operations and defense, personnel
misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At
any time, the USG may inspect and seize data stored on this IS.
+ -Communications using, or data stored on, this IS are not private, are subject to
routine monitoring, interception, and search, and may be disclosed or used for any
USG-authorized purpose. -This IS includes security measures (e.g., authentication
+ and access controls) to protect USG interests- -not for your personal benefit or
privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE
or CI investigative searching or monitoring of the content of privileged
+ communications, or work product, related to personal representation or services by
attorneys, psychotherapists, or clergy, and their assistants. Such communications and work
product are private and confidential. See User Agreement for details. OR
+ I've read & consent to terms in IS user agreem't.</fixtext>
+ <fix id="F-31128r1_fix" />
+ <check system="C-35874r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Access the system console and make a login attempt. Check
for either of the following login banners based on the character limitations imposed by
the system. An exact match is required. If one of these banners is not displayed,
+ this is a finding. You are accessing a U.S. Government (USG) Information System
(IS) that is provided for USG-authorized use only. By using this IS (which includes any
device attached to this IS), you consent to the following conditions: -The USG
+ routinely intercepts and monitors communications on this IS for purposes
including, but not limited to, penetration testing, COMSEC monitoring, network operations
and defense, personnel misconduct (PM), law enforcement (LE), and
+ counterintelligence (CI) investigations. -At any time, the USG may inspect and
seize data stored on this IS. -Communications using, or data stored on, this IS are not
private, are subject to routine monitoring, interception, and search, and may
+ be disclosed or used for any USG-authorized purpose. -This IS includes security
measures (e.g., authentication and access controls) to protect USG interests- -not for
your personal benefit or privacy. -Notwithstanding the above, using this IS
+ does not constitute consent to PM, LE or CI investigative searching or monitoring
of the content of privileged communications, or work product, related to personal
representation or services by attorneys, psychotherapists, or clergy, and their
+ assistants. Such communications and work product are private and confidential.
See User Agreement for details. OR I've read & consent to terms in IS user
agreem't.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-765">
+ <title>GEN000440</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37178r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000440</version>
+ <title>Successful and unsuccessful logins and logouts must be
logged.</title>
+ <description><VulnDiscussion>Monitoring and recording
successful and unsuccessful logins assists in tracking unauthorized access to the system.
Without this logging, the ability to track unauthorized activity to specific user accounts
may be
+
diminished.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-31137r1_fix">Make sure the collection files
exist. Procedure: If there are no successful logins being returned from the
"last" command, create /var/log/wtmp: # touch /var/log/wtmp If there are no
unsuccessful logins being
+ returned from the "lastb" command, create /var/log/btmp: # touch
/var/log/btmp</fixtext>
+ <fix id="F-31137r1_fix" />
+ <check system="C-35882r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if all logon attempts are being logged. Procedure:
Verify successful logins are being logged: # last -R | more If the command does not return
successful logins, this is a finding. Verify if unsuccessful logons are being
+ logged: # lastb -R | more If the command does not return unsuccessful logins,
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-769">
+ <title>GEN000520</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37232r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000520</version>
+ <title>The root user must not own the logon session for an application
requiring a continuous display.</title>
+ <description><VulnDiscussion>If an application is providing a
continuous display and is running with root privileges, unauthorized users could interrupt
the process and gain root access to the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>PESL-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31178r1_fix">Configure the system so the owner
of a session requires a continuous screen display, such as a network management display,
is not root. Ensure the display is also located in a secure, controlled access area.
Document
+ and justify this requirement and ensure the terminal and keyboard for the display
(or workstation) are secure from all but authorized personnel by maintaining them in a
secure area, in a locked cabinet where a swipe card, or other positive forms of
+ identification, must be used to gain entry.</fixtext>
+ <fix id="F-31178r1_fix" />
+ <check system="C-35914r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If there is an application running on the system
continuously in use (such as a network monitoring application), ask the SA what the name
of the application is. Verify documentation exists for the requirement and justification
of
+ the application. If no documentation exists, this is a finding. Execute "ps
-ef | more" to determine which user owns the process(es) associated with the
application. If the owner is root, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-770">
+ <title>GEN000560</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37259r1_rule" severity="high"
weight="10.0">
+ <version>GEN000560</version>
+ <title>The system must not have accounts configured with blank or null
passwords.</title>
+ <description><VulnDiscussion>If an account is configured for
password authentication but does not have an assigned password, it may be possible to log
into the account without authentication. If the root user is configured without a
password,
+ the entire system may be compromised. For user accounts not using password
authentication, the account must be configured with a password lock value instead of a
blank or null value.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31205r1_fix">Edit /etc/pam.d/system-auth and
remove the "nullok" setting.</fixtext>
+ <fix id="F-31205r1_fix" />
+ <check system="C-35949r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the system will not log in accounts with blank
passwords. # grep nullok /etc/pam.d/system-auth /etc/pam.d/system-auth-ac If an entry for
nullok is found, this is a finding on Linux.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-773">
+ <title>GEN000880</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37347r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000880</version>
+ <title>The root account must be the only account having a UID of
0.</title>
+ <description><VulnDiscussion>If an account has a UID of 0, it
has root authority. Multiple accounts with a UID of 0 afford more opportunity for
potential intruders to guess a password for a privileged account.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECLP-1,
IAIA-1, IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31283r1_fix">Remove or change the UID of
accounts other than root that have UID 0.</fixtext>
+ <fix id="F-31283r1_fix" />
+ <check system="C-36039r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system for duplicate UID 0 assignments by listing
all accounts assigned UID 0. Procedure: # cat /etc/passwd | awk -F":"
'{print$1":"$3":"}' | grep ":0:" If any accounts
other than root are assigned UID 0, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-774">
+ <title>GEN000900</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37349r1_rule" severity="low"
weight="10.0">
+ <version>GEN000900</version>
+ <title>The root user's home directory must not be the root directory
(/).</title>
+ <description><VulnDiscussion>Changing the root home directory
to something other than / and assigning it a 0700 protection makes it more difficult for
intruders to manipulate the system by reading the files root places in its default
+ directory. It also gives root the same discretionary access control for root's
home directory as for the other user home
+
directories.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31284r1_fix">The root home directory should be
something other than / (such as /roothome). Procedure: # mkdir /rootdir # chown root
/rootdir # chgrp root /rootdir # chmod 700 /rootdir # cp -r /.??* /rootdir/. Then, edit
the
+ passwd file and change the root home directory to /rootdir. The cp -r /.??* command
copies all files and subdirectories of file names beginning with "." into the
new root directory, which preserves the previous root environment. Ensure you are in
+ the "/" directory when executing the "cp"
command.</fixtext>
+ <fix id="F-31284r1_fix" />
+ <check system="C-36040r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if root is assigned a home directory other than /
by listing its home directory. Procedure: # grep "^root" /etc/passwd | awk
-F":" '{print $6}' If the root user home directory is /, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-775">
+ <title>GEN000920</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37355r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000920</version>
+ <title>The root account's home directory (other than /) must have mode
0700.</title>
+ <description><VulnDiscussion>Permissions greater than 0700
could allow unauthorized users access to the root home
+
directory.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31288r1_fix">The root home directory will have
permissions of 0700. Do not change the protections of the / directory. Use the following
command to change protections for the root home directory: # chmod 0700
/rootdir.</fixtext>
+ <fix id="F-31288r1_fix" />
+ <check system="C-36044r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the root home directory. Procedure: # grep
"^root" /etc/passwd | awk -F":" '{print $6}' # ls -ld
<root home directory> If the mode of the directory is not equal to 0700,
this is a finding. If the home
+ directory is /, this check will be marked "Not
Applicable".</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-776">
+ <title>GEN000940</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37360r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000940</version>
+ <title>The root account's executable search path must be the vendor
default and must contain only absolute paths.</title>
+ <description><VulnDiscussion>The executable search path
(typically the PATH environment variable) contains a list of directories for the shell to
search to find executables. If this path includes the current working directory or other
+ relative paths, executables in these directories may be executed instead of system
commands. This variable is formatted as a colon-separated list of directories. If there is
an empty entry, such as a leading or trailing colon or two consecutive
+ colons, this is interpreted as the current working directory. Entries starting with
a slash (/) are absolute paths.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2, ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31293r1_fix">Edit the root user's local
initialization files ~/.profile,~/.bashrc (assuming root shell is bash). Change any found
PATH variable settings to the vendor's default path for the root user. Remove any
empty path
+ entries or references to relative paths.</fixtext>
+ <fix id="F-31293r1_fix" />
+ <check system="C-36049r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>To view the root user's PATH, log in as the root user,
and execute: # env | grep PATH This variable is formatted as a colon-separated list of
directories. If there is an empty entry, such as a leading or trailing colon, or two
+ consecutive colons, this is a finding. If an entry starts with a character other
than a slash (/), this is a finding. If directories beyond those in the vendor's
default root path are present. This is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-777">
+ <title>GEN000960</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37372r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000960</version>
+ <title>The root account must not have world-writable directories in its
executable search path.</title>
+ <description><VulnDiscussion>If the root search path contains a
world-writable directory, malicious software could be placed in the path by intruders
and/or malicious users and inadvertently run by root with all of root's privileges.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31304r1_fix">For each world-writable path in
root's executable search path, do one of the following: 1. Remove the world-writable
permission on the directory. Procedure: # chmod o-w <path> 2. Remove the
world-writable
+ directory from the executable search path. Procedure: Identify and edit the
initialization file referencing the world-writable directory and remove it from the PATH
variable.</fixtext>
+ <fix id="F-31304r1_fix" />
+ <check system="C-36059r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for world-writable permissions on all directories in
the root user's executable search path. Procedure: # ls -ld `echo $PATH | sed
"s/:/ /g"` If any of the directories in the PATH variable are world-writable,
this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-780">
+ <title>GEN000360</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37157r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000360</version>
+ <title>GIDs reserved for system accounts must not be assigned to non-system
groups.</title>
+ <description><VulnDiscussion>Reserved GIDs are typically used
by system software packages. If non-system groups have GIDs in this range, they may
conflict with system software, possibly leading to the group having permissions to modify
system
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31121r1_fix">Change the primary group GID
numbers for non-system accounts with reserved primary group GIDs (those less or equal to
499).</fixtext>
+ <fix id="F-31121r1_fix" />
+ <check system="C-35866r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Confirm all accounts with a GID of 499 and below are used by
a system account. Procedure: List all the users with a GID of 0-499. # cut -d: -f 1,4
/etc/passwd|egrep ":[1-4][0-9]{2}$|:[0-9]{1,2}$" If a GID reserved for system
+ accounts (0 - 499) is used by a non-system account, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-781">
+ <title>GEN000380</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27072r1_rule" severity="low"
weight="10.0">
+ <version>GEN000380</version>
+ <title>All GIDs referenced in the /etc/passwd file must be defined in the
/etc/group file.</title>
+ <description><VulnDiscussion>If a user is assigned the GID of a
group not existing on the system, and a group with the GID is subsequently created, the
user may have unintended rights to the group.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-935r3_fix">Add a group to the system for each
GID referenced without a corresponding group.</fixtext>
+ <fix id="F-935r3_fix" />
+ <check system="C-27989r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Perform the following to ensure there are no GIDs referenced
in /etc/passwd not defined in /etc/group: # pwck -r If GIDs referenced in /etc/passwd are
not defined in /etc/group are returned, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-782">
+ <title>GEN006480</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37746r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006480</version>
+ <title>The system must have a host-based intrusion detection tool
installed.</title>
+ <description><VulnDiscussion>Without a host-based intrusion
detection tool, there is no system-level defense when an intruder gains access to a system
or network. Additionally, a host-based intrusion detection tool can provide methods to
+ immediately lock out detected intrusion
+
attempts.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECID-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001259</ident>
+ <fixtext fixref="F-32207r1_fix">Install a host-based intrusion
detection tool.</fixtext>
+ <fix id="F-32207r1_fix" />
+ <check system="C-36942r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Ask the SA or IAO if a host-based intrusion detection
application is loaded on the system. The preferred intrusion detection system is McAfee
HBSS available through Cybercom. Procedure: Examine the system to see if the Host
+ Intrusion Prevention System (HIPS) is installed #rpm -qa | grep MFEhiplsm If the
MFEhiplsm package is installed, HBSS is being used on the system. If another host-based
intrusion detection system is loaded on the system # find / -name <daemon
+ name> Where <daemon name> is the name of the primary
application daemon to determine if the application is loaded on the system. Determine if
the application is active on the system. Procedure: # ps -ef | grep <daemon
name> If no
+ host-based intrusion detection system is installed on the system, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-783">
+ <title>GEN000120</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27059r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000120</version>
+ <title>Vendor-recommended software patches and updates, and system security
patches and updates, must be installed and up-to-date.</title>
+ <description><VulnDiscussion>Timely patching is critical for
maintaining the operational availability, confidentiality, and integrity of information
technology (IT) systems. However, failure to keep operating system and application
software
+ patched is a common mistake made by IT professionals. New patches are released
daily, and it is often difficult for even experienced system administrators to keep
abreast of all the new patches. When new weaknesses in an operating system exist,
+ patches are usually made available by the vendor to resolve the problems. If the
most recent recommended updates and security patches are not installed, unauthorized users
may take advantage of weaknesses present in the unpatched software. The lack
+ of prompt attention to patching could result in a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>VIVM-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001227</ident>
+ <fixtext fixref="F-31302r1_fix">Install the patches or updated
packages available from the vendor.</fixtext>
+ <fix id="F-31302r1_fix" />
+ <check system="C-27973r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Obtain the list of available package updates from Red Hat.
Check the available package updates have been installed on the system. Use the
"rpm" command to list the packages installed on the system. Example: # rpm -qa
-last If
+ updated packages are available and applicable to the system and have not been
installed, this is a finding. One source for the list of Red Hat updates is available at
https://access.redhat.com/security/updates/active/</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-784">
+ <title>GEN001140</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37159r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001140</version>
+ <title>System files and directories must not have uneven access
permissions.</title>
+ <description><VulnDiscussion>Discretionary access control is
undermined if users, other than a file owner, have greater access permissions to system
files and directories than the
+
owner.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31122r1_fix">Change the mode of files with
uneven permissions so owners do not have less permission than group or world
users.</fixtext>
+ <fix id="F-31122r1_fix" />
+ <check system="C-35867r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check system directories for uneven file permissions.
Procedure: # ls -lL /etc /bin /usr/bin /usr/lbin /usr/usb /sbin /usr/sbin Uneven file
permissions exist if the file owner has less permissions than the group or other user
+ classes. If any of the files in the above listed directories contain uneven file
permissions, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-785">
+ <title>GEN001160</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37161r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001160</version>
+ <title>All files and directories must have a valid owner.</title>
+ <description><VulnDiscussion>Un-owned files and directories may
be unintentionally inherited if a user is assigned the same UID as the UID of the
un-owned
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31123r1_fix">All directories and files
(executable and data) will have an identifiable owner and group name. Either trace files
to an authorized user, change the file's owner to root, or delete them. Determine the
legitimate
+ owner of the files and use the chown command to set the owner and group to the
correct value. If the legitimate owner cannot be determined, change the owner to root (but
make sure none of the changed files remain executable because they could be
+ Trojan horses or other malicious code). Examine the files to determine their origin
and the reason for their lack of an owner/group.</fixtext>
+ <fix id="F-31123r1_fix" />
+ <check system="C-35868r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system for files with no assigned owner.
Procedure: # find / -nouser If any files have no assigned owner, this is a finding.
Caution should be used when centralized authorization is used because valid files may
appear as
+ unowned due to communication issues.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-786">
+ <title>GEN001180</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37194r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001180</version>
+ <title>All network services daemon files must have mode 0755 or less
permissive.</title>
+ <description><VulnDiscussion>Restricting permission on daemons
will protect them from unauthorized modification and possible system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31146r1_fix">Change the mode of the network
services daemon. # chmod go-w <path></fixtext>
+ <fix id="F-31146r1_fix" />
+ <check system="C-35891r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of network services daemons. # find /usr/sbin
-type f -perm +022 -exec stat -c %a:%n {} \; This will return the octal permissions and
name of all files that are group or world writable. If any network services daemon
+ listed is world or group writable (either or both of the 2 lowest order digits
contain a 2, 3 or 6), this is a finding. Note: Network daemons not residing in these
directories (such as httpd or sshd) must also be checked for the correct
+ permissions.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-787">
+ <title>GEN001260</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37228r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001260</version>
+ <title>System log files must have mode 0640 or less
permissive.</title>
+ <description><VulnDiscussion>If the system log files are not
protected, unauthorized users could change the logged data, eliminating its forensic
+
value.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECTP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001314</ident>
+ <fixtext fixref="F-31175r1_fix">Change the mode of the system log
file(s) to 0640 or less permissive. Procedure: # chmod 0640 /path/to/system-log-file Note:
Do not confuse system log files with audit logs.</fixtext>
+ <fix id="F-31175r1_fix" />
+ <check system="C-35918r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of log files. Procedure: # ls -lL /var/log
/var/log/syslog /var/adm With the exception of /var/log/wtmp, if any of the log files have
modes more permissive than 0640, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-788">
+ <title>GEN001800</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37292r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001800</version>
+ <title>All skeleton files (typically those in /etc/skel) must have mode 0644
or less permissive.</title>
+ <description><VulnDiscussion>If the skeleton files are not
protected, unauthorized personnel could change user startup parameters and possibly
jeopardize user files.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31240r1_fix">Change the mode of skeleton files
with incorrect mode: # chmod 0644 <skeleton file></fixtext>
+ <fix id="F-31240r1_fix" />
+ <check system="C-35988r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check skeleton files permissions. # ls -alL /etc/skel If a
skeleton file has a mode more permissive than 0644, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-789">
+ <title>GEN001320</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37267r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001320</version>
+ <title>NIS/NIS+/yp files must be owned by root, sys, or bin.</title>
+ <description><VulnDiscussion>NIS/NIS+/yp files are part of the
system's identification and authentication processes and are critical to system
security. Failure to give ownership of sensitive files or utilities to root or bin
provides the
+ designated owner and unauthorized users with the potential to access sensitive
information or change the system configuration which could weaken the system's
security
+
posture.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31213r1_fix">Change the ownership of NIS/NIS+/yp
files to root, sys or bin. Procedure (example): # chown root
<filename></fixtext>
+ <fix id="F-31213r1_fix" />
+ <check system="C-35953r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Perform the following to check NIS file ownership: # ls -la
/var/yp/*; If the file ownership is not root, sys, or bin, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-790">
+ <title>GEN001340</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-41577r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001340</version>
+ <title>NIS/NIS+/yp files must be group-owned by root, sys, or
bin.</title>
+ <description><VulnDiscussion>NIS/NIS+/yp files are part of the
system's identification and authentication processes and are, therefore, critical to
system security. Failure to give ownership of sensitive files or utilities to root or bin
+ provides the designated owner and unauthorized users with the potential to access
sensitive information or change the system configuration which could weaken the
system's security
+
posture.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-35235r1_fix">Perform the following to change NIS
file ownership. # chown root /var/yp/*</fixtext>
+ <fix id="F-35235r1_fix" />
+ <check system="C-40079r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Perform the following to check NIS file ownership: # ls -la
/var/yp/* If the file group ownership is not root, sys, or bin, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-791">
+ <title>GEN001360</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37272r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001360</version>
+ <title>The NIS/NIS+/yp command files must have mode 0755 or less
permissive.</title>
+ <description><VulnDiscussion>NIS/NIS+/yp files are part of the
system's identification and authentication processes and are critical to system
security. Unauthorized modification of these files could compromise these processes and
the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31220r1_fix">Change the mode of NIS/NIS+/yp
command files to 0755 or less permissive. Procedure (example): # chmod 0755
<filename></fixtext>
+ <fix id="F-31220r1_fix" />
+ <check system="C-35964r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Perform the following to check NIS file premissions. # ls
-la /var/yp/*; If the file's mode is more permissive than 0755, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-792">
+ <title>GEN001280</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37234r1_rule" severity="low"
weight="10.0">
+ <version>GEN001280</version>
+ <title>Manual page files must have mode 0644 or less
permissive.</title>
+ <description><VulnDiscussion>If manual pages are compromised,
misleading information could be inserted, causing actions to compromise the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31181r1_fix">Change the mode of manual page
files to 0644 or less permissive. Procedure (example): # chmod 0644
/path/to/manpage</fixtext>
+ <fix id="F-31181r1_fix" />
+ <check system="C-35923r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the manual page files. Procedure: # ls -lL
/usr/share/man /usr/share/info /usr/share/infopage If any of the manual page files have a
mode more permissive than 0644, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-793">
+ <title>GEN001300</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37241r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001300</version>
+ <title>Library files must have mode 0755 or less permissive.</title>
+ <description><VulnDiscussion>Unauthorized access could destroy
the integrity of the library
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCSL-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001499</ident>
+ <fixtext fixref="F-31188r1_fix">Change the mode of library files to
0755 or less permissive. Procedure (example): # chmod go-w
</path/to/library-file> Note: Library files should have an extension of
".a" or a ".so" extension, possibly
+ followed by a version number.</fixtext>
+ <fix id="F-31188r1_fix" />
+ <check system="C-35933r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of library files. Procedure: #
DIRS="/usr/lib /lib";for DIR in $DIRS;do find $DIR -type f -perm +022 -exec stat
-c %a:%n {} \;;done This will return the octal permissions and name of all group or world
writable
+ files. If any file listed is world or group writable (either or both of the 2
lowest order digits contain a 2, 3 or 6), this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-794">
+ <title>GEN001200</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37205r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001200</version>
+ <title>All system command files must have mode 0755 or less
permissive.</title>
+ <description><VulnDiscussion>Restricting permissions will
protect system command files from unauthorized modification. System command files include
files present in directories used by the operating system for storing default system
+ executables and files present in directories included in the system's default
executable search
+
paths.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance>Elevate
to
+ Severity Code I if any file listed
+
world-writable.</SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001499</ident>
+ <fixtext fixref="F-31155r1_fix">Change the mode for system command
files to 0755 or less permissive taking into account necessary GIUD and SUID bits.
Procedure: # chmod go-w <filename></fixtext>
+ <fix id="F-31155r1_fix" />
+ <check system="C-35897r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions for files in /etc, /bin, /usr/bin,
/usr/lbin, /usr/usb, /sbin, and /usr/sbin. Procedure: # DIRS="/etc /bin /usr/bin
/usr/lbin /usr/usb /sbin /usr/sbin";for DIR in $DIRS;do find $DIR -type f -perm +022
-exec
+ stat -c %a:%n {} \;;done This will return the octal permissions and name of all
group or world writable files. If any file listed is world or group writable (either or
both of the 2 lowest order digits contain a 2, 3 or 6), this is a finding.
+ Note: Elevate to Severity Code I if any file listed is
world-writable.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-795">
+ <title>GEN001220</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37216r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001220</version>
+ <title>All system files, programs, and directories must be owned by a system
account.</title>
+ <description><VulnDiscussion>Restricting permissions will
protect the files from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001499</ident>
+ <fixtext fixref="F-31164r1_fix">Change the owner of system files,
programs, and directories to a system account. Procedure: # chown root /some/system/file
(A different system user may be used in place of root.)</fixtext>
+ <fix id="F-31164r1_fix" />
+ <check system="C-35906r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of system files, programs, and
directories. Procedure: # ls -lLa /etc /bin /usr/bin /usr/lbin /usr/usb /sbin /usr/sbin If
any of the system files, programs, or directories are not owned by a system account, this
+ is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-796">
+ <title>GEN001240</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37220r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001240</version>
+ <title>System files, programs, and directories must be group-owned by a
system group.</title>
+ <description><VulnDiscussion>Restricting permissions will
protect the files from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001499</ident>
+ <fixtext fixref="F-31167r1_fix">Change the group-owner of system
files to a system group. Procedure: # chgrp root /path/to/system/file (System groups other
than root may be used.)</fixtext>
+ <fix id="F-31167r1_fix" />
+ <check system="C-35909r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group-ownership of system files, programs, and
directories. Procedure: # ls -lLa /etc /bin /usr/bin /usr/lbin /usr/usb /sbin /usr/sbin If
any system file, program, or directory is not owned by a system group, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-797">
+ <title>GEN001400</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37361r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001400</version>
+ <title>The /etc/shadow (or equivalent) file must be owned by
root.</title>
+ <description><VulnDiscussion>The /etc/shadow file contains the
list of local system accounts. It is vital to system security and must be protected from
unauthorized modification. Failure to give ownership of sensitive files or utilities to
+ root or bin provides the designated owner and unauthorized users with the potential
to access sensitive information or change the system configuration which could weaken the
system's security
+
posture.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31294r1_fix">Change the ownership of the
/etc/shadow (or equivalent) file. # chown root /etc/shadow</fixtext>
+ <fix id="F-31294r1_fix" />
+ <check system="C-36050r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of the /etc/shadow file. # ls -lL
/etc/shadow If the /etc/shadow file is not owned by root, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-798">
+ <title>GEN001380</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37344r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001380</version>
+ <title>The /etc/passwd file must have mode 0644 or less
permissive.</title>
+ <description><VulnDiscussion>If the passwd file is writable by
a group-owner or the world, the risk of passwd file compromise is increased. The passwd
file contains the list of accounts on the system and associated
+
information.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31280r1_fix">Change the mode of the passwd file
to 0644. Procedure: # chmod 0644 /etc/passwd</fixtext>
+ <fix id="F-31280r1_fix" />
+ <check system="C-36037r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the /etc/passwd file. Procedure: # ls -lL
/etc/passwd If /etc/passwd has a mode more permissive than 0644, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-800">
+ <title>GEN001420</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37368r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001420</version>
+ <title>The /etc/shadow (or equivalent) file must have mode
0400.</title>
+ <description><VulnDiscussion>The /etc/shadow file contains the
list of local system accounts. It is vital to system security and must be protected from
unauthorized modification. The file also contains password hashes which must not be
+ accessible to users other than
+
root.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31300r1_fix">Change the mode of the /etc/shadow
(or equivalent) file. # chmod 0400 /etc/shadow</fixtext>
+ <fix id="F-31300r1_fix" />
+ <check system="C-36056r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the /etc/shadow file. # ls -lL /etc/shadow
If the /etc/shadow file has a mode more permissive than 0400, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-801">
+ <title>GEN002380</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37579r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002380</version>
+ <title>The owner, group-owner, mode, ACL, and location of files with the
setuid bit set must be documented using site-defined procedures.</title>
+ <description><VulnDiscussion>All files with the setuid bit set
will allow anyone running these files to be temporarily assigned the UID of the file.
While many system files depend on these attributes for proper operation, security
problems
+ can result if setuid is assigned to programs allowing reading and writing of files,
or shell escapes. Only default vendor-supplied executables should have the setuid bit
+
set.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>Information
+ Assurance
Officer</Responsibility><Responsibility>System
Administrator</Responsibility><IAControls>ECPA-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000368</ident>
+ <fixtext fixref="F-31615r1_fix">Document the files with the suid
bit set or unset the suid bit on the executable.</fixtext>
+ <fix id="F-31615r1_fix" />
+ <check system="C-36445r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>List all setuid files on the system. Procedure: # find /
-perm -4000 -exec ls -l {} \; | more Note: Executing these commands may result in large
listings of files; the output may be redirected to a file for easier analysis. Ask the
+ SA or IAO if files with the setuid bit set have been documented. Documentation
must include the owner, group-owner, mode, ACL, and location of the files. If any
undocumented file has its setuid bit set, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-802">
+ <title>GEN002440</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37628r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002440</version>
+ <title>The owner, group-owner, mode, ACL and location of files with the
setgid bit set must be documented using site-defined procedures.</title>
+ <description><VulnDiscussion>All files with the setgid bit set
will allow anyone running these files to be temporarily assigned the GID of the file.
While many system files depend on these attributes for proper operation, security
problems
+ can result if setgid is assigned to programs allowing reading and writing of files,
or shell
+
escapes.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><Responsibility>Information
Assurance
Officer</Responsibility><IAControls>ECPA-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000368</ident>
+ <fixtext fixref="F-31664r1_fix">Document the files with the sgid
bit set or unset the sgid bit on the executable.</fixtext>
+ <fix id="F-31664r1_fix" />
+ <check system="C-36826r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>List all setgid files on the system. Procedure: # find /
-perm -2000 -exec ls -l {} \; | more Note: Executing these commands may result in large
listings of files; the output may be redirected to a file for easier analysis. Ask the
+ SA or IAO if files with the setgid bit set have been documented. Documentation
must include owner, group-owner, mode, ACL, and location. If any undocumented file has its
setgid bit set, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-803">
+ <title>GEN002400</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37592r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002400</version>
+ <title>The system must be checked weekly for unauthorized setuid files as
well as unauthorized modification to authorized setuid files.</title>
+ <description><VulnDiscussion>Files with the setuid bit set will
allow anyone running these files to be temporarily assigned the UID of the file. While
many system files depend on these attributes for proper operation, security problems can
+ result if setuid is assigned to programs allowing reading and writing of files, or
shell
+
escapes.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCSL-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000318</ident>
+ <fixtext fixref="F-31627r1_fix">Establish a weekly automated or
manual process to generate a list of suid files on the system and compare it with the
prior list. To create a list of suid files: # find / -perm -4000 >
suid-file-list</fixtext>
+ <fix id="F-31627r1_fix" />
+ <check system="C-36666r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Ask the SA for the weekly automated or manual process used
to generate a list of setuid files on the system and compare it with the prior list. If no
such process is in place, this is a finding. Review the process. If the process
+ does not identify and report changes in setuid files, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-804">
+ <title>GEN002460</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37635r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002460</version>
+ <title>The system must be checked weekly for unauthorized setgid files as
well as unauthorized modification to authorized setgid files.</title>
+ <description><VulnDiscussion>Files with the setgid bit set will
allow anyone running these files to be temporarily assigned the group id of the file.
While many system files depend on these attributes for proper operation, security
problems
+ can result if setgid is assigned to programs allowing reading and writing of files,
or shell
+
escapes.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCSL-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000318</ident>
+ <fixtext fixref="F-31671r2_fix">Establish a weekly automated or
manual process to generate a list of setgid files on the system and compare it with the
prior list. To create a list of setgid files: # find / -perm -2000 >
+ setgid-file-list</fixtext>
+ <fix id="F-31671r2_fix" />
+ <check system="C-36833r3_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Ask the SA if a weekly automated or manual process is used
to generate a list of setgid files on the system and compare it with the prior list. If no
such process is in place, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-805">
+ <title>GEN002420</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37607r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002420</version>
+ <title>Removable media, remote file systems, and any file system not
containing approved setuid files must be mounted with the "nosuid"
option.</title>
+ <description><VulnDiscussion>The "nosuid" mount
option causes the system to not execute setuid files with owner privileges. This option
must be used for mounting any file system not containing approved setuid files. Executing
setuid files
+ from untrusted file systems, or file systems not containing approved setuid files,
increases the opportunity for unprivileged users to attain unauthorized administrative
+
access.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31642r1_fix">Edit /etc/fstab and add the
"nosuid" mount option to all file systems mounted from removable media or
network shares, and any file system not containing approved setuid or setgid
files.</fixtext>
+ <fix id="F-31642r1_fix" />
+ <check system="C-36773r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/mtab and verify the "nosuid" mount
option is used on file systems mounted from removable media, network shares, or any other
file system not containing approved setuid or setgid files. If any of these files systems
do
+ not mount with the "nosuid" option, it is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-806">
+ <title>GEN002500</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37647r1_rule" severity="low"
weight="10.0">
+ <version>GEN002500</version>
+ <title>The sticky bit must be set on all public directories.</title>
+ <description><VulnDiscussion>Failing to set the sticky bit on
the public directories allows unauthorized users to delete files in the directory
structure. The only authorized public directories are those temporary directories supplied
with
+ the system or those designed to be temporary file repositories. The setting is
normally reserved for directories used by the system and by users for temporary file
storage, (e.g., /tmp), and for directories requiring global read/write
+
access.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31680r1_fix">Set the sticky bit on all public
directories. Procedure: # chmod 1777 /tmp (Replace /tmp with the public directory missing
the sticky bit, if necessary.)</fixtext>
+ <fix id="F-31680r1_fix" />
+ <check system="C-36843r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check all world-writable directories have the sticky bit
set. Procedure: # find / -type d -perm -002 ! -perm -1000 > wwlist If the sticky
bit is not set on a world-writable directory, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-807">
+ <title>GEN002520</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37888r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002520</version>
+ <title>All public directories must be owned by root or an application
account.</title>
+ <description><VulnDiscussion>If a public directory has the
sticky bit set and is not owned by a privileged UID, unauthorized users may be able to
modify files created by others. The only authorized public directories are those
temporary
+ directories supplied with the system or those designed to be temporary file
repositories. The setting is normally reserved for directories used by the system and by
users for temporary file storage, (e.g., /tmp), and for directories requiring
+ global read/write
+
access.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32382r1_fix">Change the owner of public
directories to root or an application account. Procedure: # chown root /tmp (Replace root
with an application user and/or /tmp with another public directory as
necessary.)</fixtext>
+ <fix id="F-32382r1_fix" />
+ <check system="C-37114r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of all public directories. Procedure: #
find / -type d -perm -1002 -exec ls -ld {} \; If any public directory is not owned by root
or an application user, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-808">
+ <title>GEN002560</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37898r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002560</version>
+ <title>The system and user default umask must be 077.</title>
+ <description><VulnDiscussion>The umask controls the default
access mode assigned to newly created files. An umask of 077 limits new files to mode 700
or less permissive. Although umask can be represented as a 4-digit number, the first
digit
+ representing special access modes is typically ignored or required to be 0. This
requirement applies to the globally configured system defaults and the user defaults for
each account on the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance>If
the
+ default umask is 000 or does not restrict the world-writable permission, this
becomes a CAT I
+
finding.</SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32392r1_fix">Edit local and global
initialization files that contain "umask" and change them to use 077 instead of
the current value.</fixtext>
+ <fix id="F-32392r1_fix" />
+ <check system="C-37124r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check global initialization files for the configured umask
value. Procedure: # grep umask /etc/* Check local initialization files for the configured
umask value. Procedure: # cut -d: -f6 /etc/passwd |xargs -n1 -IDIR find DIR -name
+ ".*" -type f -maxdepth 1 -exec grep umask {} \; If the system and user
default umask is not 077, this a finding. Note: If the default umask is 000 or allows for
the creation of world-writable files this becomes a Severity Code I
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-812">
+ <title>GEN002680</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37912r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002680</version>
+ <title>System audit logs must be owned by root.</title>
+ <description><VulnDiscussion>Failure to give ownership of
system audit log files to root provides the designated owner and unauthorized users with
the potential to access sensitive
+
information.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECTP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000162</ident>
+ <fixtext fixref="F-966r2_fix">Change the ownership of the audit log
file(s). Procedure: # chown root <audit log file></fixtext>
+ <fix id="F-966r2_fix" />
+ <check system="C-37138r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Perform the following to determine the location of audit
logs and then check the ownership. Procedure: # grep "^log_file"
/etc/audit/auditd.conf|sed s/^[^\/]*//|xargs stat -c %U:%n If any audit log file is not
owned by root, this
+ is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-813">
+ <title>GEN002700</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37916r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002700</version>
+ <title>System audit logs must have mode 0640 or less
permissive.</title>
+ <description><VulnDiscussion>If a user can write to the audit
logs, audit trails can be modified or destroyed and system intrusion may not be detected.
System audit logs are those files generated from the audit system and do not include
+ activity, error, or other log files created by application
+
software.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECTP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000163</ident>
+ <fixtext fixref="F-967r2_fix">Change the mode of the audit log
directories/files. # chmod 0750 <audit directory> # chmod 0640 <audit
file></fixtext>
+ <fix id="F-967r2_fix" />
+ <check system="C-37142r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Perform the following to determine the location of audit
logs and then check the mode of the files. Procedure: # grep "^log_file"
/etc/audit/auditd.conf|sed s/^[^\/]*//|xargs stat -c %a:%n If any audit log file has a
mode more
+ permissive than 0640, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-814">
+ <title>GEN002720</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-38645r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002720</version>
+ <title>The audit system must be configured to audit failed attempts to access
files and programs.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-33035r2_fix">Edit the audit.rules file and add
the following line(s) to enable auditing of failed attempts to access files and programs:
either: -a exit,always -F arch=<ARCH> -S creat -F success=0 or both: -a
exit,always -F
+ arch=<ARCH> -S creat -F exit=-EPERM -a exit,always -F
arch=<ARCH> -S creat -F exit=-EACCES Restart the auditd service. # service
auditd restart</fixtext>
+ <fix id="F-33035r2_fix" />
+ <check system="C-37782r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify auditd is configured to audit failed file access
attempts. There must be an audit rule for each of the access syscalls logging all failed
accesses (-F success=0) or there must both an "-F exit=-EPERM" and "-F
exit=-EACCES"
+ for each access syscall. Procedure: # cat /etc/audit/audit.rules | grep -e
"-a exit,always" | grep -e "-S creat" | grep -e "-F
success=0" # cat /etc/audit/audit.rules | grep -e "-a exit,always" | grep
-e "-S creat" | grep -e "-F exit=-EPERM" #
+ cat /etc/audit/audit.rules | grep -e "-a exit,always" | grep -e
"-S creat" | grep -e "-F exit=-EACCES" If an "-S creat"
audit rule with "-F success" does not exist and no separate rules containing
"-F exit=-EPERM" and "-F exit=-EACCES" for
+ "creat" exist, then this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-815">
+ <title>GEN002740</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-42185r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002740</version>
+ <title>The audit system must be configured to audit files and programs
deleted by the user.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-24531r1_fix">Edit the audit.rules file and add
the following line to enable auditing of deletions: -a exit,always -S unlink Restart the
auditd service. # service auditd restart</fixtext>
+ <fix id="F-24531r1_fix" />
+ <check system="C-28405r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system audit configuration to determine if file
and directory deletions are audited. # cat /etc/audit.rules /etc/audit/audit.rules | grep
-e "-a exit,always" | grep -i "unlink" If no results are returned, or
the results
+ do not contain "-S unlink", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-818">
+ <title>GEN002800</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37944r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002800</version>
+ <title>The audit system must be configured to audit login, logout, and
session initiation.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-32435r1_fix">Ensure logins Procedure: Modify
/etc/audit/audit.rules to contain: -w /var/log/faillog -p wa -w /var/log/lastlog -p
wa</fixtext>
+ <fix id="F-32435r1_fix" />
+ <check system="C-37225r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>The message types that are always recorded to
/var/log/audit/audit.log include LOGIN,USER_LOGIN,USER_START,USER_END among others and do
not need to be added to audit_rules. The log files /var/log/faillog and /var/log/lastlog
must
+ be protected from tampering of the login records. Procedure: #egrep
"faillog|lastlog" /etc/audit/audit.rules|grep "-p (wa|aw)" If both
/var/log/faillog and /var/log/lastlog entries do not exist, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-819">
+ <title>GEN002820</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27313r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002820</version>
+ <title>The audit system must be configured to audit all discretionary access
control permission modifications.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system compromise.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-24555r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Edit the audit.rules file and add the
following lines to enable auditing of discretionary access control permissions
modifications. -a exit,always -F arch=<ARCH> -S chmod Restart the auditd
service. #
+ service auditd restart</fixtext>
+ <fix id="F-24555r1_fix" />
+ <check system="C-28442r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system's audit configuration. Procedure: # cat
/etc/audit.rules /etc/audit/audit.rules | grep -e "-a exit,always" | grep -i
" chmod " If "-S chmod" is not in the result, this is a
finding</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-821">
+ <title>GEN003720</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37406r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003720</version>
+ <title>The inetd.conf file, xinetd.conf file, and the xinetd.d directory must
be owned by root or bin.</title>
+ <description><VulnDiscussion>Failure to give ownership of
sensitive files or utilities to root provides the designated owner and unauthorized users
with the potential to access sensitive information or change the system configuration
possibly
+ weakening the system's security
+
posture.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31336r1_fix">Change the owner of the xinetd
configuration files. # chown root /etc/xinetd.conf /etc/xinetd.d/*</fixtext>
+ <fix id="F-31336r1_fix" />
+ <check system="C-36089r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the owner of the xinetd configuration files.
Procedure: # ls -lL /etc/xinetd.conf # ls -laL /etc/xinetd.d This is a finding if any of
the above files or directories are not owned by root or bin.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-822">
+ <title>GEN003740</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37408r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003740</version>
+ <title>The inetd.conf and xinetd.conf files must have mode 0440 or less
permissive.</title>
+ <description><VulnDiscussion>The Internet service daemon
configuration files must be protected as malicious modification could cause Denial of
Service or increase the attack surface of the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31338r1_fix">Change the mode of the xinetd
configuration files. # chmod 0640 /etc/xinetd.conf /etc/xinetd.d/*</fixtext>
+ <fix id="F-31338r1_fix" />
+ <check system="C-36091r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the xinetd configuration files. Procedure:
# ls -lL /etc/xinetd.conf # ls -lL /etc/xinetd.d If the mode of the file(s) is more
permissive than 0640, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-823">
+ <title>GEN003760</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37424r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003760</version>
+ <title>The services file must be owned by root or bin.</title>
+ <description><VulnDiscussion>Failure to give ownership of
sensitive files or utilities to root or bin provides the designated owner and unauthorized
users with the potential to access sensitive information or change the system
configuration
+ possibly weakening the system's security
+
posture.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31351r1_fix">Change the ownership of the
services file to root or bin. Procedure: # chown root /etc/services</fixtext>
+ <fix id="F-31351r1_fix" />
+ <check system="C-36105r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of the services file. Procedure: # ls
-lL /etc/services If the services file is not owned by root or bin, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-824">
+ <title>GEN003780</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37426r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003780</version>
+ <title>The services file must have mode 0644 or less
permissive.</title>
+ <description><VulnDiscussion>The services file is critical to
the proper operation of network services and must be protected from unauthorized
modification. Unauthorized modification could result in the failure of network
+
services.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31353r1_fix">Change the mode of the services
file to 0644 or less permissive. Procedure: # chmod 0644 /etc/services</fixtext>
+ <fix id="F-31353r1_fix" />
+ <check system="C-36107r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the services file. Procedure: # ls -lL
/etc/services If the services file has a mode more permissive than 0644, this is a
finding</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-825">
+ <title>GEN001780</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37289r1_rule" severity="low"
weight="10.0">
+ <version>GEN001780</version>
+ <title>Global initialization files must contain the "mesg -n" or
"mesg n" commands.</title>
+ <description><VulnDiscussion>If the "mesg -n" or
"mesg n" command is not placed into the system profile, messaging can be used to
cause a Denial of Service
+
attack.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31237r1_fix">Edit /etc/profile or another global
initialization script, and add the "mesg -n" command.</fixtext>
+ <fix id="F-31237r1_fix" />
+ <check system="C-35983r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check global initialization files for the presence of
"mesg -n" or "mesg n". Procedure: # grep "mesg" etc/bashrc
/etc/csh.cshrc /etc/csh.login /etc/csh.logout /etc/environment /etc/ksh.kshrc /etc/profile
/etc/suid_profile
+ /etc/profile.d/* If no global initialization files contain "mesg -n" or
"mesg n", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-827">
+ <title>GEN003900</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37447r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003900</version>
+ <title>The hosts.lpd file (or equivalent) must not contain a ‘+’
character.</title>
+ <description><VulnDiscussion>Having the '+' character
in the hosts.lpd (or equivalent) file allows all hosts to use local system print
+
resources.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31365r1_fix">Configure cups to use only the
localhost or specified remote hosts. Procedure: Modify the /etc/cups/cupsd.conf file to
"Listen" only to the local machine or a known set of hosts (i.e., Listen
localhost:631). Modify
+ the /etc/cups/cupsd.conf file "<Location />" element to
"Deny From All" and "Allow from 127.0.0.1" or allowed host addresses.
Restart cups: # service cups restart</fixtext>
+ <fix id="F-31365r1_fix" />
+ <check system="C-36119r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>RHEL uses "cups" print service. Verify remote host
access is limited. Procedure: # grep -i Listen /etc/cups/cupsd.conf The
/etc/cups/cupsd.conf file must not contain a Listen *:<port> or equivalent
line. If the network
+ address of the "Listen" line is unrestricted, this is a finding. # grep
-i "Allow From" /etc/cups/cupsd.conf The "Allow From" line within the
"<Location />" element should limit access to the printers to
@LOCAL and specific hosts. If the
+ "Allow From" line contains "All" this is a
finding</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-828">
+ <title>GEN003920</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37448r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003920</version>
+ <title>The hosts.lpd (or equivalent) file must be owned by root, bin, sys, or
lp.</title>
+ <description><VulnDiscussion>Failure to give ownership of the
hosts.lpd file to root, bin, sys, or lp provides the designated owner, and possible
unauthorized users, with the potential to modify the hosts.lpd file. Unauthorized
modifications
+ could disrupt access to local printers from authorized remote hosts or permit
unauthorized remote access to local
+
printers.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31366r1_fix">Change the owner of the
/etc/cups/printers.conf to root. Procedure: # chown root
/etc/cups/printers.conf</fixtext>
+ <fix id="F-31366r1_fix" />
+ <check system="C-36120r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of the print service configuration file.
Procedure: # ls -lL /etc/cups/printers.conf; If no print service configuration file is
found, this is not applicable. If the owner of the file is not root, this is a
+ finding</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-829">
+ <title>GEN003940</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37461r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003940</version>
+ <title>The hosts.lpd (or equivalent) must have mode 0644 or less
permissive.</title>
+ <description><VulnDiscussion>Excessive permissions on the
hosts.lpd (or equivalent) file may permit unauthorized modification. Unauthorized
modifications could disrupt access to local printers from authorized remote hosts or
permit
+ unauthorized remote access to local
+
printers.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31371r1_fix">Change the mode of the
/etc/cups/printers.conf file to 0664 or less permissive. Procedure: # chmod 0664
/etc/cups/printers.conf</fixtext>
+ <fix id="F-31371r1_fix" />
+ <check system="C-36127r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the print service configuration file.
Procedure: # ls -lL /etc/cups/printers.conf If no print service configuration file is
found, this is not applicable. If the mode of the print service configuration file is
+ more permissive than 0664, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-831">
+ <title>GEN004360</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37472r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004360</version>
+ <title>The alias file must be owned by root.</title>
+ <description><VulnDiscussion>If the alias file is not owned by
root, an unauthorized user may modify the file adding aliases to run malicious code or
redirect
+
e-mail.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31384r1_fix">Change the owner of the
/etc/aliases file to root. Procedure: for sendmail: # chown root /etc/aliases # chown root
/etc/aliases.db for postfix # chown root /etc/postfix/aliases # chown root
+ /etc/postfix/aliases.db</fixtext>
+ <fix id="F-31384r1_fix" />
+ <check system="C-36137r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of the alias files. Procedure: for
sendmail: # ls -lL /etc/aliases # ls -lL /etc/aliases.db If all the files are not owned by
root, this is a finding. for postfix: Verify the location of the alias file. #
+ postconf alias maps This will return the location of the "aliases"
file, by default "/etc/postfix/aliases" # ls -lL <postfix aliases
file> # ls -lL <postfix aliases.db file> If all the files are not
owned by root, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-832">
+ <title>GEN004380</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37475r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004380</version>
+ <title>The alias file must have mode 0644 or less permissive.</title>
+ <description><VulnDiscussion>Excessive permissions on the
aliases file may permit unauthorized modification. If the alias file is modified by an
unauthorized user, they may modify the file to run malicious code or redirect
+
e-mail.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31387r1_fix">Change the mode of the alias files
as needed to function. No higher than 0644. Procedure: for sendmail: # chmod 0644
/etc/aliases /etc/aliases.db for postfix (assuming the default postfix directory): # chmod
0644
+ /etc/postfix/aliases /etc/postfix/aliases.db</fixtext>
+ <fix id="F-31387r1_fix" />
+ <check system="C-36141r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the alias file. Procedure: for
sendmail: # ls -lL /etc/aliases /etc/aliases.db If an alias file has a mode more
permissive than 0644, this is a finding. for postfix: Verify the location of the alias
file. #
+ postconf alias maps This will return the location of the "aliases"
file, by default "/etc/postfix/aliases" # ls -lL <postfix aliases
file> <postfix aliases.db file> If an alias file has a mode more
permissive than 0644, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-833">
+ <title>GEN004400</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37491r1_rule" severity="high"
weight="10.0">
+ <version>GEN004400</version>
+ <title>Files executed through a mail aliases file must be owned by root and
must reside within a directory owned and writable only by root.</title>
+ <description><VulnDiscussion>If a file executed through a mail
aliases file is not owned and writable only by root, it may be subject to unauthorized
modification. Unauthorized modification of files executed through aliases may allow
+ unauthorized users to attain root
+
privileges.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31398r1_fix">Edit the /etc/aliases file
(alternatively, /usr/lib/sendmail.cf). Locate the entries executing a program. They will
appear similar to the following line: Aliasname: : /usr/local/bin/ls (or some other
program name)
+ Ensure root owns the programs and the directory(ies) they reside in by using the
chown command to change owner to root. Procedure: # chown root <file or directory
name></fixtext>
+ <fix id="F-31398r1_fix" />
+ <check system="C-36149r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the ownership of files referenced within the sendmail
aliases file. Procedure: # more /etc/aliases Examine the aliases file for any utilized
directories or paths. # ls -lL <directory or file path> Check the owner for
+ any paths referenced. Check if the file or parent directory is owned by root. If
not, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-834">
+ <title>GEN004420</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37494r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004420</version>
+ <title>Files executed through a mail aliases file must have mode 0755 or less
permissive.</title>
+ <description><VulnDiscussion>If a file executed through a mail
aliases file has permissions greater than 0755, it can be modified by an unauthorized user
and may contain malicious code or instructions potentially compromising the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31403r2_fix">Use the chmod command to change the
access permissions for files executed from the alias file. For example: # chmod 0755
filename</fixtext>
+ <fix id="F-31403r2_fix" />
+ <check system="C-36152r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Examine the contents of the /etc/aliases file. Procedure: #
more /etc/aliases Examine the aliases file for any referenced programs, which are
specified with the pipe (|) symbol. # ls -lL <file referenced from aliases>
Check
+ the permissions for any paths referenced. If any file referenced from the aliases
file has a mode more permissive than 0755, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-835">
+ <title>GEN004440</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37497r1_rule" severity="low"
weight="10.0">
+ <version>GEN004440</version>
+ <title>Sendmail logging must not be set to less than nine in the sendmail.cf
file.</title>
+ <description><VulnDiscussion>If Sendmail is not configured to
log at level 9, system logs may not contain the information necessary for tracking
unauthorized use of the sendmail
+
service.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31405r1_fix">Edit the sendmail.conf file, locate
the "O L" or "LogLevel" entry and change it to 9.</fixtext>
+ <fix id="F-31405r1_fix" />
+ <check system="C-36154r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check if sendmail logging is set to level nine: Procedure:
for sendmail: # grep "O L" /etc/mail/sendmail.cf OR # grep LogLevel
/etc/mail/sendmail.cf If logging is set to less than nine, this is a finding. for Postfix:
This rule is
+ not applicable to postfix which does not use "log levels" in the same
fashion as sendmail.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-836">
+ <title>GEN004460</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37500r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004460</version>
+ <title>The system syslog service must log informational and more severe SMTP
service messages.</title>
+ <description><VulnDiscussion>If informational and more severe
SMTP service messages are not logged, malicious activity on the system may go
+
unnoticed.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3, ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-31407r1_fix">Check the syslog configuration file
for mail.crit logging configuration. Procedure: # grep "mail\." /etc/syslog.conf
If syslog is not configured to log critical sendmail messages ("mail.crit" or
"mail.*"), this is a
+ finding.</fixtext>
+ <fix id="F-31407r1_fix" />
+ <check system="C-36156r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the syslog configuration file for mail.crit logging
configuration. Procedure: # grep "mail\." /etc/syslog.conf If syslog is not
configured to log critical sendmail messages ("mail.crit" or
"mail.*"), this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-837">
+ <title>GEN004480</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37501r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004480</version>
+ <title>The SMTP service log file must be owned by root.</title>
+ <description><VulnDiscussion>If the SMTP service log file is
not owned by root, then unauthorized personnel may modify or delete the file to hide a
system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31408r1_fix">Change the ownership of the
sendmail log file. Procedure: The fix procedure is the same for both sendmail and Postfix.
# chown root <sendmail log file></fixtext>
+ <fix id="F-31408r1_fix" />
+ <check system="C-36158r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Locate any mail log files by checking the syslog
configuration file. Procedure: The check procedure is the same for both sendmail and
Postfix. Identify any log files configured for the "mail" service (excluding
mail.none) at any
+ severity level and check the ownership # egrep "mail\.[^n][^/]*"
/etc/syslog.conf|sed 's/^[^/]*//'|xargs ls -lL If any mail log file is not owned
by root, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-838">
+ <title>GEN004500</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37502r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004500</version>
+ <title>The SMTP service log file must have mode 0644 or less
permissive.</title>
+ <description><VulnDiscussion>If the SMTP service log file is
more permissive than 0644, unauthorized users may be allowed to change the log
+
file.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31410r1_fix">Change the mode of the SMTP service
log file. Procedure: The fix procedure is the same for both sendmail and Postfix. # chmod
0644 <sendmail log file></fixtext>
+ <fix id="F-31410r1_fix" />
+ <check system="C-36159r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the SMTP service log file. Procedure: The
check procedure is the same for both sendmail and Postfix. Identify any log files
configured for the "mail" service (excluding mail.none) at any severity level
and check
+ the permissions # egrep "mail\.[^n][^/]*" /etc/syslog.conf|sed
's/^[^/]*//'|xargs ls -lL If the log file permissions are greater than 0644, this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-840">
+ <title>GEN004880</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37530r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004880</version>
+ <title>The ftpusers file must exist.</title>
+ <description><VulnDiscussion>The ftpusers file contains a list
of accounts not allowed to use FTP to transfer files. If this file does not exist, then
unauthorized accounts can utilize
+
FTP.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31444r1_fix">Create an ftpusers file appropriate
for the running FTP service. For gssftp: Create an /etc/ftpusers file containing a list of
accounts not authorized for FTP. For vsftp: Create an /etc/vfsftpd.ftpusers or
+ /etc/vfsftpd/ftpusers (as appropriate) file containing a list of accounts not
authorized for FTP.</fixtext>
+ <fix id="F-31444r1_fix" />
+ <check system="C-36189r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for the existence of the ftpusers file. Procedure: For
gssftp: # ls -l /etc/ftpusers For vsftp: # ls -l /etc/vsftpd.ftpusers or # ls -l
/etc/vsftpd/ftpusers If the appropriate ftpusers file for the running FTP service does
+ not exist, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-841">
+ <title>GEN004900</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37532r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004900</version>
+ <title>The ftpusers file must contain account names not allowed to use
FTP.</title>
+ <description><VulnDiscussion>The ftpusers file contains a list
of accounts not allowed to use FTP to transfer files. If the file does not contain the
names of all accounts not authorized to use FTP, then unauthorized use of FTP may take
+
place.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31446r1_fix">For gssftp: Add accounts not
allowed to use FTP to the /etc/ftpusers file. For vsftp: Add accounts not allowed to use
FTP to the /etc/vfsftpd.ftpusers or /etc/vfsftpd/ftpusers file (as
appropriate).</fixtext>
+ <fix id="F-31446r1_fix" />
+ <check system="C-36191r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the contents of the ftpusers file. For gssftp: # more
/etc/ftpusers For vsftp: # more /etc/vsftpd.ftpusers /etc/vfsftpd/ftpusers If the system
has accounts not allowed to use FTP and not listed in the ftpusers file, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-842">
+ <title>GEN004920</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37537r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004920</version>
+ <title>The ftpusers file must be owned by root.</title>
+ <description><VulnDiscussion>If the file ftpusers is not owned
by root, an unauthorized user may modify the file to allow unauthorized accounts to use
+
FTP.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31452r1_fix">Change the owner of the ftpusers
file to root. For gssftp: # chown root /etc/ftpusers For vsftp: # chown root
/etc/vsftpd.ftpusers /etc/vsftpd/ftpusers</fixtext>
+ <fix id="F-31452r1_fix" />
+ <check system="C-36195r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of the ftpusers file. Procedure: For
gssftp: # ls -l /etc/ftpusers For vsftp: # ls -l /etc/vsftpd.ftpusers /etc/vsftpd/ftpusers
If the ftpusers file is not owned by root, this is a finding</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-843">
+ <title>GEN004940</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37542r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004940</version>
+ <title>The ftpusers file must have mode 0640 or less
permissive.</title>
+ <description><VulnDiscussion>Excessive permissions on the
ftpusers file could permit unauthorized modification. Unauthorized modification could
result in Denial of Service to authorized FTP users or permit unauthorized users to access
the FTP
+
service.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31457r1_fix">Change the mode of the ftpusers
file to 0640. Procedure: For gssftp: # chmod 0640 /etc/ftpusers For vsftp: # chmod 0640
/etc/vsftpd.ftpusers /etc/vsftpd/ftpusers</fixtext>
+ <fix id="F-31457r1_fix" />
+ <check system="C-36199r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the ftpusers file. Procedure: For
gssftp: # ls -l /etc/ftpusers For vsftp: # ls -l /etc/vsftpd.ftpusers /etc/vsftpd/ftpusers
If the ftpusers file has a mode more permissive than 0640, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-845">
+ <title>GEN004980</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37547r1_rule" severity="low"
weight="10.0">
+ <version>GEN004980</version>
+ <title>The FTP daemon must be configured for logging or verbose
mode.</title>
+ <description><VulnDiscussion>The -l option allows basic logging
of connections. The verbose (on HP) and the debug (on Solaris) allow logging of what files
the ftp session transferred. This extra logging makes it possible to easily track which
+ files are being transferred onto or from a system. If they are not configured, the
only option for tracking is the audit files. The audit files are much harder to read. If
auditing is not properly configured, then there would be no record at all of
+ the file transfer
+
transactions.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000130</ident>
+ <fixtext fixref="F-31461r1_fix">Enable logging by changing ftpd
startup or config files. Procedure: The procedure depends on the implementation of ftpd
used by the system. For vsftpd: Ensure the server settings in "/etc/vsftpd.conf"
(or other
+ configuration file specified by the vaftpd xinetd.d startup file) contains:
xferlog_enable = yes For gssftp: If the "disable" server setting is missing or
set to "no" in "/etc/xinetd.d/gssftp" then ensure the server settings
in
+ "/etc/xinetd.d/gssftp" contains: server_args = -l The -l option may be
added up to three times. Each -l will provide increasing verbosity on the log. Refer to
the main page for ftpd for more information. For both if started using xinetd: If the
+ "disable" server setting is missing or set to "no" in the
/etc/xinetd.d startup file then ensure the server settings contains: log_on_success +=
DURATION USERID This will log the startup and shutdown of the daemon. log_on_failure +=
HOST
+ USERID</fixtext>
+ <fix id="F-31461r1_fix" />
+ <check system="C-36202r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Find if logging is applied to the ftp daemon. The procedure
depends on the implementation of ftpd used by the system. Procedures: For vsftpd: If
vsftpd is started by xinetd: #grep vsftpd /etc/xinetd.d/* This will indicate the
+ xinetd.d startup file #grep server_args <vsftpd xinetd.d startup
file> This will indicate the vsftpd config file used when starting through xinetd.
If the line is missing then "/etc/vsftpd/vsftpd.conf", the default config file,
is used.
+ #grep xferlog_enable <vsftpd config file> If
"xferlog_enable" is missing or is not set to "yes", this is a finding.
If vsftp is not started by xinetd: #grep xferlog_enable /etc/vsftpd/vsftpd.conf If
"xferlog_enable" is missing or is not set
+ to "yes", this is a finding. For gssftp: Find if the -l option will be
applied when xinetd starts gssftp # grep server_args /etc/xinetd.d/gssftp If the line is
missing or does not contain at least one -l, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-846">
+ <title>GEN004820</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37526r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004820</version>
+ <title>Anonymous FTP must not be active on the system unless
authorized.</title>
+ <description><VulnDiscussion>Due to the numerous
vulnerabilities inherent in anonymous FTP, it is not recommended. If anonymous FTP must be
used on a system, the requirement must be authorized and approved in the system
accreditation
+
package.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>Information
+ Assurance
Officer</Responsibility><Responsibility>System
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001475</ident>
+ <fixtext fixref="F-31440r1_fix">Configure the FTP service to not
permit anonymous logins.</fixtext>
+ <fix id="F-31440r1_fix" />
+ <check system="C-36185r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Attempt to log into this host with a user name of anonymous
and a password of guest (also try the password of guest(a)mail.com). If the logon is
successful and the use of anonymous ftp has not been documented and approved by the IAO,
+ this is a finding. Procedure: # ftp localhost Name: anonymous 530 Guest login not
allowed on this machine.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-847">
+ <title>GEN005080</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37560r1_rule" severity="high"
weight="10.0">
+ <version>GEN005080</version>
+ <title>The TFTP daemon must operate in "secure mode" which provides
access only to a single directory on the host file system.</title>
+ <description><VulnDiscussion>Secure mode limits TFTP requests
to a specific directory. If TFTP is not running in secure mode, it may be able to write to
any file or directory and may seriously impair system integrity, confidentiality, and
+
availability.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31470r1_fix">Edit /etc/xinetd.d/tftp file and
specify the "-s" parameter in server_args.</fixtext>
+ <fix id="F-31470r1_fix" />
+ <check system="C-36211r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># grep server_args /etc/xinetd.d/tftp If the "-s"
parameter is not specified, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-848">
+ <title>GEN005100</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37564r1_rule" severity="high"
weight="10.0">
+ <version>GEN005100</version>
+ <title>The TFTP daemon must have mode 0755 or less permissive.</title>
+ <description><VulnDiscussion>If TFTP runs with the setuid or
setgid bit set, it may be able to write to any file or directory and may seriously impair
system integrity, confidentiality, and
+
availability.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECPA-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31473r1_fix">Change the mode of the TFTP daemon.
Procedure: # chmod 0755 <in.tftpd binary></fixtext>
+ <fix id="F-31473r1_fix" />
+ <check system="C-36213r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the TFTP daemon. Procedure: # grep
"server " /etc/xinetd.d/tftp # ls -lL <in.tftpd binary> If the
mode of the file is more permissive than 0755, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-849">
+ <title>GEN005120</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37674r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005120</version>
+ <title>The TFTP daemon must be configured to vendor specifications, including
a dedicated TFTP user account, a non-login shell such as /bin/false, and a home directory
owned by the TFTP user.</title>
+ <description><VulnDiscussion>If TFTP has a valid shell, it
increases the likelihood someone could log on to the TFTP account and compromise the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31798r1_fix">Configure TFTP to use a dedicated
"tftp" user. Procedure: Create a dedicated "tftp" user account if none
exists. Assign a non-login shell to the "tftp" user account, such as /bin/false.
Assign a home directory to the
+ "tftp" user account. Edit /etc/xinetd.d/tftp to have "tftp" as
the value of the "user" parameter.</fixtext>
+ <fix id="F-31798r1_fix" />
+ <check system="C-36862r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the /etc/passwd file to determine if TFTP is
configured properly. Procedure: Check if TFTP if used. # grep disable /etc/xinetd.d/tftp
If the file does not exist or the returned line indicates "yes", then this is
not a
+ finding. Otherwise, if the returned line indicates "no" then TFTP is
enabled and must use a dedicated "tftp" user. # grep user /etc/xinetd.d/tftp If
the returned line indicates a user other than the dedicated "tftp" user, this is
a finding. #
+ grep tftp /etc/passwd If a "tftp" user account does not exist and TFTP
is active, this is a finding. Check the user shell for the "tftp" user. If it is
not /bin/false or equivalent, this is a finding. Check the home directory assigned to the
+ "tftp" user. If no home directory is set, or the directory specified is
not dedicated to the use of the TFTP service, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-850">
+ <title>GEN005160</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37678r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005160</version>
+ <title>Any X Windows host must write .Xauthority files.</title>
+ <description><VulnDiscussion>.Xauthority files ensure the user
is authorized to access specific X Windows host. If .Xauthority files are not used, it may
be possible to obtain unauthorized access to the X Windows
+
host.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000297</ident>
+ <fixtext fixref="F-31811r1_fix">Ensure the X Windows host is
configured to write .Xauthority files into user home directories. Edit the Xaccess file.
Ensure the line writing the .Xauthority file is uncommented.</fixtext>
+ <fix id="F-31811r1_fix" />
+ <check system="C-36865r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for .Xauthority or .xauth files being utilized by
looking for such files in the home directory of a user. Procedure: Verify Xwindows is used
on the system. # egrep "^x:5.*X11" /etc/inittab If no line is returned the boot
+ process does not start Xwindows. If Xwindows is not configured to run, this rule
is not applicable. Look for xauthority files in user home directory. # cd ~someuser # ls
-la|egrep "(\.Xauthority|\.xauth)" If the .Xauthority or .xauth (followed by
+ apparently random characters) files do not exist, ask the SA if the user is using
Xwindows. If the user is utilizing Xwindows and none of these files exist, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-867">
+ <title>GEN006400</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37742r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006400</version>
+ <title>The Network Information System (NIS) protocol must not be
used.</title>
+ <description><VulnDiscussion>Due to numerous security
vulnerabilities existing within NIS, it must not be used. Possible alternative directory
services are NIS+ and
+
LDAP.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><Responsibility>Information
Assurance
Officer</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001435</ident>
+ <fixtext fixref="F-32202r1_fix">Disable the use of NIS/NIS+. Use as
a replacement Kerberos or LDAP.</fixtext>
+ <fix id="F-32202r1_fix" />
+ <check system="C-36937r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Perform the following to determine if NIS is active on the
system: # ps -ef | grep ypbind If NIS is found active on the system, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-899">
+ <title>GEN001440</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37375r1_rule" severity="low"
weight="10.0">
+ <version>GEN001440</version>
+ <title>All interactive users must be assigned a home directory in the
/etc/passwd file.</title>
+ <description><VulnDiscussion>If users do not have a valid home
directory, there is no place for the storage and control of files they
+
own.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31306r1_fix">Assign a home directory to any user
without one.</fixtext>
+ <fix id="F-31306r1_fix" />
+ <check system="C-36062r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Use pwck to verify home directory assignments are present. #
pwck If any user is not assigned a home directory, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-900">
+ <title>GEN001460</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37379r1_rule" severity="low"
weight="10.0">
+ <version>GEN001460</version>
+ <title>All interactive user home directories defined in the /etc/passwd file
must exist.</title>
+ <description><VulnDiscussion>If a user has a home directory
defined that does not exist, the user may be given the / directory, by default, as the
current working directory upon logon. This could create a Denial of Service because the
user
+ would not be able to perform useful tasks in this
+
location.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31310r1_fix">If a user has no home directory,
determine why. If possible, delete accounts without a home directory. If the account is
valid, then create the home directory using the appropriate system administration utility
or
+ manually. For instance: mkdir directoryname; copy the skeleton files into the
directory; chown accountname for the new directory and the skeleton files. Document all
changes.</fixtext>
+ <fix id="F-31310r1_fix" />
+ <check system="C-36066r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Use pwck to verify assigned home directories exist. # pwck
If any user's assigned home directory does not exist, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-901">
+ <title>GEN001480</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37154r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001480</version>
+ <title>All user home directories must have mode 0750 or less
permissive.</title>
+ <description><VulnDiscussion>Excessive permissions on home
directories allow unauthorized access to user
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32772r1_fix">Change the mode of user home
directories to 0750 or less permissive. Procedure (example): # chmod 0750 <home
directory> Note: Application directories are allowed and may need 0755 permissions
(or greater) for
+ correct operation.</fixtext>
+ <fix id="F-32772r1_fix" />
+ <check system="C-37524r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the home directory mode of each user in /etc/passwd.
Procedure: # cut -d: -f6 /etc/passwd|sort|uniq|xargs -n1 ls -ld If a user home
directory's mode is more permissive than 0750, this is a finding. Note: Application
+ directories are allowed and may need 0755 permissions (or greater) for correct
operation.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-902">
+ <title>GEN001500</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37163r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001500</version>
+ <title>All interactive user home directories must be owned by their
respective users.</title>
+ <description><VulnDiscussion>If users do not own their home
directories, unauthorized users could access user
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-1056r2_fix">Change the owner of a user's
home directory to its assigned user. Procedure: # chown <user> <home
directory></fixtext>
+ <fix id="F-1056r2_fix" />
+ <check system="C-37526r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of each user home directory listed in
the /etc/passwd file. Procedure: # cut -d : -f 6 /etc/passwd | xargs -n1 ls -ld If any
user home directory is not owned by the assigned user, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-903">
+ <title>GEN001520</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37168r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001520</version>
+ <title>All interactive user home directories must be group-owned by the home
directory owner's primary group.</title>
+ <description><VulnDiscussion>If the Group Identifier (GID) of
the home directory is not the same as the GID of the user, this would allow unauthorized
access to
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32773r1_fix">Change the group-owner for user
home directories to the primary group of the assigned user. Procedure: Find the primary
group of the user (GID) which is the fourth field of the user entry in /etc/passwd. #
chgrp
+ <GID> <user home directory> Document all
changes.</fixtext>
+ <fix id="F-32773r1_fix" />
+ <check system="C-37527r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership for each user in the /etc/passwd
file. Procedure: # cut -d : -f 6 /etc/passwd | xargs -n1 ls -ld If any user home directory
is not group-owned by the assigned user's primary group, this is a finding. Home
+ directories for application accounts requiring different group ownership must be
documented using site-defined procedures.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-904">
+ <title>GEN001860</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37430r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001860</version>
+ <title>All local initialization files must be owned by the home directorys
user or root.</title>
+ <description><VulnDiscussion>Local initialization files are
used to configure the user's shell environment upon login. Malicious modification of
these files could compromise accounts upon
+
logon.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31196r1_fix">Change the ownership of the startup
and login files in the user's directory to the user or root, as appropriate. Examine
each user's home directory and verify all filenames beginning with "." are
owned by the owner
+ of the directory or root. If they are not, use the chown command to change the
owner to the user and research the reasons why the owners were not assigned as required.
Procedure: # chown username .filename Document all changes.</fixtext>
+ <fix id="F-31196r1_fix" />
+ <check system="C-35939r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of local initialization files.
Procedure: # ls -al /<usershomedirectory>/.login # ls -al
/<usershomedirectory>/.cshrc # ls -al
/<usershomedirectory>/.logout # ls -al
+ /<usershomedirectory>/.profile # ls -al
/<usershomedirectory>/.bash_profile # ls -al
/<usershomedirectory>/.bashrc # ls -al
/<usershomedirectory>/.bash_logout # ls -al
/<usershomedirectory>/.env # ls -al
+ /<usershomedirectory>/.dtprofile # ls -al
/<usershomedirectory>/.dispatch # ls -al
/<usershomedirectory>/.emacs # ls -al
/<usershomedirectory>/.exrc # find /<usershomedirectory>/.dt !
-fstype nfs ! -user
+ <username> -exec ls -ld {} \; If local initialization files are not
owned by the home directory's user, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-905">
+ <title>GEN001880</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37431r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001880</version>
+ <title>All local initialization files must have mode 0740 or less
permissive.</title>
+ <description><VulnDiscussion>Local initialization files are
used to configure the user's shell environment upon login. Malicious modification of
these files could compromise accounts upon
+
logon.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31202r1_fix">Ensure user startup files have
permissions of 0740 or more restrictive. Examine each user's home directory and verify
all file names beginning with "." have access permissions of 0740 or more
restrictive. If they do
+ not, use the chmod command to correct the vulnerability. Procedure: # chmod 0740
.filename Note: The period is part of the file name and is required.</fixtext>
+ <fix id="F-31202r1_fix" />
+ <check system="C-36108r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the modes of local initialization files. Procedure: #
ls -al /<usershomedirectory>/.bashrc # ls -al
/<usershomedirectory>/.bash_login # ls -al
/<usershomedirectory>/.bash_logout # ls -al
+ /<usershomedirectory>/.bash_profile # ls -al
/<usershomedirectory>/.cshrc # ls -al
/<usershomedirectory>/.kshrc # ls -al
/<usershomedirectory>/.login # ls -al
/<usershomedirectory>/.logout # ls -al
+ /<usershomedirectory>/.profile # ls -al
/<usershomedirectory>/.tcshrc # ls -al
/<usershomedirectory>/.env # ls -al
/<usershomedirectory>/.dtprofile (permissions should be 0755) # ls -al
+ /<usershomedirectory>/.dispatch # ls -al
/<usershomedirectory>/.emacs # ls -al
/<usershomedirectory>/.exrc # find /<usershomedirectory>/.dt !
-fstype nfs \( -perm -0002 -o -perm -0020 \) -exec ls -ld {} \; (permissions not
+ to be more permissive than 0755) If local initialization files are more
permissive than 0740 or the .dt directory is more permissive than 0755 or the .dtprofile
file is more permissive than 0755, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-906">
+ <title>GEN001580</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37192r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001580</version>
+ <title>All run control scripts must have mode 0755 or less
permissive.</title>
+ <description><VulnDiscussion>If the startup files are writable
by other users, they could modify the startup files to insert malicious commands into the
startup
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32777r1_fix">Ensure all system startup files
have mode 0755 or less permissive. Examine the "rc" files, and all files in the
rc1.d (rc2.d, and so on) directories, and in the /etc/init.d directory to ensure they are
not
+ world-writable. If they are world-writable, use the chmod command to correct the
vulnerability and research why they are world-writable. Procedure: # chmod 755
<startup file></fixtext>
+ <fix id="F-32777r1_fix" />
+ <check system="C-37531r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check run control script modes. # cd /etc # ls -lL rc* # cd
/etc/init.d # ls -l If any run control script has a mode more permissive than 0755, this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-907">
+ <title>GEN001600</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37202r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001600</version>
+ <title>Run control scripts' executable search paths must contain only
absolute paths.</title>
+ <description><VulnDiscussion>The executable search path
(typically the PATH environment variable) contains a list of directories for the shell to
search to find executables. If this path includes the current working directory or other
+ relative paths, executables in these directories may be executed instead of system
commands. This variable is formatted as a colon-separated list of directories. If there is
an empty entry, such as a leading or trailing colon, or two consecutive
+ colons, this is interpreted as the current working directory. Paths starting with a
slash (/) are absolute
+
paths.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32779r1_fix">Edit the run control script and
remove the relative path entry from the executable search path variable.</fixtext>
+ <fix id="F-32779r1_fix" />
+ <check system="C-37533r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify run control scripts' library search paths. # grep
-r PATH /etc/rc* /etc/init.d This variable is formatted as a colon-separated list of
directories. If there is an empty entry, such as a leading or trailing colon, or two
+ consecutive colons, this is a finding. If an entry begins with a character other
than a slash (/), this is a relative path, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-910">
+ <title>GEN001640</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-38154r1_rule" severity="high"
weight="10.0">
+ <version>GEN001640</version>
+ <title>Run control scripts must not execute world-writable programs or
scripts.</title>
+ <description><VulnDiscussion>World-writable files could be
modified accidentally or maliciously to compromise system
+
integrity.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-1064r2_fix">Remove the world-writable permission
from programs or scripts executed by run control scripts. Procedure: # chmod o-w
<program or script executed from run control script></fixtext>
+ <fix id="F-1064r2_fix" />
+ <check system="C-402r6_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions on the files or scripts executed from
system startup scripts to see if they are world-writable. Create a list of all potential
run command level scripts. ls -l /sbin/init.d/* | tr '\011' ' ' | tr -s
' ' | cut
+ -f 9,9 -d " " Create a list of world writeable files. # find / -perm
-002 -type f >> worldWriteableFileList Determine if any of the world
writeable files in worldWriteableFileList are called from the run command level scripts.
Note:
+ Depending upon the number of scripts vs world writeable files, it may be easier
to inspect the scripts manually. # more `ls -l /sbin/init.d/* | tr '\011' '
' | tr -s ' ' | cut -f 9,9 -d "` If any system startup script executes
any file or script
+ that is world-writable, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-913">
+ <title>GEN002000</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37436r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002000</version>
+ <title>There must be no .netrc files on the system.</title>
+ <description><VulnDiscussion>Unencrypted passwords for remote
FTP servers may be stored in .netrc files. Policy requires passwords be encrypted in
storage and not used in access
+
scripts.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2, IAIA-1, IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000196</ident>
+ <fixtext fixref="F-31295r1_fix">Remove the .netrc file(s).
Procedure: # find / -name .netrc # rm <.netrc file></fixtext>
+ <fix id="F-31295r1_fix" />
+ <check system="C-36051r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system for the existence of any .netrc files.
Procedure: # find / -name .netrc If any .netrc file exists, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-914">
+ <title>GEN001540</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37175r1_rule" severity="low"
weight="10.0">
+ <version>GEN001540</version>
+ <title>All files and directories contained in interactive user home
directories must be owned by the home directory's owner.</title>
+ <description><VulnDiscussion>If users do not own the files in
their directories, unauthorized users may be able to access them. Additionally, if files
are not owned by the user, this could be an indication of system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><Responsibility>Information
Assurance Officer</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32774r1_fix">Change the ownership of files and
directories in user home directories to the owner of the home directory. Procedure: #
chown accountowner filename</fixtext>
+ <fix id="F-32774r1_fix" />
+ <check system="C-37528r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>For each user in the /etc/passwd file, check for the
presence of files and directories within the user's home directory not owned by the
home directory owner. Procedure: # find /<usershomedirectory> ! -fstype nfs
! -user
+ <username> ! \( -name .bashrc -o -name .bash_login -o -name
.bash_logout -o -name .bash_profile -o -name .cshrc -o -name .kshrc -o -name .login -o
-name .logout -o -name .profile -o -name .tcshrc -o -name .env -o -name .dtprofile -o
-name
+ .dispatch -o -name .emacs -o -name .exrc \) -exec ls -ld {} \; If user home
directories contain files or directories not owned by the home directory owner, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-915">
+ <title>GEN001560</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37183r1_rule" severity="low"
weight="10.0">
+ <version>GEN001560</version>
+ <title>All files and directories contained in user home directories must have
mode 0750 or less permissive.</title>
+ <description><VulnDiscussion>Excessive permissions allow
unauthorized access to user files.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>Information
+ Assurance
Officer</Responsibility><Responsibility>System
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32775r1_fix">Change the mode of files and
directories within user home directories to 0750. Procedure: # chmod 0750 filename
Document all changes.</fixtext>
+ <fix id="F-32775r1_fix" />
+ <check system="C-37529r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>For each user in the /etc/passwd file, check for files and
directories with a mode more permissive than 0750. Procedure: # find
/<usershomedirectory> ! -fstype nfs ! \( -name .bashrc -o -name .bash_login
-o -name .bash_logout
+ -o -name .bash_profile -o -name .cshrc -o -name .kshrc -o -name .login -o -name
.logout -o -name .profile -o -name .tcshrc -o -name .env -o -name .dtprofile -o -name
.dispatch -o -name .emacs -o -name .exrc \) \( -perm -0001 -o -perm -0002 -o
+ -perm -0004 -o -perm -0020 -o -perm -2000 -o -perm -4000 \) -exec ls -ld {} \; If
user home directories contain files or directories more permissive than 0750, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-916">
+ <title>GEN002120</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37390r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002120</version>
+ <title>The /etc/shells (or equivalent) file must exist.</title>
+ <description><VulnDiscussion>The shells file (or equivalent)
lists approved default shells. It helps provide layered defense to the security approach
by ensuring users cannot change their default shell to an unauthorized unsecure
+
shell.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31321r1_fix">Create a /etc/shells file
containing a list of valid system shells. Consult vendor documentation for an appropriate
list of system shells. Procedure: # echo "/bin/bash" >>
/etc/shells # echo "/bin/csh" >>
+ /etc/shells (Repeat as necessary for other shells.)</fixtext>
+ <fix id="F-31321r1_fix" />
+ <check system="C-36077r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify /etc/shells exists. # ls -l /etc/shells If the file
does not exist, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-917">
+ <title>GEN002140</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37393r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002140</version>
+ <title>All shells referenced in /etc/passwd must be listed in the /etc/shells
file, except any shells specified for the purpose of preventing logins.</title>
+ <description><VulnDiscussion>The shells file lists approved
default shells. It helps provide layered defense to the security approach by ensuring
users cannot change their default shell to an unauthorized unsecure
+
shell.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31324r2_fix">Use the "chsh" utility or
edit the /etc/passwd file and correct the error by changing the default shell of the
account in error to an acceptable shell name contained in the /etc/shells file. Example: #
chsh -s
+ /bin/bash testuser</fixtext>
+ <fix id="F-31324r2_fix" />
+ <check system="C-36080r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Confirm the login shells referenced in the /etc/passwd file
are listed in the /etc/shells file. Procedure: # for USHELL in `cut -d: -f7 /etc/passwd`;
do if [ $(grep -c "${USHELL}" /etc/shells) == 0 ]; then echo "${USHELL} not
in
+ /etc/shells"; fi; done The /usr/bin/false, /bin/false, /dev/null,
/sbin/nologin, /bin/sync, /sbin/halt, /sbin/shutdown, (and equivalents), and sdshell will
be considered valid shells for use in the /etc/passwd file, but will not be listed in the
+ /etc/shells file. If a shell referenced in /etc/passwd is not listed in the
shells file, excluding the above mentioned shells, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-918">
+ <title>GEN000760</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37314r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000760</version>
+ <title>Accounts must be locked upon 35 days of inactivity.</title>
+ <description><VulnDiscussion>On some systems, accounts with
disabled passwords still allow access using rcp, remsh, or rlogin through equivalent
remote hosts. All that is required is the remote host name and the user name match an
entry in a
+ hosts.equiv file and have a .rhosts file in the user directory. Using a shell
called /bin/false or /dev/null (or an equivalent) will add a layered defense.
Non-interactive accounts on the system, such as application accounts, may be documented
+
exceptions.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>IAAC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000017</ident>
+ <fixtext fixref="F-31259r2_fix">All inactive accounts will have
/sbin/nologin (or an equivalent), as the default shell in the /etc/passwd file and have
the password disabled. Examine the user accounts using the "last" command. Note
the date of last
+ login for each account. If any (other than system and application accounts) exceed
35 days or the maximum number of days set by the site, not to exceed 35 days, then disable
the accounts using system-config-users tool. Alternately place a shell
+ field of /sbin/nologin /bin/false or /dev/null in the passwd file entry for the
account.</fixtext>
+ <fix id="F-31259r2_fix" />
+ <check system="C-36007r3_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Indications of inactive accounts are those that have no
entries in the "last" log. Check the date in the "last" log to verify
it is within the last 35 days or the maximum numbers of days set by the site if more
restrictive. If an
+ inactive account is not disabled via an entry in the password field in the
/etc/passwd or /etc/shadow (or equivalent), check the /etc/passwd file to check if the
account has a valid shell. The passwd command can also be used to list a status for
+ an account. For example, the following may be used to provide status information
on each local account: # cut -d: -f1 /etc/passwd | xargs -n1 passwd -S If an inactive
account is found not disabled, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-921">
+ <title>GEN002200</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37396r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002200</version>
+ <title>All shell files must be owned by root or bin.</title>
+ <description><VulnDiscussion>If shell files are owned by users
other than root or bin, they could be modified by intruders or malicious users to perform
unauthorized
+
actions.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31328r1_fix">Change the ownership of the shell
with incorrect ownership. # chown root <shell></fixtext>
+ <fix id="F-31328r1_fix" />
+ <check system="C-36081r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of the system shells. # cat /etc/shells
| xargs -n1 ls -l If any shell is not owned by root or bin, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-922">
+ <title>GEN002220</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37403r1_rule" severity="high"
weight="10.0">
+ <version>GEN002220</version>
+ <title>All shell files must have mode 0755 or less permissive.</title>
+ <description><VulnDiscussion>Shells with world/group write
permissions give the ability to maliciously modify the shell to obtain unauthorized
+
access.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31334r1_fix">Change the mode of the shell. #
chmod 0755 <shell></fixtext>
+ <fix id="F-31334r1_fix" />
+ <check system="C-36087r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If /etc/shells exists, check the group ownership of each
shell referenced. # cat /etc/shells | xargs -n1 ls -l Otherwise, check any shells found on
the system. # find / -name "*sh" | xargs -n1 ls -l If a shell has a mode more
+ permissive than 0755, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-923">
+ <title>GEN002260</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37543r1_rule" severity="low"
weight="10.0">
+ <version>GEN002260</version>
+ <title>The system must be checked for extraneous device files at least
weekly.</title>
+ <description><VulnDiscussion>If an unauthorized device is
allowed to exist on the system, there is the possibility the system may perform
unauthorized
+
operations.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>Information
+ Assurance
Officer</Responsibility><Responsibility>System
Administrator</Responsibility><IAControls>DCSW-1,
ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000318</ident>
+ <fixtext fixref="F-31458r1_fix">Establish a weekly automated or
manual process to create a list of device files on the system and determine if any files
have been added, moved, or deleted since the last list was generated. A list of device
files
+ can be generated with this command: # find / -type b -o -type c >
device-file-list</fixtext>
+ <fix id="F-31458r1_fix" />
+ <check system="C-36198r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Ask the SA for the automated or manual process used to check
for extraneous device files. Review the process to determine if the system is checked for
extraneous device files on a weekly basis. If no weekly automated or manual
+ process is in place, this is a finding. If the process is not identifying
extraneous device files, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-924">
+ <title>GEN002280</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37553r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002280</version>
+ <title>Device files and directories must only be writable by users with a
system account or as configured by the vendor.</title>
+ <description><VulnDiscussion>System device files in writable
directories could be modified, removed, or used by an unprivileged user to control system
+
hardware.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2, ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31464r1_fix">Remove the world-writable
permission from the device file(s). Procedure: # chmod o-w <device file>
Document all changes.</fixtext>
+ <fix id="F-31464r1_fix" />
+ <check system="C-36204r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Find all world-writable device files existing anywhere on
the system. Procedure: # find / -perm -2 -a \( -type b -o -type c \) > devicelist
Check the permissions on the directories above subdirectories containing device files.
+ If any of the device files or their parent directories are world-writable,
excepting device files specifically intended to be world-writable such as /dev/null, this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-925">
+ <title>GEN002300</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37558r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002300</version>
+ <title>Device files used for backup must only be readable and/or writable by
root or the backup user.</title>
+ <description><VulnDiscussion>System backups could be
accidentally or maliciously overwritten and destroy the ability to recover the system if a
compromise should occur. Unauthorized users could also copy system
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><Responsibility>Information
Assurance Officer</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31469r1_fix">Use the chmod command to remove the
world-writable bit from the backup device files. Procedure: # chmod o-w <back
device filename> Document all changes.</fixtext>
+ <fix id="F-31469r1_fix" />
+ <check system="C-36209r4_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system for world-writable device files. Procedure:
# find / -perm -2 -a \( -type b -o -type c \) -exec ls -ld {} \; Ask the SA to identify
any device files used for backup purposes. If any device file(s) used for backup
+ are writable by users other than root or the designated backup user, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-928">
+ <title>GEN005740</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37936r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005740</version>
+ <title>The Network File System (NFS) export configuration file must be owned
by root.</title>
+ <description><VulnDiscussion>Failure to give ownership of the
NFS export configuration file to root provides the designated owner and possible
unauthorized users with the potential to change system configuration which could weaken
the
+ system's security
+
posture.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32428r1_fix">Change the owner of the exports
file to root. Example: # chown root /etc/exports</fixtext>
+ <fix id="F-32428r1_fix" />
+ <check system="C-37200r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the owner of the exports file. Example: # ls -lL
/etc/exports If the export configuration file is not owned by root, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-929">
+ <title>GEN005760</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37943r1_rule" severity="low"
weight="10.0">
+ <version>GEN005760</version>
+ <title>The Network File System (NFS) export configuration file must have mode
0644 or less permissive.</title>
+ <description><VulnDiscussion>Excessive permissions on the NFS
export configuration file could allow unauthorized modification of the file, which could
result in Denial of Service to authorized NFS exports and the creation of additional
+ unauthorized
+
exports.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2, ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32434r1_fix"># chmod 0644
/etc/exports</fixtext>
+ <fix id="F-32434r1_fix" />
+ <check system="C-37223r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># ls -lL /etc/exports If the file has a mode more permissive
than 0644, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-931">
+ <title>GEN005800</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37849r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005800</version>
+ <title>All Network File System (NFS) exported system files and system
directories must be owned by root.</title>
+ <description><VulnDiscussion>Failure to give ownership of
sensitive files or directories to root provides the designated owner and possible
unauthorized users with the potential to access sensitive information or change system
configuration
+ which could weaken the system's security
+
posture.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32313r1_fix">Change the ownership of exported
file systems not owned by root. Procedure: # chown root
<path></fixtext>
+ <fix id="F-32313r1_fix" />
+ <check system="C-37045r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for NFS exported file systems. Procedure: # cat
/etc/exports For each file system displayed, check the ownership. # ls -lLa
<exported file system path> If the files and directories are not owned by
root, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-932">
+ <title>GEN005820</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37854r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005820</version>
+ <title>The Network File System (NFS) anonymous UID and GID must be configured
to values without permissions.</title>
+ <description><VulnDiscussion>When an NFS server is configured
to deny remote root access, a selected UID and GID are used to handle requests from the
remote root user. The UID and GID should be chosen from the system to provide the
+ appropriate level of non-privileged
+
access.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECSC-1,
IAIA-1, IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000062</ident>
+ <fixtext fixref="F-32316r1_fix">Edit "/etc/exports" and
set the "anonuid=-1" and "anongid=-1" options for exports lacking it.
Re-export the filesystems.</fixtext>
+ <fix id="F-32316r1_fix" />
+ <check system="C-37049r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check if the 'anonuid' and 'anongid' options
are set correctly for exported file systems. List exported filesystems: # exportfs -v Each
of the exported file systems should include an entry for the 'anonuid=' and
'anongid=' options
+ set to "-1" or an equivalent (60001, 65534, or 65535). If appropriate
values for 'anonuid' or 'anongid' are not set, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-933">
+ <title>GEN005840</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37857r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005840</version>
+ <title>The Network File System (NFS) server must be configured to restrict
file system access to local hosts.</title>
+ <description><VulnDiscussion>The NFS access option limits user
access to the specified level. This assists in protecting exported file systems. If access
is not restricted, unauthorized hosts may be able to access the system's NFS
+
exports.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32328r1_fix">Edit /etc/exports and add ro and/or
rw options (as appropriate) specifying a list of hosts or networks which are permitted
access. Re-export the file systems.</fixtext>
+ <fix id="F-32328r1_fix" />
+ <check system="C-37061r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions on exported NFS file systems.
Procedure: # exportfs -v If the exported file systems do not contain the 'rw' or
'ro' options specifying a list of hosts or networks, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-935">
+ <title>GEN005880</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37859r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005880</version>
+ <title>The Network File System (NFS) server must not allow remote root
access.</title>
+ <description><VulnDiscussion>If the NFS server allows root
access to local file systems from remote hosts, this access could be used to compromise
the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>Information
+ Assurance
Officer</Responsibility><Responsibility>System
Administrator</Responsibility><Responsibility>Information
Assurance
Manager</Responsibility><IAControls>EBRP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32333r1_fix">Edit the "/etc/exports"
file and add "root_squash" (or "all_squash") and remove
"no_root_squash".</fixtext>
+ <fix id="F-32333r1_fix" />
+ <check system="C-37065r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>List the exports. # cat /etc/exports If any export contains
"no_root_squash" or does not contain "root_squash" or
"all_squash", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-936">
+ <title>GEN005900</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37860r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005900</version>
+ <title>The "nosuid" option must be enabled on all Network File
System (NFS) client mounts.</title>
+ <description><VulnDiscussion>Enabling the nosuid mount option
prevents the system from granting owner or group-owner privileges to programs with the
suid or sgid bit set. If the system does not restrict this access, users with
unprivileged
+ access to the local system may be able to acquire privileged access by executing
suid or sgid files located on the mounted NFS file
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>Information
+ Assurance
Officer</Responsibility><Responsibility>Information Assurance
Manager</Responsibility><Responsibility>System
Administrator</Responsibility><IAControls>ECPA-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32336r1_fix">Edit "/etc/fstab" and add
the "nosuid" option for all NFS file systems. Remount the NFS file systems to
make the change take effect.</fixtext>
+ <fix id="F-32336r1_fix" />
+ <check system="C-37069r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system for NFS mounts not using the
"nosuid" option. Procedure: # mount -v | grep " type nfs " | egrep -v
"nosuid" If the mounted file systems do not have the "nosuid" option,
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-940">
+ <title>GEN006580</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37756r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006580</version>
+ <title>The system must use an access control program.</title>
+ <description><VulnDiscussion>Access control programs (such as
TCP_WRAPPERS) provide the ability to enhance system security
+
posture.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>EBRU-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32218r1_fix">Install and configure the
tcp_wrappers package.</fixtext>
+ <fix id="F-32218r1_fix" />
+ <check system="C-36953r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>The tcp_wrappers package is provided with the RHEL
distribution. Other access control programs may be available but will need to be checked
manually. Determine if tcp_wrappers is installed. # rpm -qa | grep tcp_wrappers If no
+ package is listed, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-941">
+ <title>GEN006600</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37757r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006600</version>
+ <title>The system's access control program must log each system access
attempt.</title>
+ <description><VulnDiscussion>If access attempts are not logged,
then multiple attempts to log on to the system by an unauthorized user may go
+
undetected.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-32219r1_fix">Configure the access restriction
program to log every access attempt. Ensure the implementation instructions for
tcp_wrappers are followed so system access attempts are recorded to the system log files.
If an
+ alternate application is used, it must support this function.</fixtext>
+ <fix id="F-32219r1_fix" />
+ <check system="C-36954r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>The tcp_wrappers package is provided with the RHEL
distribution. Other access control programs may be available but will need to be checked
manually. Normally, tcpd logs to the mail facility in "/etc/syslog.conf".
Determine if
+ syslog is configured to log events by tcpd. Procedure: # more /etc/syslog.conf
Look for entries similar to the following: mail.debug /var/adm/maillog mail.none
/var/adm/maillog mail.* /var/log/mail authpriv.info /var/log/messages The above
+ entries would indicate mail alerts are being logged. If no entries for mail
exist, then tcpd is not logging this is a finding. If an alternate access control program
is used and it does not provide logging of access attempts, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-974">
+ <title>GEN002960</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27320r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002960</version>
+ <title>Access to the cron utility must be controlled using the cron.allow
and/or cron.deny file(s).</title>
+ <description><VulnDiscussion>The cron facility allows users to
execute recurring jobs on a regular and unattended basis. The cron.allow file designates
accounts allowed to enter and execute jobs using the cron facility. If neither cron.allow
+ nor cron.deny exists, then any account may use the cron facility. This may open the
facility up for abuse by system intruders and malicious
+
users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-24560r1_fix">Create /etc/cron.allow and/or
/etc/cron.deny with appropriate content.</fixtext>
+ <fix id="F-24560r1_fix" />
+ <check system="C-28457r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for the existence of the cron.allow and cron.deny
files. # ls -lL /etc/cron.allow # ls -lL /etc/cron.deny If neither file exists, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-975">
+ <title>GEN002980</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27326r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002980</version>
+ <title>The cron.allow file must have mode 0600 or less
permissive.</title>
+ <description><VulnDiscussion>A readable and/or writable
cron.allow file by users other than root could allow potential intruders and malicious
users to use the file contents to help discern information, such as who is allowed to
execute cron
+ programs, which could be harmful to overall system and network
+
security.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-24566r1_fix">Change the mode of the cron.allow
file to 0600. Procedure: # chmod 0600 /etc/cron.allow</fixtext>
+ <fix id="F-24566r1_fix" />
+ <check system="C-28462r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check mode of the cron.allow file. Procedure: # ls -lL
/etc/cron.allow If the file has a mode more permissive than 0600, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-976">
+ <title>GEN003000</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37384r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003000</version>
+ <title>Cron must not execute group-writable or world-writable
programs.</title>
+ <description><VulnDiscussion>If cron executes group-writable or
world-writable programs, there is a possibility that unauthorized users could manipulate
the programs with malicious intent. This could compromise system and network
+
security.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCSL-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31315r1_fix">Remove the world-writable and
group-writable permissions from the cron program file(s) identified. # chmod go-w
<cron program file></fixtext>
+ <fix id="F-31315r1_fix" />
+ <check system="C-36071r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>List all cronjobs on the system. Procedure: # ls
/var/spool/cron # ls /etc/cron.d /etc/crontab /etc/cron.daily /etc/cron.hourly
/etc/cron.monthly /etc/cron.weekly or # ls /etc/cron*|grep -v deny If cron jobs exist
under any of the
+ above directories, use the following command to search for programs executed by
cron: # more <cron job file> Perform a long listing of each program file
found in the cron file to determine if the file is group-writable or world-writable. #
+ ls -la <cron program file> If cron executes group-writable or
world-writable files, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-977">
+ <title>GEN003020</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37388r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003020</version>
+ <title>Cron must not execute programs in, or subordinate to, world-writable
directories.</title>
+ <description><VulnDiscussion>If cron programs are located in or
subordinate to world-writable directories, they become vulnerable to removal and
replacement by malicious users or system
+
intruders.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCSL-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31318r1_fix">Remove the world-writable
permission from the cron program directories identified. Procedure: # chmod o-w
<cron program directory></fixtext>
+ <fix id="F-31318r1_fix" />
+ <check system="C-36074r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>List all cronjobs on the system. Procedure: # ls
/var/spool/cron # ls /etc/cron.d /etc/crontab /etc/cron.daily /etc/cron.hourly
/etc/cron.monthly /etc/cron.weekly or # ls /etc/cron*|grep -v deny If cron jobs exist
under any of the
+ above directories, use the following command to search for programs executed by
at: # more <cron job file> Perform a long listing of each directory
containing program files found in the cron file to determine if the directory is
+ world-writable. # ls -ld <cron program directory> If cron executes
programs in world-writable directories, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-978">
+ <title>GEN003080</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37466r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003080</version>
+ <title>Crontab files must have mode 0600 or less permissive, and files in
cron script directories must have mode 0700 or less permissive.</title>
+ <description><VulnDiscussion>To protect the integrity of
scheduled system jobs and prevent malicious modification to these jobs, crontab files must
be
+
secured.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31377r1_fix">Change the mode of the crontab
files. # chmod 0600 /var/spool/cron/* /etc/cron.d/* /etc/crontab</fixtext>
+ <fix id="F-31377r1_fix" />
+ <check system="C-36132r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the crontab files. # ls -lL
/var/spool/cron/ # ls -lL /etc/cron.d/ # ls -lL /etc/crontab If any crontab file has a
mode more permissive than 0600, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-979">
+ <title>GEN003100</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37470r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003100</version>
+ <title>Cron and crontab directories must have mode 0755 or less
permissive.</title>
+ <description><VulnDiscussion>To protect the integrity of
scheduled system jobs and to prevent malicious modification to these jobs, crontab files
must be
+
secured.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31381r1_fix">Change the mode of the crontab
directories. # chmod 0755 <crontab directory></fixtext>
+ <fix id="F-31381r1_fix" />
+ <check system="C-36136r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the crontab directories. Procedure: # ls
-ld /var/spool/cron # ls -ld /etc/cron.d /etc/crontab /etc/cron.daily /etc/cron.hourly
/etc/cron.monthly /etc/cron.weekly or # ls -ld /etc/cron*|grep -v deny If the mode of
+ any of the crontab directories is more permissive than 0755, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-980">
+ <title>GEN003120</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37474r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003120</version>
+ <title>Cron and crontab directories must be owned by root or
bin.</title>
+ <description><VulnDiscussion>Incorrect ownership of the cron or
crontab directories could permit unauthorized users the ability to alter cron jobs and run
automated jobs as privileged users. Failure to give ownership of cron or crontab
+ directories to root or to bin provides the designated owner and unauthorized users
with the potential to access sensitive information or change the system configuration
which could weaken the system's security
+
posture.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31386r1_fix">Change the mode of the crontab
directories. # chown root <crontab directory></fixtext>
+ <fix id="F-31386r1_fix" />
+ <check system="C-36140r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the owner of the crontab directories. Procedure: # ls
-ld /var/spool/cron # ls -ld /etc/cron.d /etc/crontab /etc/cron.daily /etc/cron.hourly
/etc/cron.monthly /etc/cron.weekly or # ls -ld /etc/cron*|grep -v deny If the owner
+ of any of the crontab directories is not root or bin, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-981">
+ <title>GEN003140</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37476r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003140</version>
+ <title>Cron and crontab directories must be group-owned by root, sys, bin or
cron.</title>
+ <description><VulnDiscussion>To protect the integrity of
scheduled system jobs and to prevent malicious modification to these jobs, crontab files
must be secured. Failure to give group-ownership of cron or crontab directories to a
system
+ group provides the designated group and unauthorized users with the potential to
access sensitive information or change the system configuration which could weaken the
system's security
+
posture.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31388r1_fix">Change the group owner of cron and
crontab directories. # chgrp root <crontab directory></fixtext>
+ <fix id="F-31388r1_fix" />
+ <check system="C-36142r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group owner of cron and crontab directories.
Procedure: # ls -ld /var/spool/cron # ls -ld /etc/cron.d /etc/crontab /etc/cron.daily
/etc/cron.hourly /etc/cron.monthly /etc/cron.weekly or # ls -ld /etc/cron*|grep -v deny
If
+ a directory is not group-owned by root, sys, bin, or cron, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-982">
+ <title>GEN003160</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27352r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003160</version>
+ <title>Cron logging must be implemented.</title>
+ <description><VulnDiscussion>Cron logging can be used to trace
the successful or unsuccessful execution of cron jobs. It can also be used to spot
intrusions into the use of the cron facility by unauthorized and malicious users.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-31389r1_fix">Edit /etc/syslog.conf and setup
cron logging.</fixtext>
+ <fix id="F-31389r1_fix" />
+ <check system="C-28494r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># grep cron /etc/syslog.conf If cron logging is not
configured, this is a finding. Check the configured cron log file found in the cron entry
of /etc/syslog (normally /var/log/cron). # ls -lL /var/log/cron If this file does not
+ exist, or is older than the last cron job, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-983">
+ <title>GEN003180</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27357r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003180</version>
+ <title>The cronlog file must have mode 0600 or less
permissive.</title>
+ <description><VulnDiscussion>Cron logs contain reports of
scheduled system activities and must be protected from unauthorized access or
manipulation.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECLP-1,
ECTP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-24602r1_fix">Change the mode of the cron log
file. # chmod 0600 /var/log/cron</fixtext>
+ <fix id="F-24602r1_fix" />
+ <check system="C-28501r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the cron log file. Procedure: Check the
configured cron log file found in the cron entry in /etc/syslog (normally /var/log/cron).
# grep cron /etc/syslog.conf # ls -lL /var/log/cron If the mode is more permissive
+ than 0600, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-984">
+ <title>GEN003280</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37512r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003280</version>
+ <title>Access to the "at" utility must be controlled via the
at.allow and/or at.deny file(s).</title>
+ <description><VulnDiscussion>The "at" facility
selectively allows users to execute jobs at deferred times. It is usually used for
one-time jobs. The at.allow file selectively allows access to the "at" facility.
If there is no at.allow file,
+ there is no ready documentation of who is allowed to submit "at"
+
jobs.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31419r1_fix">Create at.allow and/or at.deny
files containing appropriate lists of users to be allowed or denied access to the
"at" daemon.</fixtext>
+ <fix id="F-31419r1_fix" />
+ <check system="C-36168r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for the existence of at.allow and at.deny files. # ls
-lL /etc/at.allow # ls -lL /etc/at.deny If neither file exists, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-985">
+ <title>GEN003300</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37516r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003300</version>
+ <title>The at.deny file must not be empty if it exists.</title>
+ <description><VulnDiscussion>On some systems, if there is no
at.allow file and there is an empty at.deny file, then the system assumes everyone has
permission to use the "at" facility. This could create an insecure setting in
the case of
+ malicious users or system
+
intruders.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><Responsibility>Information
Assurance
Officer</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31426r1_fix">Add appropriate users to the
at.deny file, or remove the empty at.deny file if an at.allow file
exists.</fixtext>
+ <fix id="F-31426r1_fix" />
+ <check system="C-36175r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># more /etc/at.deny If the at.deny file exists and is empty,
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-986">
+ <title>GEN003320</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37517r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003320</version>
+ <title>Default system accounts (with the exception of root) must not be
listed in the at.allow file or must be included in the at.deny file if the at.allow file
does not exist.</title>
+ <description><VulnDiscussion>Default accounts, such as bin,
sys, adm, uucp, daemon, and others, should never have access to the "at"
facility. This would create a possible vulnerability open to intruders or malicious
+
users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECPA-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31427r1_fix">Remove the default accounts (such
as bin, sys, adm, and others, traditionally UID less than 500) from the at.allow
file.</fixtext>
+ <fix id="F-31427r1_fix" />
+ <check system="C-36177r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># more /etc/at.allow If default accounts (such as bin, sys,
adm, and others) are listed in the at.allow file, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-987">
+ <title>GEN003340</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37518r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003340</version>
+ <title>The at.allow file must have mode 0600 or less
permissive.</title>
+ <description><VulnDiscussion>Permissions more permissive than
0600 (read, write and execute for the owner) may allow unauthorized or malicious access to
the at.allow and/or at.deny
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31428r1_fix">Change the mode of the at.allow
file. # chmod 0600 /etc/at.allow</fixtext>
+ <fix id="F-31428r1_fix" />
+ <check system="C-36178r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the at.allow file. # ls -lL /etc/at.allow
If the at.allow file has a mode more permissive than 0600, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-988">
+ <title>GEN003360</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37519r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003360</version>
+ <title>The "at" daemon must not execute group-writable or
world-writable programs.</title>
+ <description><VulnDiscussion>If the "at" facility
executes world-writable or group-writable programs, it is possible for the programs to be
accidentally or maliciously changed or replaced without the owner's intent or
knowledge. This would
+ cause a system security
+
breach.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCSL-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31429r1_fix">Remove group-write and world-write
permissions from files executed by at jobs. Procedure: # chmod go-w
<file></fixtext>
+ <fix id="F-31429r1_fix" />
+ <check system="C-36179r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>List the "at" jobs on the system. Procedure: # ls
-la /var/spool/at For each "at" job file, determine which programs are executed.
Procedure: # more <at job file> Check the each program executed by
"at" for group- or
+ world-writable permissions. Procedure: # ls -la <at program file>
If "at" executes group or world-writable programs, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-989">
+ <title>GEN003380</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37520r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003380</version>
+ <title>The "at" daemon must not execute programs in, or subordinate
to, world-writable directories.</title>
+ <description><VulnDiscussion>If "at" programs are
located in, or subordinate, to world-writable directories, they become vulnerable to
removal and replacement by malicious users or system
+
intruders.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCSL-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31432r1_fix">Remove the world-writable
permission from directories containing programs executed by "at". Procedure: #
chmod o-w <at program directory></fixtext>
+ <fix id="F-31432r1_fix" />
+ <check system="C-36180r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>List any "at" jobs on the system. Procedure: # ls
/var/spool/at For each "at" job, determine which programs are executed by
"at." Procedure: # more <at job file> Check the directory
containing each program executed by "at"
+ for world-writable permissions. Procedure: # ls -la <at program file
directory> If "at" executes programs in world-writable directories, this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-993">
+ <title>GEN005300</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37689r1_rule" severity="high"
weight="10.0">
+ <version>GEN005300</version>
+ <title>SNMP communities, users, and passphrases must be changed from the
default.</title>
+ <description><VulnDiscussion>Whether active or not, default
SNMP passwords, users, and passphrases must be changed to maintain security. If the
service is running with the default authenticators, then anyone can gather data about the
system
+ and the network and use the information to potentially compromise the integrity of
the system or
+
network(s).</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>IAAC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000178</ident>
+ <fixtext fixref="F-31908r1_fix">Change the default passwords. To
change them, locate the file snmpd.conf. Edit the file. Locate the line
system-group-read-community which has a default password of "public" and make
the password something more
+ secure and less guessable. Do the same for the lines reading
system-group-write-community, read-community, write-community, trap and trap-community.
Read the information in the file carefully. The trap is defining who to send traps to,
for
+ instance, by default. It is not a password, but the name of a
host.</fixtext>
+ <fix id="F-31908r1_fix" />
+ <check system="C-36883r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the SNMP configuration for default passwords.
Procedure: Examine the default install location /etc/snmp/snmpd.conf or: # find / -name
snmpd.conf # more <snmpd.conf file> Identify any community names or user
password
+ configuration. If any community name or password is set to a default value such
as "public", "private", "snmp-trap", or
"password", or any value which does not meet DISA password requirements, this is
a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-994">
+ <title>GEN005320</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37696r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005320</version>
+ <title>The snmpd.conf file must have mode 0600 or less
permissive.</title>
+ <description><VulnDiscussion>The snmpd.conf file contains
authenticators and must be protected from unauthorized access and
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31997r1_fix">Change the mode of the SNMP daemon
configuration file to 0600. Procedure: # chmod 0600
<snmpd.conf></fixtext>
+ <fix id="F-31997r1_fix" />
+ <check system="C-36892r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the SNMP daemon configuration file.
Procedure: Examine the default install location /etc/snmp/snmpd.conf or: # find / -name
snmpd.conf # ls -lL <snmpd.conf file> If the snmpd.conf file has a mode
more
+ permissive than 0600, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-995">
+ <title>GEN005340</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37698r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005340</version>
+ <title>Management Information Base (MIB) files must have mode 0640 or less
permissive.</title>
+ <description><VulnDiscussion>The ability to read the MIB file
could impart special knowledge to an intruder or malicious user about the ability to
extract compromising information about the system or
+
network.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32000r1_fix">Change the mode of MIB files to
0640. Procedure: # chmod 0640 <mib file></fixtext>
+ <fix id="F-32000r1_fix" />
+ <check system="C-36893r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the modes for all Management Information Base (MIB)
files on the system. Procedure: # find / -name *.mib # ls -lL <mib file> Any
file returned with a mode 0640 or less permissive is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1010">
+ <title>GEN002480</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37645r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002480</version>
+ <title>Public directories must be the only world-writable directories and
world-writable files must be located only in public directories.</title>
+ <description><VulnDiscussion>World-writable files and
directories make it easy for a malicious user to place potentially compromising files on
the system. The only authorized public directories are those temporary directories
supplied with
+ the system or those designed to be temporary file repositories. The setting is
normally reserved for directories used by the system and by users for temporary file
storage, (e.g., /tmp), and for directories requiring global read/write
+
access.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31679r1_fix">Remove or change the mode for any
world-writable file on the system not required to be world-writable. Procedure: # chmod
o-w <file> Document all changes</fixtext>
+ <fix id="F-31679r1_fix" />
+ <check system="C-36841r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system for world-writable files. Procedure: # find
/ -perm -2 -a \( -type d -o -type f \) -exec ls -ld {} \; If any world-writable files are
located, except those required for system operation such as /tmp and /dev/null,
+ this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1011">
+ <title>GEN003800</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37439r1_rule" severity="low"
weight="10.0">
+ <version>GEN003800</version>
+ <title>Inetd or xinetd logging/tracing must be enabled.</title>
+ <description><VulnDiscussion>Inetd or xinetd logging and
tracing allows the system administrators to observe the IP addresses connecting to their
machines and what network services are being sought. This provides valuable information
when
+ trying to find the source of malicious users and potential malicious
+
users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3, ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000134</ident>
+ <fixtext fixref="F-31357r1_fix">Edit each file in the /etc/xinetd.d
directory and the /etc/xinetd.conf file to contain: log_type = SYSLOG authpriv
log_on_success = HOST PID USERID EXIT log_on_failure = HOST USERID The /etc/xinetd.conf
file contains
+ default values that will hold true for all services unless individually modified in
the service's xinetd.d file. To make the new settings effective, restart the xinetd
service: # service xinetd restart</fixtext>
+ <fix id="F-31357r1_fix" />
+ <check system="C-36111r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>The /etc/xinetd.conf file and each file in the /etc/xinetd.d
directory file should be examined for the following: Procedure: log_type = SYSLOG authpriv
log_on_success = HOST PID USERID EXIT log_on_failure = HOST USERID If xinetd is
+ running and logging is not enabled, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1013">
+ <title>GEN008600</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37986r1_rule" severity="high"
weight="10.0">
+ <version>GEN008600</version>
+ <title>The system must be configured to only boot from the system boot
device.</title>
+ <description><VulnDiscussion>The ability to boot from removable
media is the same as being able to boot into single user, or maintenance, mode without a
password. This ability could allow a malicious user to boot the system and perform
+ changes with the potential to compromise or damage the system. It could also allow
the system to be used for malicious purposes by a malicious anonymous
+
user.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32526r1_fix">Configure the system to only boot
from system startup media. Procedure: On systems with a BIOS or system controller use the
BIOS interface at startup to remove all but the proper boot device from the boot device
+ list.</fixtext>
+ <fix id="F-32526r1_fix" />
+ <check system="C-37289r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if the system is configured to boot from devices
other than the system startup media. If so, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1021">
+ <title>GEN000000-LNX00360</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37207r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX00360</version>
+ <title>The X server must have the correct options enabled.</title>
+ <description><VulnDiscussion>Without the correct options
enabled, the Xwindows system would be less secure and there would be no screen
+
timeout.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000032</ident>
+ <fixtext fixref="F-31154r1_fix">Enable the following options:
-audit (at level 4), -auth and -s with 15 minutes as the timeout value. Procedure for gdm:
Edit /etc/gdm/custom.conf and add the following: [server-Standard] name=Standard server
+ command=/usr/bin/Xorg -br -audit 4 -s 15 chooser=false handled=true flexible=true
priority=0 Procedure for xinit: Edit or create a .xserverrc file in the users home
directory containing the startup script for xinit. This script must have an exec
+ line with at least these options: exec /usr/bin/X -audit 4 -s 15 -auth
<Xauth file> & The <Xauth file> is created using the
"xauth" command and is customarily located in the users home directory with the
name
+ ".Xauthority".</fixtext>
+ <fix id="F-31154r1_fix" />
+ <check system="C-35896r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the options of the running Xwindows server are
correct. Procedure: Get the running xserver information # ps -ef |grep X If the response
contains /usr/bin/Xorg:0 /usr/bin/Xorg:0 -br -audit 0 -auth /var/gdm/:0.Xauth -nolisten
+ tcp vt7 this is indicative of Xorg starting through gdm. This is the default on
RHEL. Examine the Xorg line: If the "-auth" option is missing this would be a
finding. If the "-audit" option is missing or not set to 4, this is a finding.
If the
+ "-s" option is missing or greater than 15, this is a finding. If the
response to the grep contains X:0 /usr/bin/X:0 this indicates the X server was started
with the xinit command with no associated .xserverrc in the home directory of the user.
No
+ options are selected by default. This is a finding. Otherwise if there are
options on the X:0 line: If the "-auth" option is missing this is a finding If
the "-audit" option is missing or not set to 4, this is a finding. If the
"-s" option is
+ missing or greater than 15, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1022">
+ <title>GEN000000-LNX00380</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37217r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX00380</version>
+ <title>An X server must have none of the following options enabled: -ac,
-core (except for debugging purposes), or -nolock.</title>
+ <description><VulnDiscussion>These options will detract from
the security of the Xwindows
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000032</ident>
+ <fixtext fixref="F-31162r1_fix">Disable the unwanted options:
Procedure: For gdm: Remove the -ac, -core and -nolock options by creating a
"command" entry in the /etc/gdm/custom.conf file with the options removed. For
Xwindows started by xinit:
+ Create or modify the .xserverrc script in the users home directory to remove the
-ac, -core and -nolock options from the exec /usr/bin/X command.</fixtext>
+ <fix id="F-31162r1_fix" />
+ <check system="C-35904r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the options of the running Xwindows server are
correct. Procedure: Get the running xserver information # ps -ef |grep X If the response
contains /usr/bin/Xorg:0 /usr/bin/Xorg:0 -br -audit 0 -auth /var/gdm/:0.Xauth -nolisten
+ tcp vt7 this is indicative of Xorg starting through gdm. This is the default
window manager on RHEL. If the "-ac" option is found, this is a finding. If the
"-core" option is found, this is a finding. If the "-nolock" option is
found, this is a
+ finding. If the response to the grep contains X:0 /usr/bin/X:0 Examine the X:0
line: If the "-ac" option is found, this is a finding. If the "-core"
option is found, this is a finding. If the "-nolock" option is found, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1023">
+ <title>GEN006240</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37899r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006240</version>
+ <title>The system must not run an Internet Network News (INN)
server.</title>
+ <description><VulnDiscussion>INN servers access Usenet
newsfeeds and store newsgroup articles. INN servers use the Network News Transfer Protocol
(NNTP) to transfer information from the Usenet to the server and from the server to
authorized
+ remote hosts. If this function is necessary to support a valid mission requirement,
its use must be authorized and approved in the system accreditation
+
package.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>Information
+ Assurance
Officer</Responsibility><Responsibility>System
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000381</ident>
+ <fixtext fixref="F-32393r1_fix">Disable the INN
server.</fixtext>
+ <fix id="F-32393r1_fix" />
+ <check system="C-37125r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># ps -ef | egrep "innd|nntpd" If an Internet
Network News server is running, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1025">
+ <title>GEN000000-LNX00400</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37224r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX00400</version>
+ <title>The /etc/access.conf file must be owned by root.</title>
+ <description><VulnDiscussion>The /etc/access.conf file contains
entries restricting access from the system console by authorized System Administrators. If
the file is owned by a user other than root, it could compromise the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31171r1_fix">Follow the correct configuration
parameters for access configuration file. Use the chown command to configure it properly.
(for example: # chown root /etc/security/access.conf ).</fixtext>
+ <fix id="F-31171r1_fix" />
+ <check system="C-35912r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check access configuration ownership: # ls -lL
/etc/security/access.conf If this file exists and is not owned by root, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1026">
+ <title>GEN006080</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37870r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006080</version>
+ <title>The Samba Web Administration Tool (SWAT) must be restricted to the
local host or require SSL.</title>
+ <description><VulnDiscussion>SWAT is a tool used to configure
Samba. It modifies Samba configuration, which can impact system security, and must be
protected from unauthorized access. SWAT authentication may involve the root password,
which
+ must be protected by encryption when traversing the network. Restricting access to
the local host allows for the use of SSH TCP forwarding, if configured, or administration
by a web browser on the local
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>EBRP-1,
ECCT-1, ECCT-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001436</ident>
+ <fixtext fixref="F-32357r2_fix">Disable SWAT or require SWAT is
only accessed via SSH. Procedure: If SWAT is not needed for operation of the system remove
the SWAT package: # rpm -qa|grep swat Remove "samba-swat" or
"samba3x-swat" depending on
+ which one is installed # rpm --erase samba-swat or # rpm --erase samba3x-swat If
SWAT is required but not at all times disable it when it is not needed. Modify the
/etc/xinetd.d file for "swat" to contain a "disable = yes" line. To
access using
+ SSH: Follow vendor configuration documentation to create an stunnel for
SWAT.</fixtext>
+ <fix id="F-32357r2_fix" />
+ <check system="C-37085r3_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>SWAT is a tool for configuring Samba and should only be
found on a system with a requirement for Samba. If SWAT is used, it must be utilized with
SSL to ensure a secure connection between the client and the server. Procedure: #
+ grep -H "bin/swat" /etc/xinetd.d/*|cut -d: -f1 |xargs grep
"only_from" If the value of the "only_from" line in the
"xinetd.d" file which starts "/usr/sbin/swat" is not
"localhost" or the equivalent, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1027">
+ <title>GEN006100</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37871r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006100</version>
+ <title>The /etc/smb.conf file must be owned by root.</title>
+ <description><VulnDiscussion>The /etc/smb.conf file allows
access to other machines on the network and grants permissions to certain users. If it is
owned by another user, the file may be maliciously modified and the Samba configuration
could
+ be
+
compromised.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32360r1_fix">Change the ownership of the
smb.conf file. Procedure: # chown root smb.conf</fixtext>
+ <fix id="F-32360r1_fix" />
+ <check system="C-37087r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of the /etc/samba/smb.conf file.
Procedure: # ls -l /etc/samba/smb.conf If an smb.conf file is not owned by root, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1028">
+ <title>GEN006140</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37875r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006140</version>
+ <title>The /etc/smb.conf file must have mode 0644 or less
permissive.</title>
+ <description><VulnDiscussion>If the "smb.conf" file
has excessive permissions, the file may be maliciously modified and the Samba
configuration could be
+
compromised.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32370r1_fix">Change the mode of the smb.conf
file to 0644 or less permissive. Procedure: # chmod 0644 smb.conf.</fixtext>
+ <fix id="F-32370r1_fix" />
+ <check system="C-37094r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the smb.conf file. Procedure: # ls -lL
/etc/samba/smb.conf If the "smb.conf" has a mode more permissive than 0644, this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1029">
+ <title>GEN006160</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37879r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006160</version>
+ <title>The /etc/smbpasswd file must be owned by root.</title>
+ <description><VulnDiscussion>If the "smbpasswd" file
is not owned by root, it may be maliciously accessed or modified, potentially resulting in
the compromise of Samba
+
accounts.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32373r1_fix">Use the chown command to configure
the files maintained by smbpasswd. For instance: # chown root /etc/samba/passdb.tdb
/etc/samba/secrets.tdb</fixtext>
+ <fix id="F-32373r1_fix" />
+ <check system="C-37105r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of the "smbpasswd" file. # ls
-l /etc/samba/passdb.tdb /etc/samba/secrets.tdb If the "smbpasswd" file is not
owned by root, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1030">
+ <title>GEN006220</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37887r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006220</version>
+ <title>The smb.conf file must use the "hosts" option to restrict
access to Samba.</title>
+ <description><VulnDiscussion>Samba increases the attack surface
of the system and must be restricted to communicate only with systems requiring
+
access.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32381r1_fix">Edit the
"/etc/samba/smb.conf" file and set the "hosts" option to permit only
authorized hosts to access Samba.</fixtext>
+ <fix id="F-32381r1_fix" />
+ <check system="C-37113r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Examine the "smb.conf" file. # more
/etc/samba/smb.conf If the "hosts" option is not present to restrict access to a
list of authorized hosts and networks, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1032">
+ <title>GEN000540</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37239r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000540</version>
+ <title>Users must not be able to change passwords more than once every 24
hours.</title>
+ <description><VulnDiscussion>The ability to change passwords
frequently facilitates users reusing the same password. This can result in users
effectively never changing their passwords. This would be accomplished by users changing
their
+ passwords when required and then immediately changing it to the original value.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000198</ident>
+ <fixtext fixref="F-31186r1_fix">Change the minimum time period
between password changes for each user account to 1 day. # passwd -n 1 <user
name></fixtext>
+ <fix id="F-31186r1_fix" />
+ <check system="C-35931r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the minimum time period between password changes for
each user account is 1 day. # cat /etc/shadow | cut -d ':' -f 4 | grep -v 1 If any
results are returned, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1046">
+ <title>GEN001100</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37150r1_rule" severity="high"
weight="10.0">
+ <version>GEN001100</version>
+ <title>Root passwords must never be passed over a network in clear text
form.</title>
+ <description><VulnDiscussion>If a user accesses the root
account (or any account) using an unencrypted connection, the password is passed over the
network in clear text form and is subject to interception and misuse. This is true even
if
+ recommended procedures are followed by logging on to a named account and using the
su command to access
+
root.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECNK-1,
ECNK-2, IAIA-1, IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000197</ident>
+ <fixtext fixref="F-31120r1_fix">Enable SSH on the system and use it
for all remote connections used to attain root access</fixtext>
+ <fix id="F-31120r1_fix" />
+ <check system="C-35865r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if root has logged in over an unencrypted network
connection. First determine if root has logged in over a network. Procedure: # last | grep
"^root " | egrep -v "reboot|console" | more Next determine if the SSH
daemon is
+ running. Procedure: # ps -ef |grep sshd If root has logged in over the network
and sshd is not running, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1047">
+ <title>GEN001120</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37156r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001120</version>
+ <title>The system must not permit root logins using remote access programs
such as ssh.</title>
+ <description><VulnDiscussion>Even though communications are
encrypted, an additional layer of security may be gained by extending the policy of not
logging directly on as root. In addition, logging in with a user-specific account
preserves
+ the audit
+
trail.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECPA-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000770</ident>
+ <fixtext fixref="F-31118r1_fix">Edit the sshd_config file and set
the PermitRootLogin option to "no".</fixtext>
+ <fix id="F-31118r1_fix" />
+ <check system="C-35864r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if the SSH daemon is configured to permit root
logins. Procedure: # grep -v "^#" /etc/ssh/sshd_config | grep -i permitrootlogin
If the PermitRootLogin entry is not found or is not set to "no", this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1048">
+ <title>GEN002320</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37566r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002320</version>
+ <title>Audio devices must have mode 0660 or less permissive.</title>
+ <description><VulnDiscussion>Audio and video devices that are
globally accessible have proven to be another security hazard. There is software that can
activate system microphones and video devices connected to user workstations and/or X
+ terminals. Once the microphone has been activated, it is possible to eavesdrop on
otherwise private conversations without the victim being aware of it. This action
effectively changes the user's microphone into a bugging
+
device.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31476r1_fix">Change the mode of audio devices. #
chmod 0660 <audio device></fixtext>
+ <fix id="F-31476r1_fix" />
+ <check system="C-36215r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of audio devices. # ls -lL /dev/audio*
/dev/snd/* If the mode of audio devices are more permissive than 660, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1049">
+ <title>GEN002340</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37575r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002340</version>
+ <title>Audio devices must be owned by root.</title>
+ <description><VulnDiscussion>Audio and video devices globally
accessible have proven to be another security hazard. There is software that can activate
system microphones and video devices connected to user workstations and/or X terminals.
+ Once the microphone has been activated, it is possible to eavesdrop on otherwise
private conversations without the victim being aware of it. This action effectively
changes the user's microphone into a bugging
+
device.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31611r1_fix">Change the owner of the audio
device. # chown root <audio device></fixtext>
+ <fix id="F-31611r1_fix" />
+ <check system="C-36393r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the owner of audio devices. # ls -lL /dev/audio*
/dev/snd/* If the owner of any audio device file is not root, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1054">
+ <title>GEN000000-LNX00420</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37227r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX00420</version>
+ <title>The /etc/access.conf file must have a privileged group
owner.</title>
+ <description><VulnDiscussion>Depending on the access
restrictions of the /etc/access.conf file, if the group owner were not a privileged group,
it could endanger system
+
security.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31174r1_fix">Use the chgrp command to ensure the
group owner is root, sys, or bin. (for example: # chgrp root /etc/security/access.conf
).</fixtext>
+ <fix id="F-31174r1_fix" />
+ <check system="C-35917r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check access configuration group ownership: # ls -lL
/etc/security/access.conf If this file exists and has a group-owner that is not a
privileged user, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1055">
+ <title>GEN000000-LNX00440</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37243r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX00440</version>
+ <title>The /etc/access.conf file must have mode 0640 or less
permissive.</title>
+ <description><VulnDiscussion>If the access permissions are more
permissive than 0640, system security could be
+
compromised.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31190r1_fix">Use the chmod command to set the
permissions to 0640. (for example: # chmod 0640 /etc/security/access.conf
).</fixtext>
+ <fix id="F-31190r1_fix" />
+ <check system="C-35930r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check access configuration mode: # ls -lL
/etc/security/access.conf If this file exists and has a mode more permissive than 0640,
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1056">
+ <title>GEN006120</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37873r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006120</version>
+ <title>The /etc/smb.conf file must be group-owned by root, bin, sys, or
system.</title>
+ <description><VulnDiscussion>If the group owner of the
"smb.conf" file is not root or a system group, the file may be maliciously
modified and the Samba configuration could be
+
compromised.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32365r1_fix">Change the group owner of the
smb.conf file. Procedure: # chgrp root smb.conf</fixtext>
+ <fix id="F-32365r1_fix" />
+ <check system="C-37089r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the "smb.conf" file.
Procedure: # ls -lL /etc/samba/smb.conf If the "smb.conf" file is not
group-owned by root, bin, sys, or system, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1058">
+ <title>GEN006180</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-41574r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006180</version>
+ <title>The smbpasswd file must be group-owned by root.</title>
+ <description><VulnDiscussion>If the smbpasswd file is not
group-owned by root, the smbpasswd file may be maliciously accessed or modified,
potentially resulting in the compromise of Samba
+
accounts.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-35231r1_fix">Use the chgrp command to ensure
that the group owner of the smbpasswd file is root. For instance: # chgrp root
/etc/samba/passdb.tdb /etc/samba/secrets.tdb</fixtext>
+ <fix id="F-35231r1_fix" />
+ <check system="C-40075r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check "smbpasswd" ownership: # ls -lL
/etc/samba/passdb.tdb /etc/samba/secrets.tdb If the "smbpasswd" file is not
group-owned by root, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1059">
+ <title>GEN006200</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-41575r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006200</version>
+ <title>The smbpasswd file must have mode 0600 or less
permissive.</title>
+ <description><VulnDiscussion>If the smbpasswd file has a mode
more permissive than 0600, the smbpasswd file may be maliciously accessed or modified,
potentially resulting in the compromise of Samba
+
accounts.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-35233r1_fix">Change the mode of the files
maintained through smbpasswd to 0600. Procedure: # chmod 0600 /etc/samba/passdb.tdb
/etc/samba/secrets.tdb</fixtext>
+ <fix id="F-35233r1_fix" />
+ <check system="C-40077r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of files maintained using
"smbpasswd". Procedure: # ls -lL /etc/samba/passdb.tdb /etc/samba/secrets.tdb If
a "smbpasswd" maintained file has a mode more permissive than 0600, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1061">
+ <title>GEN002360</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37577r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002360</version>
+ <title>Audio devices must be group-owned by root, sys, bin, or
system.</title>
+ <description><VulnDiscussion>Without privileged group owners,
audio devices will be vulnerable to being used as eaves-dropping devices by malicious
users or intruders to possibly listen to conversations containing sensitive
+
information.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31613r1_fix">Change the group-owner of the audio
device. Procedure: # chgrp root <audio device></fixtext>
+ <fix id="F-31613r1_fix" />
+ <check system="C-36404r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group-owner of audio devices. Procedure: # ls -lL
/dev/audio* /dev/snd/* If the group-owner of an audio device is not root, sys, bin, or
system, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-1062">
+ <title>GEN001080</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37380r1_rule" severity="low"
weight="10.0">
+ <version>GEN001080</version>
+ <title>The root shell must be located in the / file system.</title>
+ <description><VulnDiscussion>To ensure the root shell is
available in repair and administrative modes, the root shell must be located in the /
file
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31311r1_fix">Change the root account's shell
to one present on the / file system. Procedure: Edit /etc/passwd and change the shell for
the root account to one present on the / file system (such as /bin/sh, assuming /bin is
not on
+ a separate file system). If the system does not store shell configuration in the
/etc/passwd file, consult vendor documentation for the correct procedure for the
system.</fixtext>
+ <fix id="F-31311r1_fix" />
+ <check system="C-36067r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if roots shell executable resides on a dedicated
file system. Procedure: Find the location of the root users shell # grep "^root"
/etc/passwd|cut -d: -f7|cut -d/ -f2 The result is the top level directory under / where
the
+ shell resides (ie. usr) Check if it is on a dedicated file system. # grep
/<top level directory> /etc/fstab If /<top level directory> is
on a dedicated file system, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4083">
+ <title>GEN000500</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-29796r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000500</version>
+ <title>Graphical desktop environments provided by the system must
automatically lock after 15 minutes of inactivity and the system must require users to
re-authenticate to unlock the environment. Applications requiring continuous, real-time
screen
+ display (i.e., network management products) require the following and need to be
documented with the IAO. -The logon session does not have administrator rights. -The
display station (i.e., keyboard, monitor, etc.) is located in a controlled access
+ area.</title>
+ <description><VulnDiscussion>If graphical desktop sessions do
not lock the session after 15 minutes of inactivity, requiring re-authentication to resume
operations, the system or individual data could be compromised by an alert intruder who
+ could exploit the oversight. This requirement applies to graphical desktop
environments provided by the system to locally attached displays and input devices as well
as to graphical desktop environments provided to remote systems, including thin
+
clients.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>PESL-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000057</ident>
+ <fixtext fixref="F-26907r1_fix">For the Gnome screen saver, set the
idle_activation_enabled flag. Procedure: # gconftool-2 --direct --config-source
xml:readwrite:/etc/gconf/gconf.xml.mandatory --type bool --set
+ /apps/gnome-screensaver/idle_activation_enabled true</fixtext>
+ <fix id="F-26907r1_fix" />
+ <check system="C-30103r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>For the Gnome screen saver, check the
idle_activation_enabled flag. Procedure: # gconftool-2 --direct --config-source
xml:readwrite:/etc/gconf/gconf.xml.mandatory --get
/apps/gnome-screensaver/idle_activation_enabled If this does
+ not return "true" and a documented exception has not been made by the
IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4084">
+ <title>GEN000800</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37323r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000800</version>
+ <title>The system must prohibit the reuse of passwords within five
iterations.</title>
+ <description><VulnDiscussion>If a user, or root, used the same
password continuously or was allowed to change it back shortly after being forced to
change it to something else, it would provide a potential intruder with the opportunity
to
+ keep guessing at one user's password until it was guessed
+
correctly.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000200</ident>
+ <fixtext fixref="F-31265r1_fix">Create the password history file. #
touch /etc/security/opasswd # chown root:root /etc/security/opasswd # chmod 0600
/etc/security/opasswd Enable password history. If /etc/pam.d/system-auth references
+ /etc/pam.d/system-auth-ac refer to the man page for system-auth-ac for a
description of how to add options not configurable with authconfig. Edit
/etc/pam.d/system-auth to include the remember option on the "password pam_unix"
lines set to at least
+ 5.</fixtext>
+ <fix id="F-31265r1_fix" />
+ <check system="C-36015r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># ls /etc/security/opasswd If /etc/security/opasswd does not
exist, then this is a finding. # grep password /etc/pam.d/system-auth| grep pam_unix.so |
grep remember If the "remember" option in /etc/pam.d/system-auth is not 5 or
+ greater, this is a finding. Check for system-auth-ac inclusions. # grep -c
system-auth-ac /etc/pam.d/* If the system-auth-ac file is included anywhere # more
/etc/pam.d/system-auth-ac | grep password | grep pam_unix.so | grep remember If in
+ /etc/pam.d/system-auth-ac is referenced by another file and the
"remember" option is not set to 5 or greater this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4087">
+ <title>GEN001940</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37433r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001940</version>
+ <title>User start-up files must not execute world-writable
programs.</title>
+ <description><VulnDiscussion>If start-up files execute
world-writable programs, especially in unprotected directories, they could be maliciously
modified to become trojans that destroy user files or otherwise compromise the system at
the
+ user, or higher, level. If the system is compromised at the user level, it is much
easier to eventually compromise the system at the root and network
+
level.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCSW-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31263r1_fix">Remove the world-writable
permission of files referenced by local initialization scripts, or remove the references
to these files in the local initialization scripts.</fixtext>
+ <fix id="F-31263r1_fix" />
+ <check system="C-36012r3_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check local initialization files for any executed
world-writable programs or scripts and scripts executing from world writable directories.
Procedure: For each home directory on the system make a list of files referenced within
any
+ local initialization script. Show the mode for each file and its parent
directory. # FILES=".bashrc .bash_login .bash_logout .bash_profile .cshrc .kshrc
.login .logout .profile .tcshrc .env .dtprofile .dispatch .emacs .exrc"; # for
HOMEDIR in
+ `cut -d: -f6 /etc/passwd|sort|uniq`;do for INIFILE in $FILES;do REFLIST=`egrep
" [\"~]?/" ${HOMEDIR}/${INIFILE} 2>null|sed "s/.*\([~
\"]\/[\.0-9A-Za-z_\/\-]*\).*/\1/"`;for REFFILE in $REFLIST;do FULLREF=`echo
$REFFILE|sed
+ "s:\~:${HOMEDIR}:g"|sed "s:^\s*::g"`;dirname $FULLREF|xargs
stat -c "dir:%a:%n";stat -c "file:%a:%n"
$FULLREF;done;done;done|sort|uniq This command outputs a list of files and directories and
their associated access modes. If any local
+ initialization file executes a world-writable program or script or a script from
a world-writable directory, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4089">
+ <title>GEN001660</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37264r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001660</version>
+ <title>All system start-up files must be owned by root.</title>
+ <description><VulnDiscussion>System start-up files not owned by
root could lead to system compromise by allowing malicious users or applications to modify
them for unauthorized purposes. This could lead to system and network
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31210r1_fix">Change the ownership of the run
control script(s) with incorrect ownership. # find /etc -name "[SK][0-9]*"|xargs
stat -L -c %U:%n|egrep -v "^root:"|cut -d: -f2|xargs chown root</fixtext>
+ <fix id="F-31210r1_fix" />
+ <check system="C-35954r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check run control scripts' ownership. # ls -lL /etc/rc*
/etc/init.d Alternatively: # find /etc -name "[SK][0-9]*"|xargs stat -L -c %U:%n
If any run control script is not owned by root or bin, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4090">
+ <title>GEN001680</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37269r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001680</version>
+ <title>All system start-up files must be group-owned by root, sys, bin,
other, or system.</title>
+ <description><VulnDiscussion>If system start-up files do not
have a group owner of root or a system group, the files may be modified by malicious users
or
+
intruders.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31216r1_fix">Change the group ownership of the
run control script(s) with incorrect group ownership. Procedure: # chgrp root <run
control script> # find /etc -name "[SK][0-9]*"|xargs stat -L -c
%G:%n|egrep -v
+ "^(root|sys|bin|other):"|cut -d: -f2|xargs chgrp root</fixtext>
+ <fix id="F-31216r1_fix" />
+ <check system="C-35960r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check run control scripts' group ownership. Procedure: #
ls -lL /etc/rc* /etc/init.d Alternatively: # find /etc -name "[SK][0-9]*"|xargs
stat -L -c %G:%n|egrep -v "^(root|sys|bin|other):" If any run control script is
not
+ group-owned by root, sys, bin, or other system groups, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4091">
+ <title>GEN001700</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37270r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001700</version>
+ <title>System start-up files must only execute programs owned by a privileged
UID or an application.</title>
+ <description><VulnDiscussion>System start-up files executing
programs owned by other than root (or another privileged user) or an application
indicating the system may have been
+
compromised.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCSL-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31218r1_fix">Change the ownership of the file
executed from system startup scripts to root, bin, sys, or other. # chown root
<executed file></fixtext>
+ <fix id="F-31218r1_fix" />
+ <check system="C-35962r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine the programs executed by system start-up files.
Determine the ownership of the executed programs. # cat /etc/rc*/* /etc/init.d/* | more #
ls -l <executed program> Alternatively: # for FILE in `egrep -r
"/" /etc/rc.*
+ /etc/init.d|awk '/^.*[^\/][0-9A-Za-z_\/]*/{print $2}'|egrep
"^/"|sort|uniq`;do if [ -e $FILE ]; then stat -L -c '%U:%n'
$FILE;fi;done This provides a list of files referenced by initialization scripts and their
associated UIDs. If any file is run
+ by an initialization file and is not owned by root, sys, bin, or in rare cases,
an application account, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4246">
+ <title>GEN008620</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37925r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008620</version>
+ <title>System BIOS or system controllers supporting password protection must
have administrator accounts/passwords configured, and no others.</title>
+ <description><VulnDiscussion>A system's BIOS or system
controller handles the initial startup of a system and its configuration must be protected
from unauthorized modification. When the BIOS or system controller supports the creation
of user
+ accounts or passwords, such protections must be used and accounts/passwords only
assigned to system administrators. Failure to protect BIOS or system controller settings
could result in Denial of Service or compromise of the system resulting from
+ unauthorized configuration
+
changes.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000213</ident>
+ <fixtext fixref="F-4157r2_fix">Access the system's BIOS or
system controller. Set a supervisor/administrator password if one has not been set.
Disable a user-level password if one has been set.</fixtext>
+ <fix id="F-4157r2_fix" />
+ <check system="C-37163r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>On systems with a BIOS or system controller, verify a
supervisor or administrator password is set. If a password is not set, this is a finding.
If the BIOS or system controller supports user-level access in addition to
+ supervisor/administrator access, determine if this access is enabled. If so, this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4247">
+ <title>GEN008640</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-41534r1_rule" severity="high"
weight="10.0">
+ <version>GEN008640</version>
+ <title>The system must not use removable media as the boot
loader.</title>
+ <description><VulnDiscussion>Malicious users with removable
boot media can gain access to a system configured to use removable media as the boot
+
loader.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-4158r2_fix">Configure the system to use a
bootloader installed on fixed media.</fixtext>
+ <fix id="F-4158r2_fix" />
+ <check system="C-2057r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Ask the SA if the system uses removable media for the boot
loader. If it does, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4248">
+ <title>GEN008660</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-42186r1_rule" severity="high"
weight="10.0">
+ <version>GEN008660</version>
+ <title>For systems capable of using GRUB, the system must be configured with
GRUB as the default boot loader unless another boot loader has been authorized, justified,
and documented using site-defined procedures.</title>
+ <description><VulnDiscussion>GRUB is a versatile boot loader
used by several platforms that can provide authentication for access to the system or
boot
+
loader.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-35823r1_fix">Configure the system to use the
GRUB bootloader or document, justify, and authorize the alternate
bootloader.</fixtext>
+ <fix id="F-35823r1_fix" />
+ <check system="C-40580r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if the system uses the GRUB boot loader; # ls -l
/boot/grub/grub.conf If no grub.conf file exists, and the bootloader on the system has not
been authorized, justified, and documented, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4249">
+ <title>GEN008700</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37933r1_rule" severity="high"
weight="10.0">
+ <version>GEN008700</version>
+ <title>The system boot loader must require authentication.</title>
+ <description><VulnDiscussion>If the system's boot loader
does not require authentication, users with console access to the system may be able to
alter the system boot configuration or boot the system into single user or maintenance
mode,
+ which could result in Denial of Service or unauthorized privileged access to the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000213</ident>
+ <fixtext fixref="F-32425r1_fix">The GRUB console boot loader can be
configured to use an MD5 encrypted password by adding password --md5 password-hash to the
"/boot/grub/grub.conf" file. Use "/sbin/grub-md5-crypt" to generate
MD5 passwords from the
+ command line.</fixtext>
+ <fix id="F-32425r1_fix" />
+ <check system="C-37191r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the "/boot/grub/grub.conf" or
"/boot/grub/menu.lst" files. # more /boot/grub/menu.lst Check for a password
configuration line, such as: password --md5 <password-hash> This line should
be just below the line beginning
+ with "timeout". Please note <password-hash> will be
replaced by the actual MD5 encrypted password. If the password line is not in either of
the files, this is a finding. For any bootloader other than GRUB which has been
authorized,
+ justified and documented for use on the system refer to the vendor documentation
on password support. If the bootloader does not support encrypted passwords, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4250">
+ <title>GEN008720</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37942r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008720</version>
+ <title>The system's boot loader configuration file(s) must have mode 0600
or less permissive.</title>
+ <description><VulnDiscussion>File permissions greater than 0600
on boot loader configuration files could allow an unauthorized user to view or modify
sensitive information pertaining to system boot
+
instructions.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32433r1_fix">Change the mode of the grub.conf
file to 0600. # chmod 0600 /boot/grub/grub.conf</fixtext>
+ <fix id="F-32433r1_fix" />
+ <check system="C-37221r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /boot/grub/grub.conf permissions: # ls -lL
/boot/grub/grub.conf If /boot/grub/grub.conf has a mode more permissive than 0600, then
this is a finding. For any bootloader other than GRUB which has been authorized, justified
and
+ documented for use on the system refer to the vendor documentation for the
locatioin of the configuration file. If the bootloader configuration file has a mode more
permissive than 0600, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4255">
+ <title>GEN008680</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-4255r2_rule" severity="high"
weight="10.0">
+ <version>GEN008680</version>
+ <title>If the system boots from removable media, it must be stored in a safe
or similarly secured container.</title>
+ <description><VulnDiscussion>Storing the boot loader on
removable media in an insecure location could allow a malicious user to modify the systems
boot instructions or boot to an insecure operating
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><Responsibility>Information
Assurance
Officer</Responsibility><IAControls>PESS-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001208</ident>
+ <fixtext fixref="F-4166r2_fix">Store the system boot media in a
secure container when not in use.</fixtext>
+ <fix id="F-4166r2_fix" />
+ <check system="C-2079r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Ask the SA if the system boots from removable media. If so,
ask if the boot media is stored in a secure container when not in use. If it is not, this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4268">
+ <title>GEN000000-LNX00320</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37181r1_rule" severity="high"
weight="10.0">
+ <version>GEN000000-LNX00320</version>
+ <title>The system must not have special privilege accounts, such as shutdown
and halt.</title>
+ <description><VulnDiscussion>If special privilege accounts are
compromised, the accounts could provide privileges to execute malicious commands on a
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>IAAC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <ident
system="http://iase.disa.mil/cci">CCI-000764</ident>
+ <fixtext fixref="F-31139r1_fix">Remove any special privilege
accounts, such as shutdown and halt, from the /etc/passwd and /etc/shadow files using the
"userdel" or "system-config-users" commands.</fixtext>
+ <fix id="F-31139r1_fix" />
+ <check system="C-35884r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Perform the following to check for unnecessary privileged
accounts: # grep "^shutdown" /etc/passwd # grep "^halt" /etc/passwd #
grep "^reboot" /etc/passwd If any unnecessary privileged accounts exist this is
a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4269">
+ <title>GEN000290</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-38176r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000290</version>
+ <title>The system must not have unnecessary accounts.</title>
+ <description><VulnDiscussion>Accounts providing no operational
purpose provide additional opportunities for system compromise. Unnecessary accounts
include user accounts for individuals not requiring access to the system and application
+ accounts for applications not installed on the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>IAAC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000012</ident>
+ <fixtext fixref="F-32804r1_fix">Remove all unnecessary accounts
from the /etc/passwd file before connecting a system to the network. Other accounts that
are associated with a service not in use should also be removed.</fixtext>
+ <fix id="F-32804r1_fix" />
+ <check system="C-37560r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system for unnecessary user accounts. Procedure: #
more /etc/passwd Obtain a list of authorized accounts from the IAO. If any unnecessary
accounts are found on the system, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4273">
+ <title>GEN006260</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37901r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006260</version>
+ <title>The /etc/news/incoming.conf (or equivalent) must have mode 0600 or
less permissive.</title>
+ <description><VulnDiscussion>Excessive permissions on the
"incoming.conf" file may allow unauthorized modification which could lead to
Denial-of-Service to authorized users or provide access to unauthorized
+
users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32395r1_fix">Change the mode of the
"/etc/news/incoming.conf" file to 0600. # chmod 0600
/etc/news/incoming.conf</fixtext>
+ <fix id="F-32395r1_fix" />
+ <check system="C-37127r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>RHEL uses the InternetNewsDaemon (innd) news server. The
file corresponding to "/etc/news/hosts.nntp" is
"/etc/news/incoming.conf". Check the permissions for
"/etc/news/incoming.conf". # ls -lL /etc/news/incoming.conf If
+ "/etc/news/incoming.conf" has a mode more permissive than 0600, this is
a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4274">
+ <title>GEN006280</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37712r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006280</version>
+ <title>The /etc/news/infeed.conf (or equivalent) must have mode 0600 or less
permissive.</title>
+ <description><VulnDiscussion>Excessive permissions on the
"" file may allow unauthorized modification which could lead to Denial of
Service to authorized users or provide access to unauthorized
+
users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32122r1_fix">Change the mode of
"/etc/news/infeed.conf" to 0600. # chmod 0600
/etc/news/infeed.conf</fixtext>
+ <fix id="F-32122r1_fix" />
+ <check system="C-36913r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>RHEL uses the InternetNewsDaemon (innd) news server. The
file that corresponds to "/etc/news/hosts.nntp.nolimit" is
"/etc/news/infeed.conf". Check the permissions for
"/etc/news/infeed.conf". # ls -lL /etc/news/infeed.conf If
+ "/etc/news/infeed.conf" has a mode more permissive than 0600, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4275">
+ <title>GEN006300</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37714r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006300</version>
+ <title>The /etc/news/readers.conf (or equivalent) must have mode 0600 or less
permissive.</title>
+ <description><VulnDiscussion>Excessive permissions on the
readers.conf file may allow unauthorized modification which could lead to Denial of
Service to authorized users or provide access to unauthorized
+
users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32155r1_fix">Change the mode of the
/etc/news/readers.conf file to 0600. # chmod 0600 /etc/news/readers.conf</fixtext>
+ <fix id="F-32155r1_fix" />
+ <check system="C-36918r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions for
"/etc/news/readers.conf". # ls -lL /etc/news/readers.conf If
/etc/news/readers.conf has a mode more permissive than 0600, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4276">
+ <title>GEN006320</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37731r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006320</version>
+ <title>The /etc/news/passwd.nntp file (or equivalent) must have mode 0600 or
less permissive.</title>
+ <description><VulnDiscussion>File permissions more permissive
than 0600 for "/etc/news/passwd.nntp" may allow access to privileged information
by system intruders or malicious
+
users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32193r1_fix">Change the mode of the
"/etc/news/passwd.nntp" file. # chmod 0600
/etc/news/passwd.nntp</fixtext>
+ <fix id="F-32193r1_fix" />
+ <check system="C-36928r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check "/etc/news/passwd.nntp" permissions: # ls
-lL /etc/news/passwd.nntp If "/etc/news/passwd.nntp" has a mode more permissive
than 0600, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4277">
+ <title>GEN006340</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37735r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006340</version>
+ <title>Files in /etc/news must be owned by root or news.</title>
+ <description><VulnDiscussion>If critical system files are not
owned by a privileged user, system integrity could be
+
compromised.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32195r1_fix">Change the ownership of the files
in "/etc/news" to root or news. Procedure: # chown root
/etc/news/*</fixtext>
+ <fix id="F-32195r1_fix" />
+ <check system="C-36931r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of the files in "/etc/news".
Procedure: # ls -al /etc/news If any files are not owned by root or news, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4278">
+ <title>GEN006360</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37737r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006360</version>
+ <title>The files in /etc/news must be group-owned by root or
news.</title>
+ <description><VulnDiscussion>If critical system files do not
have a privileged group-owner, system integrity could be
+
compromised.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32198r1_fix">Change the group-owner of the files
in "/etc/news" to root or news. Procedure: # chgrp root
/etc/news/*</fixtext>
+ <fix id="F-32198r1_fix" />
+ <check system="C-36933r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check "/etc/news" files group ownership:
Procedure: # ls -al /etc/news If "/etc/news" files are not group-owned by root
or news, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4295">
+ <title>GEN005500</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37818r1_rule" severity="high"
weight="10.0">
+ <version>GEN005500</version>
+ <title>The SSH daemon must be configured to only use the SSHv2
protocol.</title>
+ <description><VulnDiscussion>SSHv1 is not a DoD-approved
protocol and has many well-known vulnerability exploits. Exploits of the SSH daemon could
provide immediate root access to the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>DCPP-1,
ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001436</ident>
+ <fixtext fixref="F-32288r1_fix">Edit the sshd_config file and set
the "Protocol" setting to "2". If using the F-Secure SSH server, set
the "Ssh1Compatibility" setting to "no".</fixtext>
+ <fix id="F-32288r1_fix" />
+ <check system="C-37020r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Locate the sshd_config file: # more /etc/ssh/sshd_config
Examine the file. If the variables 'Protocol 2,1' or 'Protocol 1' are
defined on a line without a leading comment, this is a finding. If the SSH server is
F-Secure, the
+ variable name for SSH 1 compatibility is 'Ssh1Compatibility', not
'protocol'. If the variable 'Ssh1Compatiblity' is set to 'yes',
then this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4298">
+ <title>GEN001000</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37376r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001000</version>
+ <title>Remote consoles must be disabled or protected from unauthorized
access.</title>
+ <description><VulnDiscussion>The remote console feature
provides an additional means of access to the system which could allow unauthorized access
if not disabled or properly secured. With virtualization technologies, remote console
access is
+ essential as there is no physical console for virtual machines. Remote console
access must be protected in the same manner as any other remote privileged access
+
method.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000070</ident>
+ <fixtext fixref="F-31307r1_fix">Create if needed and set the
contents of /etc/securetty to a "console" or "tty" device. # echo
console > /etc/securetty or # echo tty1 > /etc/securetty</fixtext>
+ <fix id="F-31307r1_fix" />
+ <check system="C-36063r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/securetty # more /etc/securetty If the file does
not exist, or contains more than "console" or a single "tty" device
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4301">
+ <title>GEN000240</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37402r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000240</version>
+ <title>The system clock must be synchronized to an authoritative DoD time
source.</title>
+ <description><VulnDiscussion>To assure the accuracy of the
system clock, it must be synchronized with an authoritative time source within DoD. Many
system functions, including time-based login and activity restrictions, automated
reports,
+ system logs, and audit records depend on an accurate system clock. If there is no
confidence in the correctness of the system clock, time-based functions may not operate as
intended and records may be of diminished value. Authoritative time sources
+ include authorized time servers within the enclave that synchronize with upstream
authoritative sources. Specific requirements for the upstream synchronization of network
time protocol (NTP) servers are covered in the Network Other Devices STIG.
+ For systems located on isolated or closed networks, it is not necessary to
synchronize with a global authoritative time source. If a global authoritative time source
is not available to systems on an isolated network, a local authoritative time
+ source must be established on this network and used by the systems connected to
this network. This is necessary to provide the ability to correlate events and allow for
the correct operation of time-dependent protocols between systems on the
+ isolated network. If the system is completely isolated (i.e., it has no connections
to networks or other systems), time synchronization is not required as no correlation of
events between systems will be necessary. If the system is completely
+ isolated, this requirement is not
+
applicable.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001492</ident>
+ <fixtext fixref="F-31332r2_fix">Use an authoritative local time
server or a time server operated by the U.S. government. Ensure all systems in the
facility feed from one or more local time servers which feed from the authoritative U.S.
government
+ time server.</fixtext>
+ <fix id="F-31332r2_fix" />
+ <check system="C-36085r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check if NTP running: # ps -ef | egrep
"xntpd|ntpd" Check if "ntpd -qg" scheduled to run: # grep "ntpd
-qg" /var/spool/cron/* # grep "ntpd -qg" /etc/cron.d/* # grep "ntpd
-qg" /etc/cron.daily/* # grep "ntpd -qg" /etc/cron.hourly/*
+ # grep "ntpd -qg" /etc/cron.monthly/* # grep "ntpd -qg"
/etc/cron.weekly/* If NTP is running or "ntpd -qg" is found: # more
/etc/ntp.conf Confirm the timeservers and peers or multicast client (as applicable) are
local or authoritative U.S. DoD
+ sources appropriate for the level of classification which the network operates.
If a non-local/non-authoritative time-server is used, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4304">
+ <title>GEN003640</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37398r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003640</version>
+ <title>The root file system must employ journaling or another mechanism
ensuring file system consistency.</title>
+ <description><VulnDiscussion>File system journaling, or
logging, can allow reconstruction of file system data after a system crash, preserving the
integrity of data that may have otherwise been lost. Journaling file systems typically do
not
+ require consistency checks upon booting after a crash, which can improve system
availability. Some file systems employ other mechanisms to ensure consistency also
satisfying this
+
requirement.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000553</ident>
+ <fixtext fixref="F-31330r1_fix">Implement file system journaling
for the root file system, or use a file system with other mechanisms to ensure file system
consistency. If the root file system supports journaling, enable it. If the file system
does
+ not support journaling or another mechanism to ensure file system consistency, a
migration to a different file system will be necessary.</fixtext>
+ <fix id="F-31330r1_fix" />
+ <check system="C-36083r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Logging should be enabled for those types of file systems
not turning on logging by default. Procedure: # mount JFS, VXFS, HFS, XFS, reiserfs, EXT3
and EXT4 all turn logging on by default and will not be a finding. The ZFS file
+ system uses other mechanisms to provide for file system consistency, and will not
be a finding. For other file systems types, if the root file system does not support
journaling this is a finding. If the 'nolog' option is set on the root file
+ system that does support journaling, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4321">
+ <title>GEN006060</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37867r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006060</version>
+ <title>The system must not run Samba unless needed.</title>
+ <description><VulnDiscussion>Samba is a tool used for the
sharing of files and printers between Windows and UNIX operating systems. It provides
access to sensitive files and, therefore, poses a security risk if
+
compromised.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>DCPD-1,
ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001436</ident>
+ <fixtext fixref="F-32354r1_fix">If there is no functional need for
Samba and the daemon is running, disable the daemon by killing the process ID as noted
from the output of ps -ef |grep smbd. The samba package should also be removed or not
+ installed if there is no functional requirement. Procedure: rpm -qa |grep samba
This will show whether "samba" or "samba3x" is installed. To remove:
rpm --erase samba or rpm --erase samba3x</fixtext>
+ <fix id="F-32354r1_fix" />
+ <check system="C-37082r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system for a running Samba server. Procedure: # ps
-ef |grep smbd If the Samba server is running, ask the SA if the Samba server is
operationally required. If it is not, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4334">
+ <title>GEN000000-LNX00480</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37253r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX00480</version>
+ <title>The /etc/sysctl.conf file must be owned by root.</title>
+ <description><VulnDiscussion>The sysctl.conf file specifies the
values for kernel parameters to be set on boot. These settings can affect the
system's
+
security.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31200r1_fix">Use the chown command to change the
owner of /etc/sysctl.conf to root: # chown root /etc/sysctl.conf</fixtext>
+ <fix id="F-31200r1_fix" />
+ <check system="C-35944r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/sysctl.conf ownership. # ls -lL /etc/sysctl.conf
If /etc/sysctl.conf is not owned by root, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4335">
+ <title>GEN000000-LNX00500</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37257r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX00500</version>
+ <title>The /etc/sysctl.conf file must be group-owned by root.</title>
+ <description><VulnDiscussion>The sysctl.conf file specifies the
values for kernel parameters to be set on boot. These settings can affect the
system's
+
security.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31203r1_fix">Use the chgrp command to change the
group owner of /etc/sysctl.conf to root: # chgrp root /etc/sysctl.conf</fixtext>
+ <fix id="F-31203r1_fix" />
+ <check system="C-35947r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/sysctl.conf group ownership: # ls -lL
/etc/sysctl.conf If /etc/sysctl.conf is not group-owned by root, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4336">
+ <title>GEN000000-LNX00520</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37258r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX00520</version>
+ <title>The /etc/sysctl.conf file must have mode 0600 or less
permissive.</title>
+ <description><VulnDiscussion>The sysctl.conf file specifies the
values for kernel parameters to be set on boot. These settings can affect the
system's
+
security.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31204r1_fix">Use the chmod command to change the
mode of the /etc/sysctl.conf file. # chmod 0600 /etc/sysctl.conf</fixtext>
+ <fix id="F-31204r1_fix" />
+ <check system="C-35948r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/sysctl.conf permissions: # ls -lL
/etc/sysctl.conf If /etc/sysctl.conf has a mode more permissive than 0600, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4339">
+ <title>GEN000000-LNX00560</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37316r1_rule" severity="high"
weight="10.0">
+ <version>GEN000000-LNX00560</version>
+ <title>The Linux NFS Server must not have the insecure file locking
option.</title>
+ <description><VulnDiscussion>Insecure file locking could allow
for sensitive data to be viewed or edited by an unauthorized
+
user.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <ident
system="http://iase.disa.mil/cci">CCI-000764</ident>
+ <fixtext fixref="F-4250r3_fix">Remove the
"insecure_locks" option from all NFS exports on the system. Procedure: Edit
/etc/exports and remove all instances of the insecure_locks option. Re-export the file
systems to make the setting take effect. #
+ exportfs -a</fixtext>
+ <fix id="F-4250r3_fix" />
+ <check system="C-36008r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if an NFS server is running on the system by: # ps
-ef |grep nfsd If an NFS server is running, confirm it is not configured with the
insecure_locks option by: # exportfs -v The example below would be a finding:
+ /misc/export speedy.example.com(rw,insecure_locks)</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4342">
+ <title>GEN000000-LNX00580</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37327r1_rule" severity="high"
weight="10.0">
+ <version>GEN000000-LNX00580</version>
+ <title>The x86 CTRL-ALT-DELETE key sequence must be disabled.</title>
+ <description><VulnDiscussion>Undesirable reboots can occur if
the CTRL-ALT-DELETE key sequence is not disabled. Such reboots may cause a loss of data or
loss of access to critical
+
information.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31276r1_fix">Ensure the CTRL-ALT-DELETE key
sequence has been disabled and attempts to use the sequence are logged. In the
/etc/inittab file replace: ca::ctrlaltdel:/sbin/shutdown -t3 -r now with
ca:nil:ctrlaltdel:/usr/bin/logger
+ -p security.info "Ctrl-Alt-Del was pressed"</fixtext>
+ <fix id="F-31276r1_fix" />
+ <check system="C-36030r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify that reboot using the CTRL-ALT-DELETE key sequence
has been disabled by performing: # grep ctrlaltdel /etc/inittab If the line returned does
not specifiy "/usr/bin/logger" or is not commented out then this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4346">
+ <title>GEN000000-LNX00600</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37339r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX00600</version>
+ <title>The Linux PAM system must not grant sole access to admin privileges to
the first user who logs into the console.</title>
+ <description><VulnDiscussion>If an unauthorized user has been
granted privileged access while logged in at the console, the security posture of a system
could be greatly compromised. Additionally, such a situation could deny legitimate root
+ access from another
+
terminal.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECPA-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-4257r3_fix">Configure PAM to not grant sole
access of administrative privileges to the first user logged in at the console. Identify
any instances of pam_console. # cd /etc/pam.d # grep pam_console.so * For any files
containing
+ an un-commented reference to pam_console.so, edit the file and remove or comment
out the reference. Remove the console.perms file if it exists: # rm
/etc/security/console.perms</fixtext>
+ <fix id="F-4257r3_fix" />
+ <check system="C-2225r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Ensure the pam_console.so module is not configured in any
files in /etc/pam.d by: # cd /etc/pam.d # grep pam_console.so * Or # ls -la
/etc/security/console.perms If either the pam_console.so entry or the file
+ /etc/security/console.perms is found then this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4357">
+ <title>GEN002860</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37945r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002860</version>
+ <title>Audit logs must be rotated daily.</title>
+ <description><VulnDiscussion>Rotate audit logs daily to
preserve audit file system space and to conform to the DoD/DISA requirement. If it is not
rotated daily and moved to another location, then there is more of a chance for the
compromise
+ of audit data by malicious
+
users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32436r1_fix">Configure a cron job or other
automated process to rotate the audit logs on a daily basis.</fixtext>
+ <fix id="F-32436r1_fix" />
+ <check system="C-37230r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for any crontab entries that rotate audit logs.
Procedure: # crontab -l If such a cron job is found, this is not a finding. Otherwise,
query the SA. If there is a process automatically rotating audit logs, this is not a
+ finding. If the SA manually rotates audit logs, this is a finding, because if the
SA is not there, it will not be accomplished. If the audit output is not archived daily,
to tape or disk, this is a finding. This can be ascertained by looking at
+ the audit log directory and, if more than one file is there, or if the file does
not have today's date, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4358">
+ <title>GEN003200</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27362r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003200</version>
+ <title>The cron.deny file must have mode 0600 or less
permissive.</title>
+ <description><VulnDiscussion>If file permissions for cron.deny
are more permissive than 0600, sensitive information could be viewed or edited by
unauthorized users.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-24608r1_fix">Change the mode of the cron.deny
file. # chmod 0600 /etc/cron.deny</fixtext>
+ <fix id="F-24608r1_fix" />
+ <check system="C-28506r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the cron.deny file. # ls -lL
/etc/cron.deny If the cron.deny file does not exist this is not a finding. If the
cron.deny file exists and the mode is more permissive than 0600, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4360">
+ <title>GEN003220</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37489r1_rule" severity="low"
weight="10.0">
+ <version>GEN003220</version>
+ <title>Cron programs must not set the umask to a value less restrictive than
077.</title>
+ <description><VulnDiscussion>The umask controls the default
access mode assigned to newly created files. A umask of 077 limits new files to mode 700
or less permissive. Although umask is often represented as a 4-digit octal number, the
first
+ digit representing special access modes is typically ignored or required to be
+
0.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance>If
a cron program
+ sets the umask to 000 or does not restrict the world-writable permission, this
becomes a CAT I
+
finding.</SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31397r1_fix">Edit cron script files and modify
the umask to 077.</fixtext>
+ <fix id="F-31397r1_fix" />
+ <check system="C-36148r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if there are any crontabs by viewing a long
listing of the directory. If there are crontabs, examine them to determine what cron jobs
exist. Check for any programs specifying an umask more permissive than 077: Procedure:
+ # ls -lL /var/spool/cron # ls -lL /etc/cron.d /etc/cron.daily /etc/cron.hourly
/etc/cron.monthly /etc/cron.weekly or # ls -lL /etc/cron.*|grep -v deny # cat
<crontab file> # grep umask <cron program> If there are no
cron jobs present,
+ this vulnerability is not applicable. If any cron job contains an umask more
permissive than 077, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4361">
+ <title>GEN003240</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27369r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003240</version>
+ <title>The cron.allow file must be owned by root, bin, or sys.</title>
+ <description><VulnDiscussion>If the owner of the cron.allow
file is not set to root, bin, or sys, the possibility exists for an unauthorized user to
view or to edit sensitive
+
information.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-24614r1_fix"># chown root
/etc/cron.allow</fixtext>
+ <fix id="F-24614r1_fix" />
+ <check system="C-28513r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># ls -lL /etc/cron.allow If the cron.allow file is not owned
by root, sys, or bin, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4364">
+ <title>GEN003400</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37521r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003400</version>
+ <title>The "at" directory must have mode 0755 or less
permissive.</title>
+ <description><VulnDiscussion>If the "at" directory
has a mode more permissive than 0755, unauthorized users could be allowed to view or to
edit files containing sensitive information within the "at" directory.
Unauthorized modifications could
+ result in Denial of Service to authorized "at"
+
jobs.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31433r1_fix">Change the mode of the
"at" directory to 0755. Procedure: # chmod 0755 <at
directory></fixtext>
+ <fix id="F-31433r1_fix" />
+ <check system="C-36181r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the "at" directory. Procedure: #
ls -ld /var/spool/at If the directory mode is more permissive than 0755, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4365">
+ <title>GEN003420</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37527r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003420</version>
+ <title>The at directory must be owned by root, bin, sys, daemon, or
cron.</title>
+ <description><VulnDiscussion>If the owner of the "at"
directory is not root, bin, or sys, unauthorized users could be allowed to view or edit
files containing sensitive information within the
+
directory.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31441r1_fix">Change the owner of the
"at" directory to root, bin, sys, or system. Procedure: # chown <root or
other system account> <"at" directory></fixtext>
+ <fix id="F-31441r1_fix" />
+ <check system="C-36186r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of the "at" directory:
Procedure: # ls -ld /var/spool/at If the directory is not owned by root, sys, bin, daemon,
or cron, this is a finding. Fix Text: Change the owner of the "at" directory to
root, bin, sys,
+ or system.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4366">
+ <title>GEN003440</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37531r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003440</version>
+ <title>"At" jobs must not set the umask to a value less restrictive
than 077.</title>
+ <description><VulnDiscussion>The umask controls the default
access mode assigned to newly created files. A umask of 077 limits new files to mode 700
or less permissive. Although umask is often represented as a 4-digit number, the first
digit
+ representing special access modes is typically ignored or required to be
+
0.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><Responsibility>Information
Assurance Officer</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31445r1_fix">Edit "at" jobs or
referenced scripts to remove "umask" commands that set umask to a value less
restrictive than 077.</fixtext>
+ <fix id="F-31445r1_fix" />
+ <check system="C-36190r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine what "at" jobs exist on the system.
Procedure: # ls /var/spool/at If there are no "at" jobs present, this is not
applicable. Determine if any of the "at" jobs or any scripts referenced execute
the "umask" command. Check
+ for any umask setting more permissive than 077. # grep umask <at job or
referenced script> If any "at" job or referenced script sets umask to a
value more permissive than 077, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4367">
+ <title>GEN003460</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37533r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003460</version>
+ <title>The at.allow file must be owned by root, bin, or sys.</title>
+ <description><VulnDiscussion>If the owner of the at.allow file
is not set to root, bin, or sys, unauthorized users could be allowed to view or edit
sensitive information contained within the
+
file.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31448r1_fix">Change the owner of the at.allow
file. # chown root /etc/at.allow</fixtext>
+ <fix id="F-31448r1_fix" />
+ <check system="C-36192r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># ls -lL /etc/at.allow If the at.allow file is not owned by
root, sys, or bin, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4368">
+ <title>GEN003480</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37535r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003480</version>
+ <title>The at.deny file must be owned by root, bin, or sys.</title>
+ <description><VulnDiscussion>If the owner of the at.deny file
is not set to root, bin, or sys, unauthorized users could be allowed to view or edit
sensitive information contained within the
+
file.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31451r1_fix">Change the owner of the at.deny
file. # chown root /etc/at.deny</fixtext>
+ <fix id="F-31451r1_fix" />
+ <check system="C-36194r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># ls -lL /etc/at.deny If the at.deny file is not owned by
root, sys, or bin, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4369">
+ <title>GEN003960</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37463r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003960</version>
+ <title>The traceroute command owner must be root.</title>
+ <description><VulnDiscussion>If the traceroute command owner
has not been set to root, an unauthorized user could use this command to obtain knowledge
of the network topology inside the firewall. This information may allow an attacker to
+ determine trusted routers and other network information potentially leading to
system and network
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31373r1_fix">Change the owner of the traceroute
command to root. Example: # chown root /bin/traceroute</fixtext>
+ <fix id="F-31373r1_fix" />
+ <check system="C-36129r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># ls -lL /bin/traceroute If the traceroute command is not
owned by root, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4370">
+ <title>GEN003980</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37464r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003980</version>
+ <title>The traceroute command must be group-owned by sys, bin, root, or
system.</title>
+ <description><VulnDiscussion>If the group owner of the
traceroute command has not been set to a system group, unauthorized users could have
access to the command and use it to gain information regarding a network's topology
inside of the
+ firewall. This information may allow an attacker to determine trusted routers and
other network information potentially leading to system and network
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31375r1_fix">Change the group-owner of the
traceroute command to root. Procedure: # chgrp root /bin/traceroute</fixtext>
+ <fix id="F-31375r1_fix" />
+ <check system="C-36130r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the traceroute file. Procedure:
# ls -lL /bin/traceroute If the traceroute command is not group-owned by root, sys, bin,
or system, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4371">
+ <title>GEN004000</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37465r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004000</version>
+ <title>The traceroute file must have mode 0700 or less
permissive.</title>
+ <description><VulnDiscussion>If the mode of the traceroute
executable is more permissive than 0700, malicious code could be inserted by an attacker
and triggered whenever the traceroute command is executed by authorized users.
Additionally,
+ if an unauthorized user is granted executable permissions to the traceroute
command, it could be used to gain information about the network topology behind the
firewall. This information may allow an attacker to determine trusted routers and other
+ network information potentially leading to system and network
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31376r1_fix">Change the mode of the traceroute
command. # chmod 0700 /bin/traceroute</fixtext>
+ <fix id="F-31376r1_fix" />
+ <check system="C-36131r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># ls -lL /bin/traceroute If the traceroute command has a
mode more permissive than 0700, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4382">
+ <title>GEN004220</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37469r1_rule" severity="high"
weight="10.0">
+ <version>GEN004220</version>
+ <title>Administrative accounts must not run a web browser, except as needed
for local service administration.</title>
+ <description><VulnDiscussion>If a web browser flaw is exploited
while running as a privileged user, the entire system could be compromised. Specific
exceptions for local service administration should be documented in site-defined policy.
+ These exceptions may include HTTP(S)-based tools used for the administration of the
local system, services, or attached devices. Examples of possible exceptions are HP’s
System Management Homepage (SMH), the CUPS administrative interface, and Sun's
+ StorageTek Common Array Manager (CAM) when these services are running on the local
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31380r1_fix">Enforce policy requiring
administrative accounts use web browsers only for local service
administration.</fixtext>
+ <fix id="F-31380r1_fix" />
+ <check system="C-36135r3_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Look in the root account home directory for a .mozilla
directory. If none exists, this is not a finding. If there is one, verify with the root
users and the IAO the intent of the browsing. If the browsing is not limited to
+ authorized local services administration, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4384">
+ <title>GEN004560</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37505r1_rule" severity="low"
weight="10.0">
+ <version>GEN004560</version>
+ <title>The SMTP service's SMTP greeting must not provide version
information.</title>
+ <description><VulnDiscussion>The version of the SMTP service
can be used by attackers to plan an attack based on vulnerabilities present in the
specific
+
version.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31414r1_fix">Ensure sendmail or Postfix has been
configured to mask the version information. Procedure for sendmail: Change the O
SmtpGreetingMessage line in the /etc/mail/sendmail.cf file as noted below: O
SmtpGreetingMessage=$j
+ Sendmail $v/$Z; $b change it to: O SmtpGreetingMessage= Mail Server Ready ; $b for
Postfix: Examine the "smtpd_banner" line of /etc/postfix/main.conf and remove
any "$mail_version" entry on it or comment the entire "smtpd_banner"
line to use the
+ default value which does not display the version information.</fixtext>
+ <fix id="F-31414r1_fix" />
+ <check system="C-36163r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>To check for the version of either sendmail or Postfix being
displayed in the greeting: # telnet localhost 25 If a version number is displayed, this is
a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4385">
+ <title>GEN004580</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37506r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004580</version>
+ <title>The system must not use .forward files.</title>
+ <description><VulnDiscussion>The .forward file allows users to
automatically forward mail to another system. Use of .forward files could allow the
unauthorized forwarding of mail and could potentially create mail loops which could
degrade
+ system
+
performance.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31416r1_fix">Disable forwarding for sendmail and
remove .forward files from the system Procedure: Edit the /etc/mail/sendmail.mc file to
change the ForwardPath entry to a null path by adding the line
define(`confFORWARD_PATH`,`')
+ rebuild the sendmail.cf file. Remove all .forward files on the system # find /
-name .forward -delete</fixtext>
+ <fix id="F-31416r1_fix" />
+ <check system="C-36165r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check forwarding capability from sendmail. Procedure: grep
"0 ForwardPath" /etc/mail/sendmail.cf If the entry contains a file path, this is
a finding. Search for any .forward in users home directories on the system by: # for
pwline
+ in `cut -d: -f1,6 /etc/passwd`; do homedir=`echo ${pwline}|cut -d:
-f2`;username=`echo ${pwline} | cut -d: -f1`;echo $username `stat -c %n $homedir/.forward
2>null`; done|egrep "\.forward" If any users have a .forward file in
their home
+ directory, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4387">
+ <title>GEN005000</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37549r1_rule" severity="high"
weight="10.0">
+ <version>GEN005000</version>
+ <title>Anonymous FTP accounts must not have a functional
shell.</title>
+ <description><VulnDiscussion>If an anonymous FTP account has
been configured to use a functional shell, attackers could gain access to the shell if the
account is
+
compromised.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31462r1_fix">Configure anonymous FTP accounts to
use a non-functional shell. If necessary, edit the /etc/passwd file to remove any
functioning shells associated with the ftp account and replace them with non-functioning
shells,
+ such as /dev/null.</fixtext>
+ <fix id="F-31462r1_fix" />
+ <check system="C-36203r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the shell for the anonymous FTP account. Procedure: #
grep "^ftp" /etc/passwd This is a finding if the seventh field is empty (the
entry ends with a ':') or if the seventh field does not contain one of the
following:
+ /bin/false /dev/null /usr/bin/false /bin/true
/sbin/nologin</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4392">
+ <title>GEN005380</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37708r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005380</version>
+ <title>If the system is a Network Management System (NMS) server, it must
only run the NMS and any software required by the NMS.</title>
+ <description><VulnDiscussion>Installing extraneous software on
a system designated as a dedicated Network Management System (NMS) server poses a security
threat to the system and the network. Should an attacker gain access to the NMS through
+ unauthorized software, the entire network may be susceptible to malicious
+
activity.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCPA-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001208</ident>
+ <fixtext fixref="F-32073r1_fix">Ensure only authorized software is
loaded on a designated NMS server. Authorized software is limited to the NMS software
itself, a database management system for the NMS server if necessary, and network
management
+ software.</fixtext>
+ <fix id="F-32073r1_fix" />
+ <check system="C-36903r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Ask the SA if this is an NMS server. If it is an NMS server,
then ask what other applications run on it. If there is anything other than network
management software and DBMS software used only for the storage and inquiry of NMS
+ data, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4393">
+ <title>GEN005400</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37707r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005400</version>
+ <title>The /etc/syslog.conf file must be owned by root.</title>
+ <description><VulnDiscussion>If the /etc/syslog.conf file is
not owned by root, unauthorized users could be allowed to view, edit, or delete important
system messages handled by the syslog
+
facility.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32061r1_fix">Use the chown command to set the
owner to root. # chown root /etc/syslog.conf</fixtext>
+ <fix id="F-32061r1_fix" />
+ <check system="C-36904r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/syslog.conf ownership: # ls -lL /etc/syslog.conf
If /etc/syslog.conf is not owned by root, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4394">
+ <title>GEN005420</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37711r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005420</version>
+ <title>The /etc/syslog.conf file must be group-owned by root, bin, sys, or
system.</title>
+ <description><VulnDiscussion>If the group owner of
/etc/syslog.conf is not root, bin, or sys, unauthorized users could be permitted to view,
edit, or delete important system messages handled by the syslog
+
facility.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32088r1_fix">Procedure: # chgrp root
/etc/syslog.conf</fixtext>
+ <fix id="F-32088r1_fix" />
+ <check system="C-36910r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/syslog.conf group ownership. Procedure: # ls -lL
/etc/syslog.conf If /etc/syslog.conf is not group owned by root, sys, bin, or system, this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4395">
+ <title>GEN005460</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37812r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005460</version>
+ <title>The system must only use remote syslog servers (log hosts) that is
justified and documented using site-defined procedures.</title>
+ <description><VulnDiscussion>If a remote log host is in use and
it has not been justified and documented with the IAO, sensitive information could be
obtained by unauthorized users without the SA's knowledge. A remote log host is any
host to
+ which the system is sending syslog messages over a
+
network.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><Responsibility>Information
Assurance
Officer</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32281r1_fix">Remove or document the referenced
undocumented log host.</fixtext>
+ <fix id="F-32281r1_fix" />
+ <check system="C-37014r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Examine the syslog.conf file for any references to remote
log hosts. # grep -v "^#" /etc/syslog.conf | grep '@' Destination
locations beginning with an '@' represent log hosts. If the log host name is a
local alias such as
+ "loghost", consult the /etc/hosts or other name databases as necessary
to obtain the canonical name or address for the log host. Determine if the host referenced
is a log host documented using site-defined procedures. If an undocumented log host
+ is referenced, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4397">
+ <title>GEN005560</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37918r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005560</version>
+ <title>The system must be configured with a default gateway for IPv4 if the
system uses IPv4, unless the system is a router.</title>
+ <description><VulnDiscussion>If a system has no default gateway
defined, the system is at increased risk of man-in-the-middle, monitoring, and Denial of
Service
+
attacks.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32410r1_fix">Set a default gateway for
IPv4.</fixtext>
+ <fix id="F-32410r1_fix" />
+ <check system="C-37145r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system for an IPv4 default route. If the system is
a VM host and acts as a router solely for the benefit of its client systems, then this
rule is not applicable. Procedure: # netstat -r |grep default If a default route is
+ not defined, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4398">
+ <title>GEN005580</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37924r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005580</version>
+ <title>A system used for routing must not run other network services or
applications.</title>
+ <description><VulnDiscussion>Installing extraneous software on
a system designated as a dedicated router poses a security threat to the system and the
network. Should an attacker gain access to the router through the unauthorized software,
+ the entire network is susceptible to malicious
+
activity.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCSP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001208</ident>
+ <fixtext fixref="F-32418r1_fix">Ensure only authorized software is
loaded on a designated router. Authorized software will be limited to the most current
version of routing protocols and SSH for system administration purposes.</fixtext>
+ <fix id="F-32418r1_fix" />
+ <check system="C-37160r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If the system is a VM host and acts as a router solely for
the benefit of its client systems, then this rule is not applicable. Ask the SA if the
system is a designated router. If it is not, this is not applicable. Check the system
+ for non-routing network services. Procedure: # netstat -a | grep -i listen # ps
-ef If non-routing services, including Web servers, file servers, DNS servers, or
applications servers, but excluding management services such as SSH and SNMP, are
+ running on the system, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4399">
+ <title>GEN006380</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37739r1_rule" severity="high"
weight="10.0">
+ <version>GEN006380</version>
+ <title>The system must not use UDP for NIS/NIS+.</title>
+ <description><VulnDiscussion>Implementing Network Information
Service (NIS) or NIS+ under UDP may make the system more susceptible to a Denial of
Service attack and does not provide the same quality of service as
+
TCP.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001436</ident>
+ <fixtext fixref="F-32201r1_fix">Configure the system to not use UDP
for NIS and NIS+. Consult vendor documentation for the required
procedure.</fixtext>
+ <fix id="F-32201r1_fix" />
+ <check system="C-36936r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If the system does not use NIS or NIS+, this is not
applicable. Check if NIS or NIS+ is implemented using UDP. Procedure: # rpcinfo -p | grep
yp | grep udp If NIS or NIS+ is implemented using UDP, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4427">
+ <title>GEN002020</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37437r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002020</version>
+ <title>All .rhosts, .shosts, or host.equiv files must only contain trusted
host-user pairs.</title>
+ <description><VulnDiscussion>If these files are not properly
configured, they could allow malicious access by unknown malicious users from untrusted
hosts who could compromise the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31299r1_fix">If possible, remove the .rhosts,
.shosts, hosts.equiv, and shosts.equiv files. If the files are required, remove any
content from the files except for necessary host-user pairs.</fixtext>
+ <fix id="F-31299r1_fix" />
+ <check system="C-36055r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Locate and examine all r-commands access control files.
Procedure: # find / -name .rhosts # more /<directorylocation>/.rhosts # find
/ -name .shosts # more /<directorylocation>/.shosts # find / -name
hosts.equiv # more
+ /<directorylocation>/hosts.equiv # find / -name shosts.equiv # more
/<directorylocation>/shosts.equiv If any .rhosts, .shosts, hosts.equiv, or
shosts.equiv file contains other than host-user pairs, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4428">
+ <title>GEN002060</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37385r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002060</version>
+ <title>All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible
by only root or the owner.</title>
+ <description><VulnDiscussion>If these files are accessible by
users other than root or the owner, they could be used by a malicious user to set up a
system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31316r1_fix">Ensure the permission for these
files is set to 600 or more restrictive and their owner is root or the same as the owner
of the home directory in which they reside. Procedure: # chmod 600 /etc/hosts.equiv #
chmod 600
+ /etc/ssh/shosts.equiv # chown root /etc/hosts.equiv # chown root
/etc/ssh/shosts.equiv # find / -name .rhosts # chmod 600 /<home
directory>/.rhosts # chown <home directory owner> <home
directory>/.rhosts # find / -name .shosts #
+ chmod 600 <directory location>/.shosts # chown <home directory
owner> <home directory>/.shosts # find / -name .netrc # chmod 600
<directory location>/.netrc # chown <home directory owner>
<home
+ directory>/.netrc</fixtext>
+ <fix id="F-31316r1_fix" />
+ <check system="C-36072r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Procedure: # ls -l /etc/hosts.equiv # ls -l
/etc/ssh/shosts.equiv # find / -name .rhosts # ls -al <home
directory>/.rhosts # find / -name .shosts # ls -al <home
directory>/.shosts # find / -name .netrc # ls -al <home
+ directory>/.netrc If the .rhosts, .shosts, hosts.equiv, or shosts.equiv
files have permissions greater than 600, then this is a finding. If the /etc/hosts.equiv,
or /etc/ssh/shosts.equiv files are not owned by root, this is a finding. Any
+ .rhosts, .shosts and .netrc files outside of home directories have no meaning and
are not subject to this rule If the ~/.rhosts or ~/.shosts are not owned by the owner of
the home directory where they are immediately located or by root, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4430">
+ <title>GEN003260</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27374r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003260</version>
+ <title>The cron.deny file must be owned by root, bin, or sys.</title>
+ <description><VulnDiscussion>Cron daemon control files restrict
the scheduling of automated tasks and must be protected.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-24620r1_fix"># chown root
/etc/cron.deny</fixtext>
+ <fix id="F-24620r1_fix" />
+ <check system="C-28527r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># ls -lL /etc/cron.deny If the cron.deny file is not owned
by root, sys, or bin, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4687">
+ <title>GEN003820</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37441r1_rule" severity="high"
weight="10.0">
+ <version>GEN003820</version>
+ <title>The rsh daemon must not be running.</title>
+ <description><VulnDiscussion>The rshd process provides a
typically unencrypted, host-authenticated remote access service. SSH should be used in
place of this
+
service.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><Responsibility>Information
Assurance
Officer</Responsibility><IAControls>EBRU-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000068</ident>
+ <fixtext fixref="F-31359r1_fix">Edit /etc/xinetd.d/rsh and set
"disable=yes".</fixtext>
+ <fix id="F-31359r1_fix" />
+ <check system="C-36113r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check to see if rshd is configured to run on startup.
Procedure: # grep disable /etc/xinetd.d/rsh If /etc/xinetd.d/rsh exists and rsh is found
to be enabled, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4688">
+ <title>GEN003840</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37443r1_rule" severity="high"
weight="10.0">
+ <version>GEN003840</version>
+ <title>The rexec daemon must not be running.</title>
+ <description><VulnDiscussion>The rexecd process provides a
typically unencrypted, host-authenticated remote access service. SSH should be used in
place of this
+
service.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>Information
+ Assurance
Officer</Responsibility><Responsibility>System
Administrator</Responsibility><IAControls>EBRP-1,
ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001435</ident>
+ <fixtext fixref="F-31361r1_fix">Edit /etc/xinetd.d/rexec and set
"disable=yes"</fixtext>
+ <fix id="F-31361r1_fix" />
+ <check system="C-36115r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># grep disable /etc/xinetd.d/rexec If the service file
exists and is not disabled, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4689">
+ <title>GEN004600</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37507r1_rule" severity="high"
weight="10.0">
+ <version>GEN004600</version>
+ <title>The SMTP service must be an up-to-date version.</title>
+ <description><VulnDiscussion>The SMTP service version on the
system must be current to avoid exposing vulnerabilities present in unpatched
+
versions.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>VIVM-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001230</ident>
+ <fixtext fixref="F-31417r1_fix">Obtain and install a newer version
of the SMTP service software (sendmail or Postfix) from RedHat.</fixtext>
+ <fix id="F-31417r1_fix" />
+ <check system="C-36166r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine the version of the SMTP service software.
Procedure: #rpm -q sendmail RedHat sendmail 8.13.8-8 is the latest required version. If
the RedHat sendmail is installed and the version is not at least 8.13.8-8, this is a
+ finding. #rpm -q postfix RedHat postfix-2.5.1-0.4.rhel5 is the latest required
version. If the postfix is installed and the version is not at least 2-5.1-0.4, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4690">
+ <title>GEN004620</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37508r1_rule" severity="high"
weight="10.0">
+ <version>GEN004620</version>
+ <title>The sendmail server must have the debug feature
disabled.</title>
+ <description><VulnDiscussion>Debug mode is a feature present in
older versions of sendmail which, if not disabled, may allow an attacker to gain access to
a system through the sendmail
+
service.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31418r1_fix">Obtain and install a newer version
of the SMTP service software (sendmail or Postfix) from RedHat.</fixtext>
+ <fix id="F-31418r1_fix" />
+ <check system="C-36167r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for an enabled "debug" command provided by
the SMTP service. Procedure: # telnet localhost 25 debug If the command does not return a
500 error code of "command unrecognized" or a 550 error code of "access
denied", this is a
+ finding. The RHEL distribution ships with sendmail Version 8.13.8 which is not
vulnerable. This should never be a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4691">
+ <title>GEN004640</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37509r1_rule" severity="high"
weight="10.0">
+ <version>GEN004640</version>
+ <title>The SMTP service must not have a uudecode alias active.</title>
+ <description><VulnDiscussion>A common configuration for older
Mail Transfer Agents (MTAs) is to include an alias for the decode user. All mail sent to
this user is sent to the uudecode program, which automatically converts and stores files.
+ By sending mail to the decode or the uudecode aliases present on some systems, a
remote attacker may be able to create or overwrite files on the remote host. This could
possibly be used to gain remote
+
access.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001230</ident>
+ <fixtext fixref="F-31420r1_fix">Disable mail aliases for decode and
uudecode. If the /etc/aliases or /usr/lib/aliases (mail alias) file contains entries for
these programs, remove them or disable them by placing "#" at the beginning of
the line,
+ and then executing the new aliases command. For more information on mail aliases,
refer to the man page for aliases. Disabled aliases would be similar to these examples: #
decode: |/usr/bin/uudecode # uudecode: |/usr/bin/uuencode -d</fixtext>
+ <fix id="F-31420r1_fix" />
+ <check system="C-36169r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the SMTP service for an active "decode"
command. Procedure: # telnet localhost 25 decode If the command does not return a 500
error code of "command unrecognized", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4692">
+ <title>GEN004660</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37510r1_rule" severity="low"
weight="10.0">
+ <version>GEN004660</version>
+ <title>The SMTP service must not have the EXPN feature active.</title>
+ <description><VulnDiscussion>The SMTP EXPN function allows an
attacker to determine if an account exists on a system, providing significant assistance
to a brute force attack on user accounts. EXPN may also provide additional information
+ concerning users on the system, such as the full names of account
owners.</VulnDiscussion><FalsePositives>False positives may
occur with the SMTP EXPN check. According to RFC821, it is acceptable for a server to
respond with a 250
+ (success) or 550 (failure) when the server supports the EXPN command. For example,
some servers return "550 EXPN command not available," meaning the command is not
supported and the machine is not vulnerable. However, a result of "550 that is a
+ mailing list, not a user" would be a failure code, but not an indication of an
error, and the machine would be vulnerable. If a false positive is suspected, check the
log file for the response from the
+
server.</FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31421r1_fix">Rebuild /etc/mail/sendmail.cf with
the "noexpn" Privacy Flag set. Procedure: Edit /etc/mail/sendmail.mc resetting
the Privacy Flags to the default: define('confPRIVACYFLAGS',
+ 'authwarnings,novrfy,noexpn,restrictqrun')dnl Rebuild the sendmail.cf file
with: # make -C /etc/mail Restart the sendmail service. # service sendmail
restart</fixtext>
+ <fix id="F-31421r1_fix" />
+ <check system="C-36170r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>This vulnerability is applicable only to sendmail. If
Postfix is the SMTP service for the system this will never be a finding. Procedure:
Determine if EXPN is disabled. # grep -v "^#" /etc/mail/sendmail.cf |grep -i
PrivacyOptions
+ If nothing is returned or the returned line does not contain "noexpn",
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4693">
+ <title>GEN004680</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37511r1_rule" severity="low"
weight="10.0">
+ <version>GEN004680</version>
+ <title>The SMTP service must not have the Verify (VRFY) feature
active.</title>
+ <description><VulnDiscussion>The VRFY command allows an
attacker to determine if an account exists on a system, providing significant assistance
to a brute force attack on user accounts. VRFY may provide additional information about
users on
+ the system, such as the full names of account
+
owners.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31422r1_fix">Add the "novrfy" flag to
your sendmail in /etc/mail/sendmail.cf. Procedure: Edit the definition of
"confPRIVACY_FLAGS" in /etc/mail/sendmail.mc to include "novrfy".
Rebuild the sendmail.cf file with: # make -C
+ /etc/mail Restart the sendmail service. # service sendmail restart</fixtext>
+ <fix id="F-31422r1_fix" />
+ <check system="C-36171r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if VRFY is disabled. Procedure: # telnet localhost
25 vrfy root If the command does not return a 500 error code of "command
unrecognized", this is a finding. or: # grep -v "^#" /etc/mail/sendmail.cf
|grep -i vrfy Verify
+ the VRFY command is disabled with an entry in the sendmail.cf file. The entry
could be any one of "Opnovrfy", "novrfy", or "goaway", which
could also have other options included, such as "noexpn". The "goaway"
argument encompasses many things,
+ such as "novrfy" and "noexpn". If no setting to disable VRFY
is found, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4694">
+ <title>GEN004700</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37513r1_rule" severity="low"
weight="10.0">
+ <version>GEN004700</version>
+ <title>The sendmail service must not have the wizard backdoor
active.</title>
+ <description><VulnDiscussion>Very old installations of the
Sendmail mailing system contained a feature whereby a remote user connecting to the SMTP
port can enter the WIZ command and be given an interactive shell with root
+
privileges.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31423r1_fix">If the WIZ command exists on
sendmail then the version of sendmail is archaic and should be replaced with the latest
version from RedHat. WIZ is not available on any sendmail distrubution of RHEL. However,If
the WIZ
+ command is enabled on sendmail, it should be disabled by adding this line to the
sendmail.cf configuration file (note that it must be typed in uppercase): OW* For the
change to take effect, kill the sendmail process, refreeze the sendmail.cf file,
+ and restart the sendmail process.</fixtext>
+ <fix id="F-31423r1_fix" />
+ <check system="C-36172r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Log into the sendmail server with telnet and test the
"wiz" commmand" Procedure: # telnet localhost 25 Trying 127.0.0.1...
Connected to locahost.localdomain (127.0.0.1). Escape character ... Once the telnet
greeting is complete
+ type: wiz If you do not get a "Command unrecognized: " message, this is
a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4695">
+ <title>GEN005140</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37676r1_rule" severity="high"
weight="10.0">
+ <version>GEN005140</version>
+ <title>Any active TFTP daemon must be authorized and approved in the system
accreditation package.</title>
+ <description><VulnDiscussion>TFTP is a file transfer protocol
often used by embedded systems to obtain configuration data or software. The service is
unencrypted and does not require authentication of requests. Data available using this
+ service may be subject to unauthorized access or
+
interception.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><Responsibility>Information
Assurance
Officer</Responsibility><IAControls>DCSW-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31806r1_fix">Document or Disable the TFTP
daemon. If the TFTP daemon is necessary on the system, document and justify its usage for
approval from the IAO. If the TFTP daemon is not necessary on the system, turn it off. #
+ chkconfig tftp off # service xinetd restart</fixtext>
+ <fix id="F-31806r1_fix" />
+ <check system="C-36864r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if the TFTP daemon is active. # chkconfig --list |
grep tftp If TFTP is found enabled ("on") and not documented using site-defined
procedures, it is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4696">
+ <title>GEN005280</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37688r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005280</version>
+ <title>The system must not have the UUCP service active.</title>
+ <description><VulnDiscussion>The UUCP utility is designed to
assist in transferring files, executing remote commands, and sending e-mail between UNIX
systems over phone lines and direct connections between systems. The UUCP utility is a
+ primitive and arcane system with many security issues. There are alternate data
transfer utilities/products that can be configured to more securely transfer data by
providing for authentication as well as
+
encryption.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001436</ident>
+ <fixtext fixref="F-31895r1_fix"># chkconfig uucp off # service uucp
stop # service xinetd restart</fixtext>
+ <fix id="F-31895r1_fix" />
+ <check system="C-36881r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># service uucp status if UUCP is "running", this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4697">
+ <title>GEN005200</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37683r1_rule" severity="high"
weight="10.0">
+ <version>GEN005200</version>
+ <title>X displays must not be exported to the world.</title>
+ <description><VulnDiscussion>Open X displays allow an attacker
to capture keystrokes and to execute commands remotely. Many users have their X Server set
to “xhost +”, permitting access to the X Server by anyone, from
+
anywhere.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31847r1_fix">If using an xhost-type
authentication the "xhost -" command can be used to remove current trusted hosts
and then selectively allow only trusted hosts to connect with "xhost +"
commands. A cryptographically secure
+ authentication, such as provided by the xauth program, is always preferred. Refer
to your X11 server's documentation for further security information.</fixtext>
+ <fix id="F-31847r1_fix" />
+ <check system="C-36872r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If Xwindows is not used on the system, this is not
applicable. Check the output of the "xhost" command from an X terminal.
Procedure: # xhost If the output reports access control is enabled (and possibly lists the
hosts able to
+ receive X window logins), this is not a finding. If the xhost command returns a
line indicating access control is disabled, this is a finding. Note: It may be necessary
to define the display if the command reports it cannot open the display.
+ Procedure: $ DISPLAY=MachineName:0.0; export DISPLAY MachineName may be replaced
with an Internet Protocol Address. Repeat the check procedure after setting the
display.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4701">
+ <title>GEN003860</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37445r1_rule" severity="low"
weight="10.0">
+ <version>GEN003860</version>
+ <title>The system must not have the finger service active.</title>
+ <description><VulnDiscussion>The finger service provides
information about the system's users to network clients. This information could expose
more information for potential used in subsequent
+
attacks.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>DCPP-1,
EBRU-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31363r1_fix">Edit /etc/xinetd.d/finger and set
"disable=yes"</fixtext>
+ <fix id="F-31363r1_fix" />
+ <check system="C-36117r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># grep disable /etc/xinetd.d/finger If the finger service is
not disabled, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-4702">
+ <title>GEN004840</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37528r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004840</version>
+ <title>If the system is an anonymous FTP server, it must be isolated to the
DMZ network.</title>
+ <description><VulnDiscussion>Anonymous FTP is a public data
service which is only permitted in a server capacity when located on the DMZ
+
network.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><Responsibility>Information
Assurance Officer</Responsibility><IAControls>EBBD-1, EBBD-2,
EBBD-3, ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000787</ident>
+ <fixtext fixref="F-31442r1_fix">Remove anonymous ftp capability or
move the system to a DMZ network.</fixtext>
+ <fix id="F-31442r1_fix" />
+ <check system="C-36187r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Use the command "ftp" to connect the system's
FTP service. Attempt to log into this host with a user name of anonymous and a password of
guest (also try the password of guest(a)mail.com). If the logon is not successful, this
check is
+ Not Applicable. Ask the SA if the system is located on a DMZ network. If the
system is not located on a DMZ network, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11940">
+ <title>GEN000100</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27049r1_rule" severity="high"
weight="10.0">
+ <version>GEN000100</version>
+ <title>The operating system must be a supported release.</title>
+ <description><VulnDiscussion>An operating system release is
considered "supported" if the vendor continues to provide security patches for
the product. With an unsupported release, it will not be possible to resolve security
issues discovered
+ in the system
+
software.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance>If
an
+ extended support agreement provides security patches for the unsupported product is
procured from the vendor, this finding may be downgraded to a CAT
+
III.</SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>VIVM-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001230</ident>
+ <fixtext fixref="F-11211r2_fix">Upgrade to a supported version of
the operating system.</fixtext>
+ <fix id="F-11211r2_fix" />
+ <check system="C-27963r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the version of the operating system. Example: # cat
/etc/redhat-release Vendor End-of-Support Information: Red Hat Enterprise 5: 31 Mar 2014
Check with the vendor for additional information. If the version installed is not
+ supported, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11945">
+ <title>GEN000220</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-38178r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000220</version>
+ <title>A file integrity tool must be used at least weekly to check for
unauthorized file changes, particularly the addition of unauthorized system libraries or
binaries, or for unauthorized modification to authorized system libraries or
+ binaries.</title>
+ <description><VulnDiscussion>Changes in system libraries,
binaries and other critical system files can indicate compromise or significant system
events such as patching needing to be checked by automated processes and the results
reviewed by
+ the SA. NOTE: For MAC I systems, increase the frequency to
+
daily.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCSL-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001069</ident>
+ <fixtext fixref="F-32806r2_fix">Establish an automated job,
scheduled to run weekly or more frequently, to run "aide --check" which is the
file integrity tool to check for unauthorized system libraries or binaries. NOTE: For MAC
I systems, increase
+ the frequency to daily.</fixtext>
+ <fix id="F-32806r2_fix" />
+ <check system="C-37562r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if there is an automated job, scheduled to run
weekly or more frequently, to run the file integrity tool to check for unauthorized
additions to system libraries. The check can be done using Advanced Intrusion Detection
+ Environment (AIDE) which is part of the Red Hat Enterprise Linux (RHEL)
distribution. Other file integrity software may be used but must be checked manually.
Procedure: Check the root crontab (crontab -l) and the global crontabs in /etc/crontab,
+ /etc/cron.d/* for the presence of an "aide" job to run at least weekly,
which should have asterisks (*) in columns 3, 4, and 5. Check the weekly cron directory
(/etc/cron.weekly) for any script running "aide --check" or "aide -C"
or simply
+ "aide". If there is not, this is a finding. NOTE: For MAC I systems,
increase the frequency to daily.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11946">
+ <title>GEN000340</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37155r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000340</version>
+ <title>UIDs reserved for system accounts must not be assigned to non-system
accounts.</title>
+ <description><VulnDiscussion>Reserved UIDs are typically used
by system software packages. If non-system accounts have UIDs in this range, they may
conflict with system software, possibly leading to the user having permissions to modify
+ system
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31119r1_fix">Change the UID numbers for
non-system accounts with reserved UIDs (those less or equal to 499).</fixtext>
+ <fix id="F-31119r1_fix" />
+ <check system="C-35863r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the UID assignments for all accounts. # cut -d: -f 1,3
/etc/passwd | egrep ":[1-4][0-9]{2}$|:[0-9]{1,2}$" Confirm all accounts with a
UID of 499 and below are used by a system account. If a UID reserved for system accounts
(0
+ - 499) is used by a non-system account, then this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11947">
+ <title>GEN000580</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37260r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000580</version>
+ <title>The system must require passwords contain a minimum of 14
characters.</title>
+ <description><VulnDiscussion>The use of longer passwords
reduces the ability of attackers to successfully obtain valid passwords using guessing or
exhaustive search techniques by increasing the password search
+
space.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000205</ident>
+ <fixtext fixref="F-31206r1_fix">Edit
"/etc/pam.d/system-auth" to include the line: password required pam_cracklib.so
minlen=14 prior to the "password include system-auth-ac" line.</fixtext>
+ <fix id="F-31206r1_fix" />
+ <check system="C-35950r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system password length setting. Procedure: Check
the password minlen option # grep pam_cracklib.so /etc/pam.d/system-auth Confirm the
minlen option is set to at least 14 as in the example below: password required
+ pam_cracklib.so minlen=14 There may be other options on the line. If no such line
is found, or the minlen is less than 14 this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11948">
+ <title>GEN000600</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-41826r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000600</version>
+ <title>The system must require passwords contain at least one uppercase
alphabetic character.</title>
+ <description><VulnDiscussion>To enforce the use of complex
passwords, minimum numbers of characters of different classes are mandated. The use of
complex passwords reduces the ability of attackers to successfully obtain valid passwords
using
+ guessing or exhaustive search techniques. Complexity requirements increase the
password search space by requiring users to construct passwords from a larger character
set than they may otherwise
+
use.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000192</ident>
+ <fixtext fixref="F-35446r1_fix">Edit
"/etc/pam.d/system-auth" to include the line: password required pam_cracklib.so
ucredit=-1 prior to the "password include system-auth-ac" line.</fixtext>
+ <fix id="F-35446r1_fix" />
+ <check system="C-40120r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ucredit setting. # grep ucredit
/etc/pam.d/system-auth If ucredit is not set to -1, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11972">
+ <title>GEN000620</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37281r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000620</version>
+ <title>The system must require passwords contain at least one numeric
character.</title>
+ <description><VulnDiscussion>To enforce the use of complex
passwords, minimum numbers of characters of different classes are mandated. The use of
complex passwords reduces the ability of attackers to successfully obtain valid passwords
using
+ guessing or exhaustive search techniques. Complexity requirements increase the
password search space by requiring users to construct passwords from a larger character
set than they may otherwise
+
use.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000194</ident>
+ <fixtext fixref="F-31227r1_fix">Edit
"/etc/pam.d/system-auth" to include the line: password required pam_cracklib.so
dcredit=-1 prior to the "password include system-auth-ac" line.</fixtext>
+ <fix id="F-31227r1_fix" />
+ <check system="C-35972r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the dcredit setting. Procedure: Check the password
dcredit option # grep pam_cracklib.so /etc/pam.d/system-auth Confirm the dcredit option is
set to -1 as in the example: password required pam_cracklib.so dcredit=-1 There may
+ be other options on the line. If no such line is found, or the dcredit option is
not -1 this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11973">
+ <title>GEN000640</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37287r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000640</version>
+ <title>The system must require passwords contain at least one special
character.</title>
+ <description><VulnDiscussion>To enforce the use of complex
passwords, minimum numbers of characters of different classes are mandated. The use of
complex passwords reduces the ability of attackers to successfully obtain valid passwords
using
+ guessing or exhaustive search techniques. Complexity requirements increase the
password search space by requiring users to construct passwords from a larger character
set than they may otherwise
+
use.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001619</ident>
+ <fixtext fixref="F-31235r1_fix">Edit
"/etc/pam.d/system-auth" to include the line: password required pam_cracklib.so
ocredit=-1 prior to the "password include system-auth-ac" line.</fixtext>
+ <fix id="F-31235r1_fix" />
+ <check system="C-35981r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ocredit setting. Procedure: Check the password
ocredit option # grep pam_cracklib.so /etc/pam.d/system-auth Confirm the ocredit option is
set to -1 as in the example: password required pam_cracklib.so ocredit=-1 There may
+ be other options on the line. If no such line is found, or the ocredit is not -1
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11975">
+ <title>GEN000680</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37294r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000680</version>
+ <title>The system must require passwords contain no more than three
consecutive repeating characters.</title>
+ <description><VulnDiscussion>To enforce the use of complex
passwords, the number of consecutive repeating characters is limited. Passwords with
excessive repeated characters may be more vulnerable to password-guessing
+
attacks.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31243r1_fix">Edit
"/etc/pam.d/system-auth" to include the line: password required pam_cracklib.so
maxrepeat=3 prior to the "password include system-auth-ac"
line.</fixtext>
+ <fix id="F-31243r1_fix" />
+ <check system="C-35986r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the maxrepeat setting. Procedure: Check the password
maxrepeat configuration # grep pam_cracklib.so /etc/pam.d/system-auth If the maxrepeat
option is missing, this is a finding. If the maxrepeat option is set to more than 3,
+ this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11976">
+ <title>GEN000700</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37298r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000700</version>
+ <title>User passwords must be changed at least every 60 days.</title>
+ <description><VulnDiscussion>Limiting the lifespan of
authenticators limits the period of time an unauthorized user has access to the system
while using compromised credentials and reduces the period of time available for
password-guessing
+ attacks to run against a single
+
password.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000180</ident>
+ <fixtext fixref="F-31246r1_fix">Set the max days field to 60 for
all user accounts. # passwd -x 60 <user></fixtext>
+ <fix id="F-31246r1_fix" />
+ <check system="C-35993r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the max days field (the 5th field) of /etc/shadow. #
more /etc/shadow If the max days field is equal to 0 or greater than 60 for any user, this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11977">
+ <title>GEN000740</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37302r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000740</version>
+ <title>All non-interactive/automated processing account passwords must be
changed at least once per year or be locked.</title>
+ <description><VulnDiscussion>Limiting the lifespan of
authenticators limits the period of time an unauthorized user has access to the system
while using compromised credentials and reduces the period of time available for
password-guessing
+ attacks to run against a single password. Locking the password for non-interactive
and automated processing accounts is preferred as it removes the possibility of accessing
the account by a password. On some systems, locking the passwords of these
+ accounts may prevent the account from functioning properly. Passwords for
non-interactive/automated processing accounts must not be used for direct logon to the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000199</ident>
+ <fixtext fixref="F-31249r2_fix">Implement or establish procedures
to change the passwords of automated processing accounts at least once per year or lock
them.</fixtext>
+ <fix id="F-31249r2_fix" />
+ <check system="C-35997r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Ask the SA if there are any automated processing accounts on
the system. If there are automated processing accounts on the system, ask the SA if the
passwords for those automated accounts are changed at least once a year or are
+ locked. If SA indicates passwords for automated processing accounts are not
changed once per year or are not locked, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11979">
+ <title>GEN001020</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37377r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001020</version>
+ <title>The root account must not be used for direct log in.</title>
+ <description><VulnDiscussion>Direct login with the root account
prevents individual user accountability. Acceptable non-routine uses of the root account
for direct login are limited to emergency maintenance, the use of single-user mode for
+ maintenance, and situations where individual administrator accounts are not
+
available.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECPA-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000770</ident>
+ <fixtext fixref="F-31308r1_fix">Enforce policy requiring all root
account access is attained by first logging into a user account and then becoming root
preferably through the use of "sudo" which provides traceability to the command
level. If that
+ is not workable then using "su" to access the root account will provide
traceability to the login user.</fixtext>
+ <fix id="F-31308r1_fix" />
+ <check system="C-36064r3_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check if root is used for direct logins. Procedure: # last
root | grep -v reboot If any direct login records for root are listed, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11980">
+ <title>GEN001060</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37378r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001060</version>
+ <title>The system must log successful and unsuccessful access to the root
account.</title>
+ <description><VulnDiscussion>If successful and unsuccessful
logins and logouts are not monitored or recorded, access attempts cannot be tracked.
Without this logging, it may be impossible to track unauthorized access to the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-31309r1_fix">Troubleshoot the system logging
configuration to provide for logging of root account login attempts. Procedure: Edit
/etc/syslog.conf to make sure "authpriv.*" messages are directed to a file or
remote system.
+ Examine /etc/audit/audit.rules to ensure user authentication messages have not been
specifically excluded. There remove any entries that correspond to: -a exclude,never
-Fmsgtype=USER_START -a exclude,never -Fmsgtype=USER_LOGIN -a exclude,never
+ -Fmsgtype=USER_AUTH -a exclude,never -Fmsgtype=USER_END -a exclude,never
-Fmsgtype=USER_ACCT</fixtext>
+ <fix id="F-31309r1_fix" />
+ <check system="C-36065r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the log files to determine if access to the root
account is being logged. Procedure: Examine /etc/syslog.conf to confirm the location to
which "authpriv" messages will be directed. The default syslog.conf uses
+ /var/log/messages and /var/log/secure but this needs to be confirmed. # grep @
/etc/syslog.conf If a line starting with "*.*" is returned then all syslog
messages will be sent to system whose address appears after the "@". In this
case syslog may
+ or may not be configured to also log "authpriv" messages locally. #
grep authpriv /etc/syslog.conf If any lines are returned which do not start with
"#" the "authpriv" messages will be sent to the indicated files or
remote systems. Try to "su -"
+ and enter an incorrect password. If there are no records indicating the
authentication failure, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11981">
+ <title>GEN001720</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37275r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001720</version>
+ <title>All global initialization files must have mode 0644 or less
permissive.</title>
+ <description><VulnDiscussion>Global initialization files are
used to configure the user's shell environment upon login. Malicious modification of
these files could compromise accounts upon
+
logon.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31223r1_fix">Change the mode of the global
initialization file(s) to 0644. # chmod 0644 <global initialization
file></fixtext>
+ <fix id="F-31223r1_fix" />
+ <check system="C-35967r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check global initialization files permissions: # ls -l
/etc/bashrc # ls -l /etc/csh.cshrc # ls -l /etc/csh.login # ls -l /etc/csh.logout # ls -l
/etc/environment # ls -l /etc/ksh.kshrc # ls -l /etc/profile # ls -l /etc/suid_profile
+ # ls -l /etc/profile.d/* If global initialization files are more permissive than
0644, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11982">
+ <title>GEN001740</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37283r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001740</version>
+ <title>All global initialization files must be owned by root.</title>
+ <description><VulnDiscussion>Global initialization files are
used to configure the user's shell environment upon login. Malicious modification of
these files could compromise accounts upon logon. Failure to give ownership of sensitive
files
+ or utilities to root or bin provides the designated owner and unauthorized users
with the potential to access sensitive information or change the system configuration
which could weaken the system's security
+
posture.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31229r1_fix">Change the ownership of global
initialization files with incorrect ownership. Procedure: # chown root <global
initialization files> or: # ls etc/bashrc /etc/csh.cshrc /etc/csh.login
/etc/csh.logout
+ /etc/environment /etc/ksh.kshrc /etc/profile /etc/suid_profile /etc/profile.d/*
2>null|xargs stat -L -c %U:%n|egrep -v "^root"|cut -d: -f2|xargs chown
root will set the owner of all files not currently owned by root to root.</fixtext>
+ <fix id="F-31229r1_fix" />
+ <check system="C-35974r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of global initialization files.
Procedure: # ls -lL etc/bashrc /etc/csh.cshrc /etc/csh.login /etc/csh.logout
/etc/environment /etc/ksh.kshrc /etc/profile /etc/suid_profile /etc/profile.d/* This
should show
+ information for each file. Examine to ensure the owner is always root or: # ls
etc/bashrc /etc/csh.cshrc /etc/csh.login /etc/csh.logout /etc/environment /etc/ksh.kshrc
/etc/profile /etc/suid_profile /etc/profile.d/* 2>null|xargs stat -L -c
+ %U:%n|egrep -v "^root" This will show you only the owner and filename
of files not owned by root. If any global initialization file is not owned by root, this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11983">
+ <title>GEN001760</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37285r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001760</version>
+ <title>All global initialization files must be group-owned by root, sys, bin,
other, system, or the system default.</title>
+ <description><VulnDiscussion>Global initialization files are
used to configure the user's shell environment upon login. Malicious modification of
these files could compromise accounts upon logon. Failure to give ownership of sensitive
files
+ or utilities to root or bin provides the designated owner and unauthorized users
with the potential to access sensitive information or change the system configuration
which could weaken the system's security
+
posture.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31232r1_fix">Change the group ownership of the
global initialization file(s) with incorrect group ownership. Procedure: # chgrp root
<global initialization file> or: # ls -lL /etc/bashrc /etc/csh.cshrc
/etc/csh.login
+ /etc/csh.logout /etc/environment /etc/ksh.kshrc /etc/profile /etc/suid_profile
/etc/profile.d/* 2>null|sed "s/^[^\/]*//"|xargs stat -L -c %G:%n|egrep -v
"^(root|sys|bin|other):"|cut -d: -f2|xargs chgrp root will set the group of all
files not
+ currently owned by an approved group to root.</fixtext>
+ <fix id="F-31232r1_fix" />
+ <check system="C-35979r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of global initialization files.
Procedure: # ls -lL etc/bashrc /etc/csh.cshrc /etc/csh.login /etc/csh.logout
/etc/environment /etc/ksh.kshrc /etc/profile /etc/suid_profile /etc/profile.d/* This
should show
+ information for each file. Examine to ensure the group is always root or: # ls
-lL etc/bashrc /etc/csh.cshrc /etc/csh.login /etc/csh.logout /etc/environment
/etc/ksh.kshrc /etc/profile /etc/suid_profile /etc/profile.d/* 2>null|sed
+ "s/^[^\/]*//"|xargs stat -L -c %G:%n|egrep -v
"^(root|sys|bin|other):" will show you only the group and filename of files not
owned by one of the approved groups. If any global initialization file is not group-owned
by root, sys, bin, other,
+ system, or the system default, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11984">
+ <title>GEN001820</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37300r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001820</version>
+ <title>All skeleton files and directories (typically in /etc/skel) must be
owned by root or bin.</title>
+ <description><VulnDiscussion>If the skeleton files are not
protected, unauthorized personnel could change user startup parameters and possibly
jeopardize user files. Failure to give ownership of sensitive files or utilities to root
or bin
+ provides the designated owner and unauthorized users with the potential to access
sensitive information or change the system configuration which could weaken the
system's security
+
posture.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31248r1_fix">Change the ownership of skeleton
files with incorrect mode: # chown root <skeleton file> or # ls -L
/etc/skel|xargs stat -L -c %U:%n|egrep -v "^(root|bin):"|cut -d: -f2|chown root
will change all files not
+ owned by root or bin to root.</fixtext>
+ <fix id="F-31248r1_fix" />
+ <check system="C-35995r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check skeleton files ownership. # ls -alL /etc/skel If a
skeleton file is not owned by root or bin, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11985">
+ <title>GEN001840</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37420r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001840</version>
+ <title>All global initialization files' executable search paths must
contain only absolute paths.</title>
+ <description><VulnDiscussion>The executable search path
(typically the PATH environment variable) contains a list of directories for the shell to
search to find executables. If this path includes the current working directory or other
+ relative paths, executables in these directories may be executed instead of system
commands. This variable is formatted as a colon-separated list of directories. If there is
an empty entry, such as a leading or trailing colon, or two consecutive
+ colons, this is interpreted as the current working directory. Paths starting with a
slash (/) are absolute
+
paths.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31187r1_fix">Edit the global initialization
file(s) with PATH variables containing relative paths. Edit the file and remove the
relative path from the PATH variable.</fixtext>
+ <fix id="F-31187r1_fix" />
+ <check system="C-35932r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the global initialization files' executable search
paths. Procedure: # grep PATH /etc/bashrc /etc/csh.cshrc /etc/csh.login /etc/csh.logout
/etc/environment /etc/ksh.kshrc /etc/profile /etc/suid_profile /etc/profile.d/* This
+ variable is formatted as a colon-separated list of directories. If there is an
empty entry, such as a leading or trailing colon, or two consecutive colons, this is a
finding. If an entry begins with a character other than a slash (/) this is a
+ relative path, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11986">
+ <title>GEN001900</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37432r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001900</version>
+ <title>All local initialization files' executable search paths must
contain only absolute paths.</title>
+ <description><VulnDiscussion>The executable search path
(typically the PATH environment variable) contains a list of directories for the shell to
search to find executables. If this path includes the current working directory or other
+ relative paths, executables in these directories may be executed instead of system
commands. This variable is formatted as a colon-separated list of directories. If there is
an empty entry, such as a leading or trailing colon, or two consecutive
+ colons, this is interpreted as the current working directory. Paths starting with a
slash (/) are absolute
+
paths.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31242r1_fix">Edit the local initialization file
and remove the relative path entry from the executable search path variable. If this is
not feasable, justify and document the necessity of having the relative path for a
specific
+ application.</fixtext>
+ <fix id="F-31242r1_fix" />
+ <check system="C-35985r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify local initialization files have executable search
path containing only absolute paths or relative paths are necessary and documented.
Procedure: # cut -d: -f6 /etc/passwd |xargs -n1 -IDIR find DIR -name ".*" -type
f
+ -maxdepth 1 -exec grep -l PATH {} \; This variable is formatted as a
colon-separated list of directories. If there is an empty entry, such as a leading or
trailing colon, or two consecutive colons, this is a finding. If an entry begins with a
+ character other than a slash (/) this is a relative path, ask the SA or IAt if
the relative path is required for the operation of a specific application. If it is not
then this is a finding. finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11987">
+ <title>GEN001980</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37435r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001980</version>
+ <title>The .rhosts, .shosts, hosts.equiv, shosts.equiv, /etc/passwd,
/etc/shadow, and/or /etc/group files must not contain a plus (+) without defining entries
for NIS+ netgroups.</title>
+ <description><VulnDiscussion>A plus (+) in system accounts
files causes the system to lookup the specified entry using NIS. If the system is not
using NIS, no such entries should
+
exist.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31292r1_fix">Edit the .rhosts, .shosts,
hosts.equiv, shosts.equiv, /etc/passwd, /etc/shadow, and/or /etc/group files and remove
entries containing a plus (+).</fixtext>
+ <fix id="F-31292r1_fix" />
+ <check system="C-36048r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check system configuration files for plus (+) entries.
Procedure: # find / -name .rhosts # grep + /<directorylocation>/.rhosts #
find / -name .shosts # grep + /<directorylocation>/.shosts # find / -name
hosts.equiv #
+ grep + /<directorylocation>/hosts.equiv # find / -name shosts.equiv
# grep + /<directorylocation>/shosts.equiv # grep + /etc/passwd # grep +
/etc/shadow # grep + /etc/group If the .rhosts, .shosts, hosts.equiv, shosts.equiv,
+ /etc/passwd, /etc/shadow, and/or /etc/group files contain a plus (+) and do not
define entries for NIS+ netgroups, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11988">
+ <title>GEN002040</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37370r1_rule" severity="high"
weight="10.0">
+ <version>GEN002040</version>
+ <title>There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files
on the system.</title>
+ <description><VulnDiscussion>The .rhosts, .shosts, hosts.equiv,
and shosts.equiv files are used to configure host-based authentication for individual
users or the system. Host-based authentication is not sufficient for preventing
unauthorized
+ access to the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><Responsibility>Information
Assurance Officer</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31301r1_fix">Remove all the r-commands access
control files. Procedure: # find / -name .rhosts -exec rm {} \; # find / -name .shosts
-exec rm {} \; # find / -name hosts.equiv -exec rm {} \; # find / -name shosts.equiv -exec
rm {}
+ \;</fixtext>
+ <fix id="F-31301r1_fix" />
+ <check system="C-36057r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for the existence of the files. # find / -name .rhosts
# find / -name .shosts # find / -name hosts.equiv # find / -name shosts.equiv If .rhosts,
.shosts, hosts.equiv, or shosts.equiv are found and their use has not been
+ documented and approved by the IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11989">
+ <title>GEN002100</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37389r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002100</version>
+ <title>The .rhosts file must not be supported in PAM.</title>
+ <description><VulnDiscussion>.rhosts files are used to specify
a list of hosts permitted remote access to a particular account without authenticating.
The use of such a mechanism defeats strong identification and authentication
+
requirements.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>Information
+ Assurance
Officer</Responsibility><Responsibility>System
Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31319r1_fix">Edit the file(s) in /etc/pam.d
referencing the rhosts_auth module, and remove the references to the rhosts_auth
module.</fixtext>
+ <fix id="F-31319r1_fix" />
+ <check system="C-36075r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the PAM configuration for rhosts_auth. Example: # grep
rhosts_auth /etc/pam.d/* If a rhosts_auth entry is found, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11990">
+ <title>GEN002540</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37893r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002540</version>
+ <title>All public directories must be group-owned by root, sys, bin, or an
application group.</title>
+ <description><VulnDiscussion>If a public directory has the
sticky bit set and is not group-owned by a privileged GID, unauthorized users may be able
to modify files created by others. The only authorized public directories are those
temporary
+ directories supplied with the system or those designed to be temporary file
repositories. The setting is normally reserved for directories used by the system and by
users for temporary file storage, (e.g., /tmp), and for directories requiring
+ global read/write
+
access.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32387r1_fix">Change the group-ownership of the
public directory. Procedure: # chgrp root /tmp (Replace root with a different system group
and/or /tmp with a different public directory as necessary.)</fixtext>
+ <fix id="F-32387r1_fix" />
+ <check system="C-37119r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group-ownership of public directories. Procedure:
# find / -type d -perm -1002 -exec ls -ld {} \; If any public directory is not group-owned
by root, sys, bin, or an application group, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11994">
+ <title>GEN003040</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37392r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003040</version>
+ <title>Crontabs must be owned by root or the crontab creator.</title>
+ <description><VulnDiscussion>To protect the integrity of
scheduled system jobs and prevent malicious modification to these jobs, crontab files must
be
+
secured.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCSL-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31322r1_fix">Change the crontab owner to root or
the crontab creator. # chown root <crontab file> or # chown
<user> <crontab file></fixtext>
+ <fix id="F-31322r1_fix" />
+ <check system="C-36076r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>List all crontabs on the system. # ls -lL /var/spool/cron #
ls -lL /etc/cron.d /etc/crontab /etc/cron.daily /etc/cron.hourly /etc/cron.monthly
/etc/cron.weekly or # ls -lL /etc/cron*|grep -v deny If any crontab is not owned by root
+ or the creating user, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11995">
+ <title>GEN003060</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27338r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003060</version>
+ <title>Default system accounts (with the exception of root) must not be
listed in the cron.allow file or must be included in the cron.deny file, if cron.allow
does not exist.</title>
+ <description><VulnDiscussion>To centralize the management of
privileged account crontabs, of the default system accounts, only root may have a
+
crontab.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECPA-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31374r1_fix">Remove default system accounts
(such as bin, sys, adm, or others, traditionally UID less than 500) from the cron.allow
file if it exists, or add those accounts to the cron.deny file.</fixtext>
+ <fix id="F-31374r1_fix" />
+ <check system="C-28474r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the cron.allow and cron.deny files for the system. #
more /etc/cron.allow # more /etc/cron.deny If a default system account (such as bin, sys,
adm, or others, traditionally UID less than 500) is listed in the cron.allow file,
+ or not listed in the cron.deny file and if no cron.allow file exists, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11996">
+ <title>GEN003500</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37546r1_rule" severity="low"
weight="10.0">
+ <version>GEN003500</version>
+ <title>Process core dumps must be disabled unless needed.</title>
+ <description><VulnDiscussion>Process core dumps contain the
memory in use by the process when it crashed. Process core dump files can be of
significant size and their use can result in file systems filling to capacity, which may
result in
+ Denial of Service. Process core dumps can be useful for software debugging.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31460r1_fix">Edit /etc/security/limits.conf and
set a hard limit for "core" to 0 for all users.</fixtext>
+ <fix id="F-31460r1_fix" />
+ <check system="C-36201r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># ulimit -c If the above command does not return 0 and the
enabling of core dumps has not been documented and approved by the IAO, this a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11997">
+ <title>GEN003520</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37570r1_rule" severity="low"
weight="10.0">
+ <version>GEN003520</version>
+ <title>The kernel core dump data directory must be owned by
root.</title>
+ <description><VulnDiscussion>Kernel core dumps may contain the
full contents of system memory at the time of the crash. As the system memory may contain
sensitive information, it must be protected accordingly. If the kernel core dump data
+ directory is not owned by root, the core dumps contained in the directory may be
subject to unauthorized
+
access.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31608r1_fix">Change the owner of the kernel core
dump data directory to root. # chown root /var/crash</fixtext>
+ <fix id="F-31608r1_fix" />
+ <check system="C-36351r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of the kernel core dump data directory.
# ls -ld /var/crash If the kernel core dump data directory is not owned by root, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-11999">
+ <title>GEN003540</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27414r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003540</version>
+ <title>The system must implement non-executable program
stacks.</title>
+ <description><VulnDiscussion>A common type of exploit is the
stack buffer overflow. An application receives, from an attacker, more data than it is
prepared for and stores this information on its stack, writing beyond the space reserved
for
+ it. This can be designed to cause execution of the data written on the stack. One
mechanism to mitigate this vulnerability is for the system to not allow the execution of
instructions in sections of memory identified as part of the
+
stack.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2, ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-24686r1_fix">Examine /etc/sysctl.conf for
"kernel.exec-shield" and "kernel.randomize_va_space" entries and if
found remove them. The system default of "1" enables these
modules.</fixtext>
+ <fix id="F-24686r1_fix" />
+ <check system="C-28600r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify "exec_shield" and
"randomize_va_space" have not been changed from the default "1"
settings. Procedure: #sysctl kernel.exec-shield If the return value is not:
kernel.exec-shield = 1 this is a finding. #sysctl
+ kernel.randomize_va_space If the return value is not: kernel.randomize_va_space =
1 this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12002">
+ <title>GEN003600</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-29795r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003600</version>
+ <title>The system must not forward IPv4 source-routed packets.</title>
+ <description><VulnDiscussion>Source-routed packets allow the
source of the packet to suggest routers forward the packet along a different path than
configured on the router, which can be used to bypass network security measures. This
+ requirement applies only to the forwarding of source-routed traffic, such as when
IPv4 forwarding is enabled and the system is functioning as a
+
router.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31612r1_fix">Configure the system to not accept
source-routed IPv4 packets. Edit /etc/sysctl.conf and add a setting for
"net.ipv4.conf.all.accept_source_route=0" and
"net.ipv4.conf.default.accept_source_route=0". Reload the
+ sysctls. Procedure: # sysctl -p</fixtext>
+ <fix id="F-31612r1_fix" />
+ <check system="C-36392r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the system does not accept source-routed IPv4
packets. Procedure: # grep [01] /proc/sys/net/ipv4/conf/*/accept_source_route|egrep
"default|all" If all of the returned lines do not end with 0, this is a finding.
Note: The
+ same setting is used by Linux for both the local acceptance and forwarding of
source-routed IPv4 packets.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12003">
+ <title>GEN003620</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37640r1_rule" severity="low"
weight="10.0">
+ <version>GEN003620</version>
+ <title>A separate file system must be used for user home directories (such as
/home or an equivalent).</title>
+ <description><VulnDiscussion>The use of separate file systems
for different paths can protect the system from failures resulting from a file system
becoming full or
+
failing.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001208</ident>
+ <fixtext fixref="F-31675r1_fix">Migrate the /home (or equivalent)
path onto a separate file system.</fixtext>
+ <fix id="F-31675r1_fix" />
+ <check system="C-36838r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if the /home path is a separate filesystem. # grep
"/home " /etc/fstab If no result is returned, /home is not on a separate
filesystem this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12004">
+ <title>GEN003660</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37404r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003660</version>
+ <title>The system must log informational authentication data.</title>
+ <description><VulnDiscussion>Monitoring and recording
successful and unsuccessful logins assists in tracking unauthorized access to the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-31333r1_fix">Edit /etc/syslog.conf and add local
log destinations for "authpriv.*", "authpriv.debug" or
"authpriv.info".</fixtext>
+ <fix id="F-31333r1_fix" />
+ <check system="C-36086r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/syslog.conf and verify the authpriv facility is
logging both the "notice" and "info" priority messages. Procedure: For
a given action all messages of a higher severity or "priority" are logged. The
three lowest
+ priorities in ascending order are "debug","info" and
"notice". A priority of "info" will include "notice". A
priority of "debug" includes both "info" and "notice".
Enter/Input: # grep "authpriv.debug" /etc/syslog.conf # grep
"authpriv.info"
+ /etc/syslog.conf # grep "authpriv\.\*" /etc/syslog.conf If an
"authpriv.*", "authpriv.debug", or "authpriv.info" entry is
not found, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12005">
+ <title>GEN003700</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27424r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003700</version>
+ <title>Inetd and xinetd must be disabled or removed if no network services
utilizing them are enabled.</title>
+ <description><VulnDiscussion>Unnecessary services should be
disabled to decrease the attack surface of the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000305</ident>
+ <fixtext fixref="F-24696r1_fix"># service xinetd stop ; chkconfig
xinetd off</fixtext>
+ <fix id="F-24696r1_fix" />
+ <check system="C-28610r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># ps -ef |grep xinetd If xinetd is not running, this check
is not a finding. # grep -v "^#" /etc/xinetd.conf # grep disable /etc/xinetd.d/*
|grep no If no active services are found, and the inetd daemon is running, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12006">
+ <title>GEN004540</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37504r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004540</version>
+ <title>The SMTP service HELP command must not be enabled.</title>
+ <description><VulnDiscussion>The HELP command should be
disabled to mask version information. The version of the SMTP service software could be
used by attackers to target vulnerabilities present in specific software
+
versions.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31413r1_fix">To disable the SMTP HELP command,
remove /etc/mail/helpfile.</fixtext>
+ <fix id="F-31413r1_fix" />
+ <check system="C-36162r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check if Help is disabled. This rule is for
"sendmail" only and not applicable to "Postfix". Procedure: # telnet
localhost 25 > help If the help command returns any sendmail version information,
this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12010">
+ <title>GEN004800</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37515r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004800</version>
+ <title>Unencrypted FTP must not be used on the system.</title>
+ <description><VulnDiscussion>: FTP is typically unencrypted and
presents confidentiality and integrity risks. FTP may be protected by encryption in
certain cases, such as when used in a Kerberos environment. SFTP and FTPS are encrypted
+ alternatives to
+
FTP.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31425r2_fix">Disable the FTP daemons. Procedure:
# chkconfig gssftp off # chkconfig vsftpd off</fixtext>
+ <fix id="F-31425r2_fix" />
+ <check system="C-36174r3_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Perform the following to determine if unencrypted FTP is
enabled: # chkconfig --list gssftp # chkconfig --list vsftpd If any of these services are
found, ask the SA if these services are encrypted. If they are not, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12011">
+ <title>GEN005040</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37555r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005040</version>
+ <title>All FTP users must have a default umask of 077.</title>
+ <description><VulnDiscussion>The umask controls the default
access mode assigned to newly created files. An umask of 077 limits new files to mode 700
or less permissive. Although umask is stored as a 4-digit number, the first digit
+ representing special access modes is typically ignored or required to be zero
+
(0).</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31466r1_fix">Edit the initialization files for
the ftp user and set the umask to 077. Procedure: For gssftp: Modify the
/etc/xinetd.d/gssftp file adding "-u 077" to the server_args entry. For vsftp:
Modify the
+ "/etc/vsftpd/vsftpd.conf" setting "local_umask" and
"anon_umask" to 077.</fixtext>
+ <fix id="F-31466r1_fix" />
+ <check system="C-36207r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the umask setting for FTP users. Procedure: For
gssftp: Assuming an anonymous ftp user has been defined with no user initialization script
invoked to change the umask # ftp localhost Name: (localhost:root): anonymous
+ Password: anything ftp>umask If the umask value returned is not 077, this
is a finding. or: # grep "server_args" /etc/xinetd.d/gssftp The default umask
for FTP is "023" if the server _args entry does not contain "-u 077"
this is a finding. For
+ vsftp: # grep "_mask" /etc/vsftpd/vsftpd.conf The default
"local_umask" setting is 077. If this has been changed, or the
"anon_umask" setting is not 077, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12014">
+ <title>GEN005180</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37679r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005180</version>
+ <title>All .Xauthority files must have mode 0600 or less
permissive.</title>
+ <description><VulnDiscussion>.Xauthority files ensure the user
is authorized to access specific X Windows host. Excessive permissions may permit
unauthorized modification of these files, which could lead to Denial of Service to
authorized
+ access or allow unauthorized access to be
+
obtained.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31822r1_fix">Change the mode of the .Xauthority
files. Procedure: # chmod 0600 .Xauthority</fixtext>
+ <fix id="F-31822r1_fix" />
+ <check system="C-36866r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the file permissions for the .Xauthority files.
Procedure: # ls -la |egrep "(\.Xauthority|\.xauth)" If the file mode is more
permissive than 0600, this is finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12016">
+ <title>GEN005220</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37684r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005220</version>
+ <title>.Xauthority or X*.hosts (or equivalent) file(s) must be used to
restrict access to the X server.</title>
+ <description><VulnDiscussion>If access to the X server is not
restricted, a user's X session may be
+
compromised.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000297</ident>
+ <fixtext fixref="F-31858r1_fix">Create an X*.hosts file, where
"*" is a display number used to limit X window connections. Add the list of
authorized X clients to the file.</fixtext>
+ <fix id="F-31858r1_fix" />
+ <check system="C-36875r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if the X server is running. Procedure: # ps -ef
|grep X Determine if xauth is being used. Procedure: # xauth xauth> list If the
above command sequence does not show any host other than the localhost, then xauth is not
+ being used. Search the system for an X*.hosts file, where "*" is a
display number used to limit X window connections. If no files are found, X*.hosts files
are not being used. If the X*.hosts files contain any unauthorized hosts, this is a
+ finding. If both xauth and X*.hosts files are not being used, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12017">
+ <title>GEN005240</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37685r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005240</version>
+ <title>The .Xauthority utility must only permit access to authorized
hosts.</title>
+ <description><VulnDiscussion>If unauthorized clients are
permitted access to the X server, a user's X session may be
+
compromised.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31867r1_fix">Remove unauthorized clients from
the xauth configuration. # xauth remove <display name></fixtext>
+ <fix id="F-31867r1_fix" />
+ <check system="C-36877r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the X window system access is limited to authorized
clients. Procedure: # xauth xauth> list Ask the SA if the clients listed are
authorized. If any are not, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12018">
+ <title>GEN005260</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37686r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005260</version>
+ <title>X Window System connections not required must be
disabled.</title>
+ <description><VulnDiscussion>If unauthorized clients are
permitted access to the X server, a user's X session may be
+
compromised.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001436</ident>
+ <fixtext fixref="F-31878r1_fix">Disable the X Windows server on the
system.</fixtext>
+ <fix id="F-31878r1_fix" />
+ <check system="C-36878r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if the X window system is running. Procedure: # ps
-ef |grep Xorg Ask the SA if the X window system is an operational requirement. If it is
not, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12019">
+ <title>GEN005360</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37703r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005360</version>
+ <title>The snmpd.conf file must be owned by root.</title>
+ <description><VulnDiscussion>The snmpd.conf file contains
authenticators and must be protected from unauthorized access and modification. If the
file is not owned by root, it may be subject to access and modification from unauthorized
+
users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32028r1_fix">Change the owner of the snmpd.conf
file to root. Procedure: # chown root <snmpd.conf file></fixtext>
+ <fix id="F-32028r1_fix" />
+ <check system="C-36896r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine the owner of the SNMP configuration file.
Procedure: Find the snmpd.conf file. The default install location is /etc/snmp/snmpd.conf
but may be different depending on the SNMP agent installed. # find / -name snmpd.conf #
+ ls -lL <snmpd.conf> If the snmpd.conf file is not owned by root,
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12020">
+ <title>GEN005440</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37810r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005440</version>
+ <title>The system must not be used as a syslog server (loghost) for systems
external to the enclave.</title>
+ <description><VulnDiscussion>Syslog messages are typically
unencrypted, may contain sensitive information, and are restricted to the
+
enclave.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32274r1_fix">Configure the hosts outside of the
local enclave to not log to this system.</fixtext>
+ <fix id="F-32274r1_fix" />
+ <check system="C-37010r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Ask the SA if the loghost server is collecting data for
hosts outside the local enclave. If it is, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12021">
+ <title>GEN005480</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37813r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005480</version>
+ <title>The syslog daemon must not accept remote messages unless it is a
syslog server documented using site-defined procedures.</title>
+ <description><VulnDiscussion>Unintentionally running a syslog
server accepting remote messages puts the system at increased risk. Malicious syslog
messages sent to the server could exploit vulnerabilities in the server software itself,
could
+ introduce misleading information in to the system's logs, or could fill the
system's storage leading to a Denial of
+
Service.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32284r1_fix">Edit /etc/sysconfig/syslog to
removing the '-r' in SYSLOGD_OPTIONS. Restart the syslogd
service.</fixtext>
+ <fix id="F-32284r1_fix" />
+ <check system="C-37017r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Ask the SA if the system is an authorized syslog server. If
the system is an authorized syslog server, this is not applicable. Determine if the
system's syslog service is configured to accept remote messages. # ps -ef | grep
+ syslogd If the '-r' option is present, the system is configured to accept
remote syslog messages, and this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12022">
+ <title>GEN005540</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37913r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005540</version>
+ <title>The SSH daemon must be configured for IP filtering.</title>
+ <description><VulnDiscussion>The SSH daemon must be configured
for IP filtering to provide a layered defense against connection attempts from
unauthorized
+
addresses.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECSC-1,
ECWM-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32407r1_fix">Add appropriate IP restrictions for
SSH to the /etc/hosts.deny and/or /etc/hosts.allow files.</fixtext>
+ <fix id="F-32407r1_fix" />
+ <check system="C-37139r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the TCP wrappers configuration files to determine if
sshd is configured to use TCP wrappers. Procedure: # grep sshd /etc/hosts.deny # grep sshd
/etc/hosts.allow If no entries are returned, the TCP wrappers are not configured
+ for sshd, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12023">
+ <title>GEN005600</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37929r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005600</version>
+ <title>IP forwarding for IPv4 must not be enabled, unless the system is a
router.</title>
+ <description><VulnDiscussion>If the system is configured for IP
forwarding and is not a designated router, it could be used to bypass network security by
providing a path for communication not filtered by network
+
devices.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32422r1_fix">Edit "/etc/sysctl.conf"
and set net.ipv4.ip_forward to "0". Restart the system or run "sysctl
-p" to make the change take effect.</fixtext>
+ <fix id="F-32422r1_fix" />
+ <check system="C-37179r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check if the system is configured for IPv4 forwarding. If
the system is a VM host and acts as a router solely for the benefits of its client
systems, then this rule is not applicable. Procedure: # cat /proc/sys/net/ipv4/ip_forward
+ If the value is set to "1", IPv4 forwarding is enabled this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12024">
+ <title>GEN006000</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37862r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006000</version>
+ <title>The system must not have a public Instant Messaging (IM) client
installed.</title>
+ <description><VulnDiscussion>Public (IM) systems are not
approved for use and may result in the unauthorized distribution of information. IM
clients provide a way for a user to send a message to one or more other users in real
time.
+ Additional capabilities may include file transfer and support for distributed game
playing. Communication between clients and associated directory services are managed
through messaging servers. Commercial IM clients include AOL Instant Messenger
+ (AIM), MSN Messenger, and Yahoo! Messenger. IM clients present a security issue
when the clients route messages through public servers. The obvious implication is
potentially sensitive information could be intercepted or altered in the course of
+ transmission. This same issue is associated with the use of public e-mail servers.
In order to reduce the potential for disclosure of sensitive Government information and to
ensure the validity of official government information, IM clients
+ connecting to public IM services will not be installed. Clients use to access
internal or DoD-controlled IM services are
+
permitted.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECIM-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <ident
system="http://iase.disa.mil/cci">CCI-001154</ident>
+ <fixtext fixref="F-32341r1_fix">Uninstall the IM client from the
system, or configure the client to only connect to DoD-approved IM
services.</fixtext>
+ <fix id="F-32341r1_fix" />
+ <check system="C-37073r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If an IM client is installed, ask the SA if it has access to
any public domain IM servers. If it does have access to public servers, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12025">
+ <title>GEN006040</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37865r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006040</version>
+ <title>The system must not have any peer-to-peer file-sharing application
installed.</title>
+ <description><VulnDiscussion>Peer-to-peer file-sharing software
can result in the unintentional exfiltration of information. There are also many legal
issues associated with these types of utilities including copyright infringement or other
+ intellectual property issues. The ASD Memo "Use of Peer-to-Peer (P2P)
File-Sharing Applications across the DoD" states the following: “P2P file-sharing
applications are authorized for use on DOD networks with approval by the appropriate
Designated
+ Approval Authority (DAA). Documented requirements, security architecture,
configuration management process, and a training program for users are all requirements
within the approval process. The unauthorized use of application or services,
+ including P2P applications, is prohibited, and such applications or services must
be eliminated.” P2P applications include, but are not limited to, the following: -Napster
-Kazaa -ARES -Limewire -IRC Chat Relay
+
-BitTorrent</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><Responsibility>Designated
Approving Authority</Responsibility><IAControls>DCPD-1,
ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001436</ident>
+ <fixtext fixref="F-32351r1_fix">Uninstall the peer-to-peer file
sharing application(s) from the system.</fixtext>
+ <fix id="F-32351r1_fix" />
+ <check system="C-37078r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Ask the SA if any peer-to-peer file-sharing applications are
installed. Some examples of these applications include: - Napster - Kazaa - ARES -
Limewire - IRC Chat Relay - BitTorrent If any of these applications are installed, this
+ is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12026">
+ <title>GEN006420</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37743r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006420</version>
+ <title>NIS maps must be protected through hard-to-guess domain
names.</title>
+ <description><VulnDiscussion>The use of hard-to-guess NIS
domain names provides additional protection from unauthorized access to the NIS directory
+
information.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32205r1_fix">Change the NIS domainname to a
value difficult to guess. Consult vendor documentation for the required
procedure.</fixtext>
+ <fix id="F-32205r1_fix" />
+ <check system="C-36940r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the domain name for NIS maps. Procedure: # domainname
If the name returned is simple to guess, such as the organization name, building or room
name, etc., this is a finding. If the system does not use NIS, this is not
+ applicable.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12028">
+ <title>GEN006560</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37747r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006560</version>
+ <title>The system vulnerability assessment tool, host-based intrusion
detection tool, and file integrity tool must notify the SA and the IAO of a security
breach or a suspected security breach.</title>
+ <description><VulnDiscussion>Timely notifications of potential
security compromises minimize the potential damage. Minimally, the system must log these
events and the SA and the IAO will receive the notifications during the daily system log
+ review. If feasible, active alerting (such as e-mail or paging) should be employed
consistent with the site’s established operations management systems and
+
procedures.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><Responsibility>Information
Assurance Officer</Responsibility><IAControls>ECAT-1,
ECAT-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <ident
system="http://iase.disa.mil/cci">CCI-001266</ident>
+ <fixtext fixref="F-32209r1_fix">Configure the security tools on the
system to notify the IAO and SA when any security issues are detected.</fixtext>
+ <fix id="F-32209r1_fix" />
+ <check system="C-36944r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>For each security tool on the system, determine if the tool
is configured to notify the IAO and SA of any detected security problem. If such
notifications are not configured, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12030">
+ <title>GEN006620</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37758r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006620</version>
+ <title>The system's access control program must be configured to grant or
deny system access to specific hosts.</title>
+ <description><VulnDiscussion>If the system's access control
program is not configured with appropriate rules for allowing and denying access to system
network resources, services may be accessible to unauthorized
+
hosts.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECCD-1,
ECCD-2, ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32220r1_fix">Edit the "/etc/hosts.all"
and "/etc/hosts.deny" files to configure access restrictions.</fixtext>
+ <fix id="F-32220r1_fix" />
+ <check system="C-36955r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for the existence of the "/etc/hosts.allow"
and "/etc/hosts.deny" files. Procedure: # ls -la /etc/hosts.allow # ls -la
/etc/hosts.deny If either file does not exist, this is a finding. Check for the presence
of a "default
+ deny" entry. Procedure: # grep "ALL: ALL" /etc/hosts.deny If the
"ALL: ALL" entry is not present the "/etc/hosts.deny" file, any TCP
service from a host or network not matching other rules will be allowed access. If the
entry is not in
+ "/etc/hosts.deny", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12038">
+ <title>GEN000000-LNX00620</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37340r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX00620</version>
+ <title>The /etc/securetty file must be group-owned by root, sys, or
bin.</title>
+ <description><VulnDiscussion>The securetty file contains the
list of terminals permitting direct root logins. It must be protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-11295r2_fix">Change the group-owner of
/etc/securetty to root, sys, or bin. Example: # chgrp root /etc/securetty</fixtext>
+ <fix id="F-11295r2_fix" />
+ <check system="C-8001r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/securetty group ownership: # ls -lL
/etc/securetty If /etc/securetty is not group owned by root, sys, or bin, then this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12039">
+ <title>GEN000000-LNX00640</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37341r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX00640</version>
+ <title>The /etc/securetty file must be owned by root.</title>
+ <description><VulnDiscussion>The securetty file contains the
list of terminals permitting direct root logins. It must be protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-11296r2_fix">Change the owner of the
/etc/securetty file to root. Procedure: # chown root /etc/securetty</fixtext>
+ <fix id="F-11296r2_fix" />
+ <check system="C-8002r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/securetty ownership. Procedure: # ls -lL
/etc/securetty If /etc/securetty is not owned by root, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12040">
+ <title>GEN000000-LNX00660</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37342r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX00660</version>
+ <title>The /etc/securetty file must have mode 0640 or less
permissive.</title>
+ <description><VulnDiscussion>The securetty file contains the
list of terminals permitting direct root logins. It must be protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31277r1_fix">Change the mode of the
/etc/securetty file to 0600. Procedure: # chmod 0600 /etc/securetty</fixtext>
+ <fix id="F-31277r1_fix" />
+ <check system="C-36031r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/securetty permissions. Procedure: # ls -lL
/etc/securetty If /etc/securetty has a mode more permissive than 0600, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12049">
+ <title>GEN003865</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37446r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003865</version>
+ <title>Network analysis tools must not be installed.</title>
+ <description><VulnDiscussion>Network analysis tools allow for
the capture of network traffic visible to the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCPA-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000305</ident>
+ <fixtext fixref="F-31364r1_fix">Remove each network analysis tool
binary from the system. Remove package items with a package manager, others remove the
binary directly. Procedure: Find the binary file: # find / -name <Item to be
removed>
+ Find the package, if any, to which it belongs: # rpm -qf <binary
file> Remove the package if it does not also include other software: # rpm -e
<package name> or # yum remove <package name> If the item to
be removed is not in a
+ package, or the entire package cannot be removed because of other software it
provides, remove the item's binary file. # rm <binary
file></fixtext>
+ <fix id="F-31364r1_fix" />
+ <check system="C-36118r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if any network analysis tools are installed.
Procedure: # find / -name ethereal # find / -name wireshark # find / -name tshark # find /
-name nc # find / -name tcpdump # find / -name snoop If any network analysis tools
+ are found, this is a finding</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-12765">
+ <title>GEN006640</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37760r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006640</version>
+ <title>The system must use and update a DoD-approved virus scan
program.</title>
+ <description><VulnDiscussion>Virus scanning software can be
used to protect a system from penetration from computer viruses and to limit their spread
through intermediate systems. The virus scanning software should be configured to perform
+ scans dynamically on accessed files. If this capability is not available, the
system must be configured to scan, at a minimum, all altered files on the system on a
daily basis. If the system processes inbound SMTP mail, the virus scanner must be
+ configured to scan all received
+
mail.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECVP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001668</ident>
+ <fixtext fixref="F-32221r1_fix">Install McAfee command line virus
scan tool, or an appropriate alternative. Ensure the virus signature definition files are
no older than 7 days. Configure the system to run a virus scan on altered files
dynamically
+ or daily. If daily scans impede operations, justify, document, and obtain IAO
approval for alternate scheduling.</fixtext>
+ <fix id="F-32221r1_fix" />
+ <check system="C-36956r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for the existence of a cron job to execute the McAfee
command line scan tool (uvscan) daily. Other tools may be available but will have to be
manually reviewed if they are installed. In addition, the definitions files should
+ not be older than 7 days. Check if uvscan scheduled to run: # grep uvscan
/var/spool/cron/* # grep uvscan /etc/cron.d/* # grep uvscan /etc/cron.daily/* # grep
uvscan /etc/cron.hourly/* # grep uvscan /etc/cron.monthly/* # grep uvscan
+ /etc/cron.weekly/* If a virus scanner is not being run daily and an exception has
not been documented with the IAO, this is a finding. Perform the following command to
ensure the virus definition signature files are not older than 7 days. The
+ default uvscan install directory is /usr/local/uvscan. # cd <uvscan
install directory> # ls -la avvscan.dat avvnames.dat avvclean.dat If the virus
definitions are older than 7 days, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22290">
+ <title>GEN000241</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26292r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000241</version>
+ <title>The system clock must be synchronized continuously, or at least
daily.</title>
+ <description><VulnDiscussion>A synchronized system clock is
critical for the enforcement of time-based policies and the correlation of logs and audit
records with other systems. Internal system clocks tend to drift and require periodic
+ resynchronization to ensure their accuracy. Software, such as ntpd, can be used to
continuously synchronize the system clock with authoritative sources. Alternatively, the
system may be synchronized periodically, with a maximum of one day between
+ synchronizations. If the system is completely isolated (i.e., it has no connections
to networks or other systems), time synchronization is not required as no correlation of
events or operation of time-dependent protocols between systems will be
+ necessary. If the system is completely isolated, this requirement is not
+
applicable.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-23444r1_fix">Enable the NTP daemon for
continuous synchronization. # service ntpd start ; chkconfig ntpd on OR Add a daily or
more frequent cronjob to perform synchronization using ntpdate.</fixtext>
+ <fix id="F-23444r1_fix" />
+ <check system="C-27388r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the root crontab (crontab -l) and the global crontabs
in /etc/crontab, /etc/cron.d/* for the presence of an "ntpd -qg" job to run at
least daily, which should have asterisks (*) in columns 3, 4, and 5. Check the daily cron
+ directory (/etc/cron.daily) for any script running "ntpd -qg". Check
for a running NTP daemon. # ps ax | grep ntpd If none of the above checks are successful,
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22291">
+ <title>GEN000242</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37412r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000242</version>
+ <title>The system must use at least two time sources for clock
synchronization.</title>
+ <description><VulnDiscussion>A synchronized system clock is
critical for the enforcement of time-based policies and the correlation of logs and audit
records with other systems. For redundancy, two time sources are required so
synchronization
+ continues to function if one source fails. If the system is completely isolated
(i.e., it has no connections to networks or other systems), time synchronization is not
required as no correlation of events or operation of time-dependent protocols
+ between systems will be necessary. If the system is completely isolated, this
requirement is not applicable. Note: For the network time protocol (NTP), the requirement
is two servers, but it is recommended to configure at least four distinct time
+ servers which allow NTP to effectively exclude a time source not consistent with
the others. The system's local clock must be excluded from the count of time
+
sources.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000160</ident>
+ <fixtext fixref="F-31342r1_fix">If using "ntpd -qg", add
additional NTP servers to the cron job running "ntpd -qg". If using the NTP
daemon, add an additional "server" line to /etc/ntp.conf for each additional NTP
server.</fixtext>
+ <fix id="F-31342r1_fix" />
+ <check system="C-36095r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the root crontab (crontab -l) and the global crontabs
in /etc/crontab, /etc/cron.d/*, or scripts in the /etc/cron.daily directory for the
presence of an "ntpd -qg" job. If the "ntpd -qg" command is not
invoked with at least
+ two external NTP servers listed, this is a finding. Check the NTP daemon
configuration for at least two external servers. # grep ^server /etc/ntp.conf | egrep -v
'(127.127.1.0|127.127.1.1)' If less than two servers or external reference clocks
+ (127.127.x.x other than 127.127.1.0 or 127.127.1.1) are listed, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22292">
+ <title>GEN000244</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37413r1_rule" severity="low"
weight="10.0">
+ <version>GEN000244</version>
+ <title>The system must use local time sources to the enclave.</title>
+ <description><VulnDiscussion>A synchronized system clock is
critical for the enforcement of time-based policies and the correlation of logs and audit
records with other systems. The network architecture should provide multiple time servers
+ within an enclave providing local service to the enclave and synchronize with time
sources outside of the enclave. If this server is an enclave time server, this requirement
is not applicable. If the system is completely isolated (i.e., it has no
+ connections to networks or other systems), time synchronization is not required as
no correlation of events or operation of time-dependent protocols between systems will be
necessary. If the system is completely isolated, this requirement is not
+
applicable.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000160</ident>
+ <fixtext fixref="F-31343r1_fix">If using "ntpd -qg",
remove NTP servers external to the enclave from the cron job running "ntpd -qg".
If using the NTP daemon, remove the "server" line from /etc/ntp.conf for each
NTP server external to the
+ enclave.</fixtext>
+ <fix id="F-31343r1_fix" />
+ <check system="C-36096r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the root crontab (crontab -l) and the global crontabs
in /etc/crontab, /etc/cron.d/*, or scripts in the /etc/cron.daily directory for the
presence of an "ntpd -qg" job. If the "ntpd -qg" command is invoked
with NTP servers
+ outside of the enclave, this is a finding. Check the NTP daemon configuration for
NTP servers. # grep ^server /etc/ntp.conf | grep -v 127.127.1.1 If an NTP server is listed
outside of the enclave, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22294">
+ <title>GEN000250</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37415r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000250</version>
+ <title>The time synchronization configuration file (such as /etc/ntp.conf)
must be owned by root.</title>
+ <description><VulnDiscussion>A synchronized system clock is
critical for the enforcement of time-based policies and the correlation of logs and audit
records with other systems. If an illicit time source is used for synchronization, the
+ integrity of system logs and the security of the system could be compromised. If
the configuration files controlling time synchronization are not owned by a system
account, unauthorized modifications could result in the failure of time
+
synchronization.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31345r1_fix">Change the owner of the NTP
configuration file. # chown root /etc/ntp.conf</fixtext>
+ <fix id="F-31345r1_fix" />
+ <check system="C-36098r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of the NTP configuration file. # ls -l
/etc/ntp.conf If the owner is not root, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22295">
+ <title>GEN000251</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37416r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000251</version>
+ <title>The time synchronization configuration file (such as /etc/ntp.conf)
must be group-owned by root, bin, or sys.</title>
+ <description><VulnDiscussion>A synchronized system clock is
critical for the enforcement of time-based policies and the correlation of logs and audit
records with other systems. If an illicit time source is used for synchronization, the
+ integrity of system logs and the security of the system could be compromised. If
the configuration files controlling time synchronization are not owned by a system group,
unauthorized modifications could result in the failure of time
+
synchronization.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31346r1_fix">Change the group-owner of the NTP
configuration file. Procedure: # chgrp root /etc/ntp.conf</fixtext>
+ <fix id="F-31346r1_fix" />
+ <check system="C-36099r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the NTP configuration file.
Procedure: # ls -lL /etc/ntp.conf If the group owner is not root, bin, or sys, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22296">
+ <title>GEN000252</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37417r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000252</version>
+ <title>The time synchronization configuration file (such as /etc/ntp.conf)
must have mode 0640 or less permissive.</title>
+ <description><VulnDiscussion>A synchronized system clock is
critical for the enforcement of time-based policies and the correlation of logs and audit
records with other systems. If an illicit time source is used for synchronization, the
+ integrity of system logs and the security of the system could be compromised. If
the configuration files controlling time synchronization are not protected, unauthorized
modifications could result in the failure of time
+
synchronization.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31347r1_fix">Change the mode of the NTP
configuration file to 0640 or more restrictive. # chmod 0640
/etc/ntp.conf</fixtext>
+ <fix id="F-31347r1_fix" />
+ <check system="C-36100r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode for the NTP configuration file is not more
permissive than 0640. # ls -l /etc/ntp.conf If the mode is more permissive than 0640, this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22297">
+ <title>GEN000253</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37418r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000253</version>
+ <title>The time synchronization configuration file (such as /etc/ntp.conf)
must not have an extended ACL.</title>
+ <description><VulnDiscussion>A synchronized system clock is
critical for the enforcement of time-based policies and the correlation of logs and audit
records with other systems. If an illicit time source is used for synchronization, the
+ integrity of system logs and the security of the system could be compromised. If
the configuration files controlling time synchronization are not protected, unauthorized
modifications could result in the failure of time
+
synchronization.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-23451r1_fix">Remove the extended ACL from the
NTP configuration file. # setfacl --remove-all /etc/ntp.conf</fixtext>
+ <fix id="F-23451r1_fix" />
+ <check system="C-36101r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the NTP configuration file has no extended ACL. # ls
-l /etc/ntp.conf If the permissions include a '+', the file has an extended ACL.
If the file has an extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22298">
+ <title>GEN000450</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37182r1_rule" severity="low"
weight="10.0">
+ <version>GEN000450</version>
+ <title>The system must limit users to 10 simultaneous system logins, or a
site-defined number, in accordance with operational requirements.</title>
+ <description><VulnDiscussion>Limiting simultaneous user logins
can insulate the system from denial of service problems caused by excessive logins.
Automated login processes operating improperly or maliciously may result in an
exceptional
+ number of simultaneous login sessions. If the defined value of 10 logins does not
meet operational requirements, the site may define the permitted number of simultaneous
login sessions based on operational requirements. This limit is for the number
+ of simultaneous login sessions for EACH user account. This is NOT a limit on the
total number of simultaneous login sessions on the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000054</ident>
+ <fixtext fixref="F-31140r1_fix">Add a "maxlogins" line
such as "* hard maxlogins 10" to /etc/security/limits.conf or a file in
/etc/security/limits.d. The enforced maximum should be defined by site requirements and
policy.</fixtext>
+ <fix id="F-31140r1_fix" />
+ <check system="C-35885r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for a default maxlogins line in the
/etc/security/limits.conf and /etc/security/limits.d/* files. Procedure: #grep maxlogins
/etc/security/limits.conf /etc/security/limits.d/* The default maxlimits should be set to
a max of
+ 10 or a documented site defined number: * - maxlogins 10 If no such line exists,
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22299">
+ <title>GEN000452</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37187r1_rule" severity="low"
weight="10.0">
+ <version>GEN000452</version>
+ <title>The system must display the date and time of the last successful
account login upon login.</title>
+ <description><VulnDiscussion>Providing users with feedback on
when account accesses last occurred facilitates user recognition and reporting of
unauthorized account
+
use.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000052</ident>
+ <fixtext fixref="F-31144r1_fix">Implement pam_lastlog, or enable
PrintLastLog in the SSH daemon. To enable pam_lastlog, add a line such as "session
required pam_lastlog.so" to /etc/pam.d/sshd. To enable PrintLastLog in the SSH
daemon, remove any
+ lines disabling this option from /etc/ssh/sshd_config.</fixtext>
+ <fix id="F-31144r1_fix" />
+ <check system="C-35888r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check that pam_lastlog is used and not silent, or that the
SSH daemon is configured to display last login information. # grep pam_lastlog
/etc/pam.d/sshd If pam_lastlog is present, and does not have the "silent"
option, this is not
+ a finding. # grep -i PrintLastLog /etc/ssh/sshd_config If PrintLastLog is not
present in the configuration, this is not a finding. This is the default setting. If
PrintLastLog is present in the configuration and set to "yes" (case
insensitive),
+ this is not a finding. Otherwise, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22301">
+ <title>GEN000510</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37222r1_rule" severity="low"
weight="10.0">
+ <version>GEN000510</version>
+ <title>The system must display a publicly-viewable pattern during a graphical
desktop environment session lock.</title>
+ <description><VulnDiscussion>To protect the on-screen content
of a session, it must be replaced with a publicly-viewable pattern upon session lock.
Examples of publicly viewable patterns include screen saver patterns, photographic
images,
+ solid colors, or a blank screen, so long as none of those patterns convey sensitive
information. This requirement applies to graphical desktop environments provided by the
system to locally attached displays and input devices, as well as, to
+ graphical desktop environments provided to remote systems using remote access
+
protocols.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>PESL-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000061</ident>
+ <fixtext fixref="F-31169r1_fix">Configure the system to display a
publicly-viewable pattern during a session lock. This is done graphically by selecting a
screensaver theme using gnome-screensaver-preferences command. Any of the themes
distributed
+ with RHEL may be used including "Blank Screen".</fixtext>
+ <fix id="F-31169r1_fix" />
+ <check system="C-35911r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if a publicly-viewable pattern is displayed during
a session lock. Some screensaver themes available but not included in the RHEL
distribution use a snapshot of the current screen as a graphic. This theme does not
qualify
+ as a publicly-viewable pattern. If the session lock pattern is not
publicly-viewable this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22302">
+ <title>GEN000585</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37261r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000585</version>
+ <title>The system must enforce compliance of the entire password during
authentification.</title>
+ <description><VulnDiscussion>Some common password hashing
schemes only process the first eight characters of a user's password, which reduces
the effective strength of the
+
password.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000205</ident>
+ <fixtext fixref="F-31207r1_fix">Change the passwords for all
accounts using non-compliant password hashes. (This requires GEN000590 is already
met.)</fixtext>
+ <fix id="F-31207r1_fix" />
+ <check system="C-35951r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify no password hash in /etc/passwd or /etc/shadow begins
with a character other than an underscore (_) or dollar sign ($). # cut -d ':' -f2
/etc/passwd # cut -d ':' -f2 /etc/shadow If any password hash is present that does
not
+ have an initial underscore (_) or dollar sign ($) character, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22303">
+ <title>GEN000590</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26313r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000590</version>
+ <title>The system must use a FIPS 140-2 approved cryptographic hashing
algorithm for generating account password hashes.</title>
+ <description><VulnDiscussion>Systems must employ cryptographic
hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved
successors. The use of unapproved algorithms may result in weak password hashes more
vulnerable to
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>DCNR-1,
IAIA-1, IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000803</ident>
+ <fixtext fixref="F-31215r1_fix">Change the default password
algorithm. # authconfig --passalgo=sha512 --update</fixtext>
+ <fix id="F-31215r1_fix" />
+ <check system="C-35959r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the algorithm used for password hashing is of the
SHA-2 family. # egrep "password .* pam_unix.so" /etc/pam.d/system-auth-ac If the
line indicates the hash algorithm is not set to sha256 or sha512, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22304">
+ <title>GEN000595</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26316r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000595</version>
+ <title>The password hashes stored on the system must have been generated
using a FIPS 140-2 approved cryptographic hashing algorithm.</title>
+ <description><VulnDiscussion>Systems must employ cryptographic
hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved
successors. The use of unapproved algorithms may result in weak password hashes more
vulnerable to
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>DCNR-1,
IAIA-1, IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000196</ident>
+ <fixtext fixref="F-31221r1_fix">Change the passwords for all
accounts using non-compliant password hashes. (This requires GEN000590 is already
met.)</fixtext>
+ <fix id="F-31221r1_fix" />
+ <check system="C-35965r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check all password hashes in /etc/passwd or /etc/shadow
begin with '$5$' or '$6$'. Procedure: # cut -d ':' -f2 /etc/passwd
# cut -d ':' -f2 /etc/shadow Any password hashes present not beginning with
'$5$' or '$6$', is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22305">
+ <title>GEN000610</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26321r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000610</version>
+ <title>The system must require passwords contain at least one lowercase
alphabetic character.</title>
+ <description><VulnDiscussion>To enforce the use of complex
passwords, minimum numbers of characters of different classes are mandated. The use of
complex passwords reduces the ability of attackers to successfully obtain valid passwords
using
+ guessing or exhaustive search techniques. Complexity requirements increase the
password search space by requiring users to construct passwords from a larger character
set than they may otherwise
+
use.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000193</ident>
+ <fixtext fixref="F-31231r1_fix">Edit
"/etc/pam.d/system-auth" to include the line: password required pam_cracklib.so
lcredit=-1 prior to the "password include system-auth-ac" line.</fixtext>
+ <fix id="F-31231r1_fix" />
+ <check system="C-35977r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/pam.d/system-auth for lcredit setting. Procedure:
Check the password lcredit option # grep pam_cracklib.so /etc/pam.d/system-auth Confirm
the lcredit option is set to -1 as in the example: password required
+ pam_cracklib.so lcredit=-1 There may be other options on the line. If no such
line is found, or the lcredit is not -1 this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22306">
+ <title>GEN000750</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37304r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000750</version>
+ <title>The system must require at least four characters be changed between
the old and new passwords during a password change.</title>
+ <description><VulnDiscussion>To ensure password changes are
effective in their goals, the system must ensure that old and new passwords have
significant differences. Without significant changes, new passwords may be easily guessed
based on
+ the value of a previously compromised
+
password.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000195</ident>
+ <fixtext fixref="F-31252r1_fix">If /etc/pam.d/system-auth
references /etc/pam.d/system-auth-ac refer to the man page for system-auth-ac for a
description of how to add options not configurable with authconfig. Edit
/etc/pam.d/system-auth and add or
+ edit a pam_cracklib entry with an difok parameter set equal to or greater than
4.</fixtext>
+ <fix id="F-31252r1_fix" />
+ <check system="C-35999r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/pam.d/system-auth for a pam_cracklib parameter
difok. Procedure: # grep difok /etc/pam.d/system-auth If difok is not present, or has a
value less than 4, this is a finding. Check for system-auth-ac inclusions. # grep -c
+ system-auth-ac /etc/pam.d/* If the system-auth-ac file is included anywhere #
more /etc/pam.d/system-auth-ac | grep difok If system-auth-ac is included anywhere and
difok is not present, or has a value less than 4, this is a finding. Ensure the
+ passwd command uses the system-auth settings. # grep system-auth
/etc/pam.d/passwd If a line "password include system-auth" is not found then the
password checks in system-auth will not be applied to new
passwords.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22307">
+ <title>GEN000790</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37318r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000790</version>
+ <title>The system must prevent the use of dictionary words for
passwords.</title>
+ <description><VulnDiscussion>An easily guessable password
provides an open door to any external or internal malicious intruder. Many computer
compromises occur as the result of account name and password guessing. This is generally
done by
+ someone with an automated script that uses repeated logon attempts until the
correct account and password pair is guessed. Utilities, such as cracklib, can be used to
validate passwords are not dictionary words and meet other criteria during
+ password
+
changes.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000189</ident>
+ <fixtext fixref="F-31262r1_fix">If /etc/pam.d/system-auth
references /etc/pam.d/system-auth-ac refer to the man page for system-auth-ac for a
description of how to add options not configurable with authconfig. Edit
/etc/pam.d/system-auth and
+ configure pam_cracklib by adding a line such as "password required
pam_cracklib.so"</fixtext>
+ <fix id="F-31262r1_fix" />
+ <check system="C-36011r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/pam.d/system-auth for pam_cracklib configuration.
Procedure: # grep pam_cracklib /etc/pam.d/system-auth* If pam_cracklib is not present.
This is a finding. If pam_cracklib is present only in /etc/pam.d/system-auth-ac:
+ ensure that /etc/pam.d/system-auth includes /etc/pam.d/system-auth-ac. #grep
system-auth-ac /etc/pam.d/system-auth This should return: auth include system-auth-ac
account include system-auth-ac password include system-auth-ac session include
+ system-auth-ac /etc/pam.d/system-auth-ac should only be included by
/etc/pam.d/system-auth. All other pam files should include /etc/pam.d/system-auth. If
pam_cracklib is not defined in /etc/pam.d/system-auth either directly or through
inclusion
+ of system-auth-ac, this is a finding. Ensure the passwd command uses the
system-auth settings. # grep system-auth /etc/pam.d/passwd If a line "password
include system-auth" is not found then the password checks in system-auth will not be
applied
+ to new passwords, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22308">
+ <title>GEN000850</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37345r1_rule" severity="low"
weight="10.0">
+ <version>GEN000850</version>
+ <title>The system must restrict the ability to switch to the root user to
members of a defined group.</title>
+ <description><VulnDiscussion>Configuring a supplemental group
for users permitted to switch to the root user prevents unauthorized users from accessing
the root account, even with knowledge of the root
+
credentials.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000009</ident>
+ <fixtext fixref="F-31282r1_fix">Edit /etc/pam.d/su and uncomment or
add a line such as "auth required pam_wheel.so". If necessary, create a
"wheel" group and add administrative users to the group.</fixtext>
+ <fix id="F-31282r1_fix" />
+ <check system="C-27453r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/pam.d/su uses pam_wheel. # grep pam_wheel
/etc/pam.d/su If pam_wheel is not present, or is commented out, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22309">
+ <title>GEN000930</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37358r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000930</version>
+ <title>The root account's home directory must not have an extended
ACL.</title>
+ <description><VulnDiscussion>File system extended ACLs provide
access to files beyond what is allowed by the unix permissions of the
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31290r1_fix">Remove the extended ACL from the
root account's home directory. # setfacl --remove-all <root home
directory></fixtext>
+ <fix id="F-31290r1_fix" />
+ <check system="C-36046r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the root account's home directory has no extended
ACL. # grep "^root" /etc/passwd | awk -F":" '{print $6}' # ls
-ld <root home directory> If the permissions include a '+' the
directory has an extended ACL. If the file
+ has an extended ACL and it has not been documented with the IAO, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22310">
+ <title>GEN000945</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37363r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000945</version>
+ <title>The root account's library search path must be the system default
and must contain only absolute paths.</title>
+ <description><VulnDiscussion>The library search path
environment variable(s) contain a list of directories for the dynamic linker to search to
find libraries. If this path includes the current working directory or other relative
paths,
+ libraries in these directories may be loaded instead of system libraries. This
variable is formatted as a colon-separated list of directories. If there is an empty
entry, such as a leading or trailing colon or two consecutive colons, this is
+ interpreted as the current working directory. Entries starting with a slash (/) are
absolute
+
paths.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31296r1_fix">Edit the root user initialization
files and remove any definition of LD_LIBRARY_PATH.</fixtext>
+ <fix id="F-31296r1_fix" />
+ <check system="C-36052r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the LD_LIBRARY_PATH environment variable is empty or
not defined for the root user. # echo $LD_LIBRARY_PATH If a path list is returned, this is
a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22311">
+ <title>GEN000950</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37364r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000950</version>
+ <title>The root account's list of preloaded libraries must be
empty.</title>
+ <description><VulnDiscussion>The library preload list
environment variable contains a list of libraries for the dynamic linker to load before
loading the libraries required by the binary. If this list contains paths to libraries
relative to
+ the current working directory, unintended libraries may be preloaded. This variable
is formatted as a space-separated list of libraries. Paths starting with (/) are absolute
+
paths.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31298r1_fix">Edit the root user initialization
files and remove any definition of LD_PRELOAD.</fixtext>
+ <fix id="F-31298r1_fix" />
+ <check system="C-36054r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the LD_PRELOAD environment variable is empty or not
defined for the root user. # echo $LD_PRELOAD If a path list is returned, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22312">
+ <title>GEN001170</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37165r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001170</version>
+ <title>All files and directories must have a valid
group-owner.</title>
+ <description><VulnDiscussion>Files without a valid group owner
may be unintentionally inherited if a group is assigned the same GID as the GID of the
files without a valid
+
group-owner.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31126r1_fix">Change the group-owner for each
file without a valid group-owner. # chgrp avalidgroup
/tmp/a-file-without-a-valid-group-owner</fixtext>
+ <fix id="F-31126r1_fix" />
+ <check system="C-35872r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Search the system for files without a valid group-owner. #
find / -nogroup If any files are found, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22313">
+ <title>GEN001190</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37199r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001190</version>
+ <title>All network services daemon files must not have extended
ACLs.</title>
+ <description><VulnDiscussion>Restricting permission on daemons
will protect them from unauthorized modification and possible system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-23542r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /usr/sbin/*</fixtext>
+ <fix id="F-23542r1_fix" />
+ <check system="C-35893r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check network services daemon files have no extended ACLs. #
ls -la /usr/sbin If the permissions include a '+', the file has an extended ACL.
If the file has an extended ACL and it has not been documented with the IAO, this is a
+ finding. Note: Network daemons not residing in these directories must also be
checked.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22314">
+ <title>GEN001210</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37210r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001210</version>
+ <title>All system command files must not have extended ACLs.</title>
+ <description><VulnDiscussion>Restricting permissions will
protect system command files from unauthorized modification. System command files include
files present in directories used by the operating system for storing default system
+ executables and files present in directories included in the system's default
executable search
+
paths.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001499</ident>
+ <fixtext fixref="F-31159r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all [file with extended ACL]</fixtext>
+ <fix id="F-31159r1_fix" />
+ <check system="C-35901r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check all system command files have no extended ACLs. # ls
-lL /etc /bin /usr/bin /usr/lbin /usr/usb /sbin /usr/sbin If the permissions include a
'+', the file has an extended ACL. If the file has an extended ACL and it has not
+ been documented with the IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22315">
+ <title>GEN001270</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37233r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001270</version>
+ <title>System log files must not have extended ACLs, except as needed to
support authorized software.</title>
+ <description><VulnDiscussion>If the system log files are not
protected, unauthorized users could change the logged data, eliminating its forensic
value. Authorized software may be given log file access through the use of extended ACLs
when
+ needed and configured to provide the least privileges
+
required.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECLP-1,
ECTP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001314</ident>
+ <fixtext fixref="F-31180r1_fix">Remove the extended ACL from the
file. Procedure: # setfacl --remove-all [file with extended ACL]</fixtext>
+ <fix id="F-31180r1_fix" />
+ <check system="C-35922r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify system log files have no extended ACLs. Procedure: #
ls -lL /var/log If the permissions include a '+', the file has an extended ACL. If
an extended ACL exists, verify with the SA if the ACL is required to support authorized
+ software and provides the minimum necessary permissions. If an extended ACL
exists providing access beyond the needs of authorized software, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22316">
+ <title>GEN001290</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37238r1_rule" severity="low"
weight="10.0">
+ <version>GEN001290</version>
+ <title>All manual page files must not have extended ACLs.</title>
+ <description><VulnDiscussion>If manual pages are compromised,
misleading information could be inserted, causing actions to compromise the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31185r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /usr/share/man/* /usr/share/info/*
/usr/share/infopage/*</fixtext>
+ <fix id="F-31185r1_fix" />
+ <check system="C-35929r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify all manual page files have no extended ACLs. # ls -lL
/usr/share/man /usr/share/info /usr/share/infopage If the permissions include a
'+', the file has an extended ACL this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22317">
+ <title>GEN001310</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37250r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001310</version>
+ <title>All library files must not have extended ACLs.</title>
+ <description><VulnDiscussion>Unauthorized access could destroy
the integrity of the library
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001499</ident>
+ <fixtext fixref="F-31197r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /usr/lib/* /lib/*</fixtext>
+ <fix id="F-31197r1_fix" />
+ <check system="C-35940r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify system libraries have no extended ACLs. # ls -lL
/usr/lib/* /lib/* | grep "+ " If the permissions include a '+', the file
has an extended ACL. If the file has an extended ACL and has not been approved by the IAO,
this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22318">
+ <title>GEN001361</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37277r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001361</version>
+ <title>NIS/NIS+/yp command files must not have extended ACLs.</title>
+ <description><VulnDiscussion>NIS/NIS+/yp files are part of the
system's identification and authentication processes and are critical to system
security. ACLs on these files could result in unauthorized modification, which could
compromise
+ these processes and the system.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-23574r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /var/yp/*</fixtext>
+ <fix id="F-23574r1_fix" />
+ <check system="C-35968r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify NIS/NIS+/yp files have no extended ACLs. # ls -lL
/var/yp/* If the permissions include a '+', the file has an extended ACL. If the
file has an extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22319">
+ <title>GEN001362</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37280r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001362</version>
+ <title>The /etc/resolv.conf file must be owned by root.</title>
+ <description><VulnDiscussion>The resolv.conf (or equivalent)
file configures the system's DNS resolver. DNS is used to resolve host names to IP
addresses. If DNS configuration is modified maliciously, host name resolution may fail or
return
+ incorrect information. DNS may be used by a variety of system security functions
such as time synchronization, centralized authentication, and remote system logging.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31226r1_fix">Change the owner of the
/etc/resolv.conf file to root. # chown root /etc/resolv.conf</fixtext>
+ <fix id="F-31226r1_fix" />
+ <check system="C-35971r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the /etc/resolv.conf file is owned by root. # ls -l
/etc/resolv.conf If the file is not owned by root, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22320">
+ <title>GEN001363</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37286r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001363</version>
+ <title>The /etc/resolv.conf file must be group-owned by root, bin, or
sys.</title>
+ <description><VulnDiscussion>The resolv.conf (or equivalent)
file configures the system's DNS resolver. DNS is used to resolve host names to IP
addresses. If DNS configuration is modified maliciously, host name resolution may fail or
return
+ incorrect information. DNS may be used by a variety of system security functions
such as time synchronization, centralized authentication, and remote system
+
logging.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31233r2_fix">Change the group-owner of the
/etc/resolv.conf file to root, bin, or sys. Procedure: # chgrp root
/etc/resolv.conf</fixtext>
+ <fix id="F-31233r2_fix" />
+ <check system="C-35978r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the resolv.conf file.
Procedure: # ls -lL /etc/resolv.conf If the file is not group-owned by root, bin, or sys,
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22321">
+ <title>GEN001364</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37291r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001364</version>
+ <title>The /etc/resolv.conf file must have mode 0644 or less
permissive.</title>
+ <description><VulnDiscussion>The resolv.conf (or equivalent)
file configures the system's DNS resolver. DNS is used to resolve host names to IP
addresses. If DNS configuration is modified maliciously, host name resolution may fail or
return
+ incorrect information. DNS may be used by a variety of system security functions
such as time synchronization, centralized authentication, and remote system
+
logging.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31239r1_fix">Change the mode of the
/etc/resolv.conf file to 0644. # chmod 0644 /etc/resolv.conf</fixtext>
+ <fix id="F-31239r1_fix" />
+ <check system="C-35980r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the /etc/resolv.conf file. # ls -l
/etc/resolv.conf If the file mode is not 0644, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22322">
+ <title>GEN001365</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37307r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001365</version>
+ <title>The /etc/resolv.conf file must not have an extended
ACL.</title>
+ <description><VulnDiscussion>The resolv.conf (or equivalent)
file configures the system's DNS resolver. DNS is used to resolve host names to IP
addresses. If DNS configuration is modified maliciously, host name resolution may fail or
return
+ incorrect information. DNS may be used by a variety of system security functions
such as time synchronization, centralized authentication, and remote system
+
logging.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-23589r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/resolv.conf</fixtext>
+ <fix id="F-23589r1_fix" />
+ <check system="C-36001r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify /etc/resolv.conf has no extended ACL. # ls -l
/etc/resolv.conf If the permissions include a '+', the file has an extended ACL.
If the file has an extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22323">
+ <title>GEN001366</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37309r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001366</version>
+ <title>The /etc/hosts file must be owned by root.</title>
+ <description><VulnDiscussion>The /etc/hosts file (or
equivalent) configures local host name to IP address mappings that typically take
precedence over DNS resolution. If this file is maliciously modified, it could cause the
failure or
+ compromise of security functions requiring name resolution, which may include time
synchronization, centralized authentication, and remote system
+
logging.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31256r1_fix">Change the owner of the /etc/hosts
file to root. # chown root /etc/hosts</fixtext>
+ <fix id="F-31256r1_fix" />
+ <check system="C-36003r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the /etc/hosts file is owned by root. # ls -l
/etc/hosts If the file is not owned by root, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22324">
+ <title>GEN001367</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37315r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001367</version>
+ <title>The /etc/hosts file must be group-owned by root, bin, or
sys.</title>
+ <description><VulnDiscussion>The /etc/hosts file (or
equivalent) configures local host name to IP address mappings that typically take
precedence over DNS resolution. If this file is maliciously modified, it could cause the
failure or
+ compromise of security functions requiring name resolution, which may include time
synchronization, centralized authentication, and remote system
+
logging.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31260r2_fix">Change the group-owner of the
/etc/hosts file to root, sys, or bin. Procedure: # chgrp root /etc/hosts</fixtext>
+ <fix id="F-31260r2_fix" />
+ <check system="C-36009r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the /etc/hosts file's group ownership. Procedure:
# ls -lL /etc/hosts If the file is not group-owned by root, bin, or sys, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22325">
+ <title>GEN001368</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37321r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001368</version>
+ <title>The /etc/hosts file must have mode 0644 or less
permissive.</title>
+ <description><VulnDiscussion>The /etc/hosts file (or
equivalent) configures local host name to IP address mappings that typically take
precedence over DNS resolution. If this file is maliciously modified, it could cause the
failure or
+ compromise of security functions requiring name resolution, which may include time
synchronization, centralized authentication, and remote system
+
logging.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31264r1_fix">Change the mode of the /etc/hosts
file to 0644. # chmod 0644 /etc/hosts</fixtext>
+ <fix id="F-31264r1_fix" />
+ <check system="C-36013r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the /etc/hosts file. # ls -l /etc/hosts If
the file mode is not 0644, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22326">
+ <title>GEN001369</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37324r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001369</version>
+ <title>The /etc/hosts file must not have an extended ACL.</title>
+ <description><VulnDiscussion>The /etc/hosts file (or
equivalent) configures local host name to IP address mappings that typically take
precedence over DNS resolution. If this file is maliciously modified, it could cause the
failure or
+ compromise of security functions requiring name resolution, which may include time
synchronization, centralized authentication, and remote system
+
logging.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-23600r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/hosts</fixtext>
+ <fix id="F-23600r1_fix" />
+ <check system="C-36016r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify /etc/hosts has no extended ACL. # ls -l /etc/hosts If
the permissions include a '+', the file has an extended ACL. If the file has an
extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22327">
+ <title>GEN001371</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37326r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001371</version>
+ <title>The /etc/nsswitch.conf file must be owned by root.</title>
+ <description><VulnDiscussion>The nsswitch.conf file (or
equivalent) configures the source of a variety of system security information including
account, group, and host lookups. Malicious changes could prevent the system from
functioning or
+ compromise system
+
security.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31267r1_fix">Change the owner of the
/etc/nsswitch.conf file to root. # chown root /etc/nsswitch.conf</fixtext>
+ <fix id="F-31267r1_fix" />
+ <check system="C-36018r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the /etc/nsswitch.conf file is owned by root. # ls -l
/etc/nsswitch.conf If the file is not owned by root, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22328">
+ <title>GEN001372</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37330r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001372</version>
+ <title>The /etc/nsswitch.conf file must be group-owned by root, bin, or
sys.</title>
+ <description><VulnDiscussion>The nsswitch.conf file (or
equivalent) configures the source of a variety of system security information including
account, group, and host lookups. Malicious changes could prevent the system from
functioning or
+ compromise system
+
security.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31268r1_fix">Change the group-owner of the
/etc/nsswitch.conf file to root, bin or sys. Procedure: # chgrp root
/etc/nsswitch.conf</fixtext>
+ <fix id="F-31268r1_fix" />
+ <check system="C-36019r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the nsswitch.conf file.
Procedure: # ls -lL /etc/nsswitch.conf If the file is not group-owned by root, bin or sys,
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22329">
+ <title>GEN001373</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37332r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001373</version>
+ <title>The /etc/nsswitch.conf file must have mode 0644 or less
permissive.</title>
+ <description><VulnDiscussion>The nsswitch.conf file (or
equivalent) configures the source of a variety of system security information including
account, group, and host lookups. Malicious changes could prevent the system from
functioning or
+ compromise system
+
security.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31270r1_fix">Change the mode of the
/etc/nsswitch.conf file to 0644 or less permissive. # chmod 0644
/etc/nsswitch.conf</fixtext>
+ <fix id="F-31270r1_fix" />
+ <check system="C-36022r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the /etc/nsswitch.conf file. # ls -l
/etc/nsswitch.conf If the file mode is not 0644, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22330">
+ <title>GEN001374</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37334r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001374</version>
+ <title>The /etc/nsswitch.conf file must not have an extended
ACL.</title>
+ <description><VulnDiscussion>The nsswitch.conf file (or
equivalent) configures the source of a variety of system security information including
account, group, and host lookups. Malicious changes could prevent the system from
functioning or
+ compromise system
+
security.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-23607r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/nsswitch.conf</fixtext>
+ <fix id="F-23607r1_fix" />
+ <check system="C-36025r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify /etc/nsswitch.conf has no extended ACL. # ls -l
/etc/nsswitch.conf If the permissions include a '+', the file has an extended ACL.
If the file has an extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22332">
+ <title>GEN001378</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37336r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001378</version>
+ <title>The /etc/passwd file must be owned by root.</title>
+ <description><VulnDiscussion>The /etc/passwd file contains the
list of local system accounts. It is vital to system security and must be protected from
unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31273r1_fix">Change the owner of the /etc/passwd
file to root. # chown root /etc/passwd</fixtext>
+ <fix id="F-31273r1_fix" />
+ <check system="C-36027r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the /etc/passwd file is owned by root. # ls -l
/etc/passwd If the file is not owned by root, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22333">
+ <title>GEN001379</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37337r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001379</version>
+ <title>The /etc/passwd file must be group-owned by root, bin, or
sys.</title>
+ <description><VulnDiscussion>The /etc/passwd file contains the
list of local system accounts. It is vital to system security and must be protected from
unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31274r1_fix">Change the group-owner of the
/etc/passwd file to root, bin or sys. Procedure: # chgrp root /etc/passwd</fixtext>
+ <fix id="F-31274r1_fix" />
+ <check system="C-36028r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the passwd file. Procedure: #
ls -lL /etc/passwd If the file is not group-owned by root, bin or sys, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22334">
+ <title>GEN001390</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37346r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001390</version>
+ <title>The /etc/passwd file must not have an extended ACL.</title>
+ <description><VulnDiscussion>File system ACLs can provide
access to files beyond what is allowed by the mode numbers of the files. The /etc/passwd
file contains the list of local system accounts. It is vital to system security and must
be
+ protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-23614r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/passwd</fixtext>
+ <fix id="F-23614r1_fix" />
+ <check system="C-36038r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify /etc/passwd has no extended ACL. # ls -l /etc/passwd
If the permissions include a '+', the file has an extended ACL. If the file has an
extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22335">
+ <title>GEN001391</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37351r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001391</version>
+ <title>The /etc/group file must be owned by root.</title>
+ <description><VulnDiscussion>The /etc/group file is critical to
system security and must be owned by a privileged user. The group file contains a list of
system groups and associated
+
information.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31286r1_fix">Change the owner of the /etc/group
file to root. # chown root /etc/group</fixtext>
+ <fix id="F-31286r1_fix" />
+ <check system="C-36042r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the /etc/group file is owned by root. # ls -l
/etc/group If the file is not owned by root, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22336">
+ <title>GEN001392</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37352r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001392</version>
+ <title>The /etc/group file must be group-owned by root, bin, or
sys.</title>
+ <description><VulnDiscussion>The /etc/group file is critical to
system security and must be protected from unauthorized modification. The group file
contains a list of system groups and associated
+
information.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31287r1_fix">Change the group-owner of the
/etc/group file. Procedure: # chgrp root /etc/group</fixtext>
+ <fix id="F-31287r1_fix" />
+ <check system="C-36043r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the /etc/group file. Procedure:
# ls -lL /etc/group If the file is not group-owned by root, bin or sys, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22337">
+ <title>GEN001393</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37354r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001393</version>
+ <title>The /etc/group file must have mode 0644 or less
permissive.</title>
+ <description><VulnDiscussion>The /etc/group file is critical to
system security and must be protected from unauthorized modification. The group file
contains a list of system groups and associated
+
information.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31289r1_fix">Change the mode of the /etc/group
file to 0644 or less permissive. # chmod 0644 /etc/group</fixtext>
+ <fix id="F-31289r1_fix" />
+ <check system="C-36045r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the /etc/group file. # ls -l /etc/group If
the file mode is more permissive than 0644, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22338">
+ <title>GEN001394</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37357r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001394</version>
+ <title>The /etc/group file must not have an extended ACL.</title>
+ <description><VulnDiscussion>The /etc/group file is critical to
system security and must be protected from unauthorized modification. The group file
contains a list of system groups and associated
+
information.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31291r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/group</fixtext>
+ <fix id="F-31291r1_fix" />
+ <check system="C-36047r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify /etc/group has no extended ACL. # ls -l /etc/group If
the permissions include a '+', the file has an extended ACL. If the file has an
extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22339">
+ <title>GEN001410</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37365r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001410</version>
+ <title>The /etc/shadow file (or equivalent) must be group-owned by root,
bin,or sys.</title>
+ <description><VulnDiscussion>The /etc/shadow file contains the
list of local system accounts. It is vital to system security and must be protected from
unauthorized modification. The file also contains password hashes which must not be
+ accessible to users other than
+
root.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31297r1_fix">Change the group-owner of the
/etc/shadow file. Procedure: # chgrp root /etc/shadow</fixtext>
+ <fix id="F-31297r1_fix" />
+ <check system="C-36053r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of the /etc/shadow file. Procedure: # ls
-lL /etc/shadow If the file is not group-owned by root, bin, or sys, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22340">
+ <title>GEN001430</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37371r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001430</version>
+ <title>The /etc/shadow file must not have an extended ACL.</title>
+ <description><VulnDiscussion>The /etc/shadow file contains the
list of local system accounts. It is vital to system security and must be protected from
unauthorized modification. The file also contains password hashes which must not be
+ accessible to users other than
+
root.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31303r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/shadow</fixtext>
+ <fix id="F-31303r1_fix" />
+ <check system="C-36058r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify /etc/shadow has no extended ACL. # ls -l /etc/shadow
If the permissions include a '+', the file has an extended ACL. If the file has an
extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22341">
+ <title>GEN000000-LNX001431</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37143r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX001431</version>
+ <title>The /etc/gshadow file must be owned by root.</title>
+ <description><VulnDiscussion>The /etc/gshadow file is critical
to system security and must be owned by a privileged user. The /etc/gshadow file contains
a list of system groups and hashes for group
+
passwords.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident system="http://cce.mitre.org">CCE-4210-1</ident>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31110r1_fix">Change the owner of the
/etc/gshadow file to root. # chown root /etc/gshadow</fixtext>
+ <fix id="F-31110r1_fix" />
+ <check system="C-35861r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the /etc/gshadow file is owned by root. # ls -l
/etc/gshadow If the file is not owned by root, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22342">
+ <title>GEN000000-LNX001432</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37164r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX001432</version>
+ <title>The /etc/gshadow file must be group-owned by root.</title>
+ <description><VulnDiscussion>The /etc/gshadow file is critical
to system security and must be protected from unauthorized modification. The /etc/gshadow
file contains a list of system groups and hashes for group
+
passwords.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31125r1_fix">Change the group-owner of the
/etc/gshadow file to root. # chgrp root /etc/gshadow</fixtext>
+ <fix id="F-31125r1_fix" />
+ <check system="C-35871r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the /etc/gshadow file is group-owned by root. # ls -l
/etc/gshadow If the file is not group-owned by root, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22343">
+ <title>GEN000000-LNX001433</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37170r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX001433</version>
+ <title>The /etc/gshadow file must have mode 0400.</title>
+ <description><VulnDiscussion>The /etc/gshadow file is critical
to system security and must be protected from unauthorized modification. The /etc/gshadow
file contains a list of system groups and hashes for group
+
passwords.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31130r1_fix">Change the mode of the /etc/gshadow
file to 0400 or less permissive. # chmod 0400 /etc/gshadow</fixtext>
+ <fix id="F-31130r1_fix" />
+ <check system="C-35875r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of the /etc/gshadow file. # ls -l
/etc/gshadow If the file mode is more permissive than 0400, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22344">
+ <title>GEN000000-LNX001434</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37176r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX001434</version>
+ <title>The /etc/gshadow file must not have an extended ACL.</title>
+ <description><VulnDiscussion>The /etc/gshadow file is critical
to system security and must be protected from unauthorized modification. The /etc/gshadow
file contains a list of system groups and hashes for group
+
passwords.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31135r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/gshadow</fixtext>
+ <fix id="F-31135r1_fix" />
+ <check system="C-35880r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/gshadow has no extended ACL. # ls -l /etc/gshadow
If the permissions include a '+', the file has an extended ACL. If the file has an
extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22347">
+ <title>GEN001470</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37381r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001470</version>
+ <title>The /etc/passwd file must not contain password hashes.</title>
+ <description><VulnDiscussion>If password hashes are readable by
non-administrators, the passwords are subject to attack through lookup tables or
cryptographic weaknesses in the
+
hashes.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000201</ident>
+ <fixtext fixref="F-31312r1_fix">Migrate /etc/passwd password hashes
to /etc/shadow. # pwconv</fixtext>
+ <fix id="F-31312r1_fix" />
+ <check system="C-36068r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify no password hashes are present in /etc/passwd. # cut
-d : -f 2 /etc/passwd | grep -v '^(x|\*)$' If any password hashes are returned,
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22348">
+ <title>GEN001475</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37383r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001475</version>
+ <title>The /etc/group file must not contain any group password
hashes.</title>
+ <description><VulnDiscussion>Group passwords are typically
shared and should not be used. Additionally, if password hashes are readable by
non-administrators, the passwords are subject to attack through lookup tables or
cryptographic
+ weaknesses in the
+
hashes.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31314r1_fix">Edit /etc/group and change the
password field to an exclamation point (!) to lock the group password.</fixtext>
+ <fix id="F-31314r1_fix" />
+ <check system="C-36070r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the /etc/group file for password hashes. # cut -d : -f
2 /etc/group | egrep -v '^(x|!)$' If any password hashes are returned, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22349">
+ <title>GEN000000-LNX001476</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37386r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX001476</version>
+ <title>The /etc/gshadow file must not contain any group password
hashes.</title>
+ <description><VulnDiscussion>Group passwords are typically
shared and should not be
+
used.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31317r1_fix">Edit /etc/gshadow and change the
password field to an exclamation point (!) to lock the group password.</fixtext>
+ <fix id="F-31317r1_fix" />
+ <check system="C-36073r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the /etc/gshadow file for password hashes. # cut -d :
-f 2 /etc/gshadow | egrep -v '^(x|!!)$' If any password hashes are returned, this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22350">
+ <title>GEN001490</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37162r1_rule" severity="low"
weight="10.0">
+ <version>GEN001490</version>
+ <title>User home directories must not have extended ACLs.</title>
+ <description><VulnDiscussion>Excessive permissions on home
directories allow unauthorized access to user
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-23641r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all [user home directory with extended ACL]</fixtext>
+ <fix id="F-23641r1_fix" />
+ <check system="C-37525r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify user home directories have no extended ACLs. # cut -d
: -f 6 /etc/passwd | xargs -n1 ls -ld If the permissions include a '+', the file
has an extended ACL this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22351">
+ <title>GEN001550</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37180r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001550</version>
+ <title>All files and directories contained in user home directories must be
group-owned by a group of which the home directory's owner is a member.</title>
+ <description><VulnDiscussion>If a user's files are
group-owned by a group of which the user is not a member, unintended users may be able to
access
+
them.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31138r1_fix">Change the group of a file not
group-owned by a group of which the home directory's owner is a member. # chgrp
<group with user as member> <file with bad group ownership>
Document all changes.</fixtext>
+ <fix id="F-31138r1_fix" />
+ <check system="C-35883r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the contents of user home directories for files
group-owned by a group of which the home directory's owner is not a member. 1. List
the user accounts. # cut -d : -f 1 /etc/passwd 2. For each user account, get a list of
GIDs
+ for files in the user's home directory. # find ~username -printf %G\\n | sort
| uniq 3. Obtain the list of GIDs where the user is a member. # id -G username 4. Check
the GID lists. If there are GIDs in the file list not present in the user list,
+ this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22352">
+ <title>GEN001570</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37188r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001570</version>
+ <title>All files and directories contained in user home directories must not
have extended ACLs.</title>
+ <description><VulnDiscussion>Excessive permissions allow
unauthorized access to user
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32776r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all <user file with extended ACL></fixtext>
+ <fix id="F-32776r1_fix" />
+ <check system="C-37530r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the contents of user home directories for files with
extended ACLs. # cut -d : -f 6 /etc/passwd | xargs -n1 -IDIR ls -alLR DIR If the
permissions include a '+', the file has an extended ACL. If the file has an
extended ACL
+ and it has not been documented with the IAO, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22353">
+ <title>GEN001590</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37196r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001590</version>
+ <title>All run control scripts must have no extended ACLs.</title>
+ <description><VulnDiscussion>If the startup files are writable
by other users, they could modify the startup files to insert malicious commands into the
startup
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32778r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all <run control script with extended
ACL></fixtext>
+ <fix id="F-32778r1_fix" />
+ <check system="C-37532r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify run control scripts have no extended ACLs. # ls -lL
/etc/rc* /etc/init.d If the permissions include a '+', the file has an extended
ACL. If the file has an extended ACL and it has not been documented with the IAO, this is
a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22354">
+ <title>GEN001605</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37211r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001605</version>
+ <title>Run control scripts' library search paths must contain only
absolute paths.</title>
+ <description><VulnDiscussion>The library search path
environment variable(s) contain a list of directories for the dynamic linker to search to
find libraries. If this path includes the current working directory or other relative
paths,
+ libraries in these directories may be loaded instead of system libraries. This
variable is formatted as a colon-separated list of directories. If there is an empty
entry, such as a leading or trailing colon, or two consecutive colons, this is
+ interpreted as the current working directory. Paths starting with a slash (/) are
absolute paths.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32780r1_fix">Edit the run control script and
remove the relative path entry from the library search path variable.</fixtext>
+ <fix id="F-32780r1_fix" />
+ <check system="C-37534r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify run control scripts' library search paths. # grep
-r LD_LIBRARY_PATH /etc/rc* /etc/init.d This variable is formatted as a colon-separated
list of directories. If there is an empty entry, such as a leading or trailing colon,
+ or two consecutive colons, this is a finding. If an entry begins with a character
other than a slash (/) this is a relative path, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22355">
+ <title>GEN001610</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37215r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001610</version>
+ <title>Run control scripts' lists of preloaded libraries must contain
only absolute paths.</title>
+ <description><VulnDiscussion>The library preload list
environment variable contains a list of libraries for the dynamic linker to load before
loading the libraries required by the binary. If this list contains paths to libraries
relative to
+ the current working directory, unintended libraries may be preloaded. This variable
is formatted as a space-separated list of libraries. Paths starting with a slash (/) are
absolute
+
paths.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32781r1_fix">Edit the run control script and
remove the relative path entry from the library preload variable.</fixtext>
+ <fix id="F-32781r1_fix" />
+ <check system="C-37535r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify run control scripts' library preload list. # grep
-r LD_PRELOAD /etc/rc* /etc/init.d This variable is formatted as a colon-separated list of
paths. If there is an empty entry, such as a leading or trailing colon, or two
+ consecutive colons, this is a finding. If an entry begins with a character other
than a slash (/) this is a relative path, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22356">
+ <title>GEN001730</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37279r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001730</version>
+ <title>All global initialization files must not have extended
ACLs.</title>
+ <description><VulnDiscussion>Global initialization files are
used to configure the user's shell environment upon login. Malicious modification of
these files could compromise accounts upon
+
logon.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31225r1_fix">Remove the extended ACL from the
file. # ls -l etc/bashrc /etc/csh.cshrc /etc/csh.login /etc/csh.logout /etc/environment
/etc/ksh.kshrc /etc/profile /etc/suid_profile /etc/profile.d/* 2>null|grep "\+
"|sed "s/^.*
+ \///g"|xargs setfacl --remove-all</fixtext>
+ <fix id="F-31225r1_fix" />
+ <check system="C-35970r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check global initialization files for extended ACLs: # ls -l
/etc/bashrc /etc/csh.cshrc /etc/csh.login /etc/csh.logout /etc/environment /etc/ksh.kshrc
/etc/profile /etc/suid_profile /etc/profile.d/* 2>null|grep "\+ " If the
+ permissions include a '+', the file has an extended ACL. If the file has
an extended ACL and it has not been documented with the IAO, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22357">
+ <title>GEN001810</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37297r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001810</version>
+ <title>Skeleton files must not have extended ACLs.</title>
+ <description><VulnDiscussion>If the skeleton files are not
protected, unauthorized personnel could change user startup parameters and possibly
jeopardize user
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31245r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all [skeleton file with extended ACL] or: # ls -lL /etc/skel|grep
"\+ "|sed "s/^.* \//|xargs setfacl --remove-all will remove all ACLs from
the
+ files.</fixtext>
+ <fix id="F-31245r1_fix" />
+ <check system="C-35991r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check skeleton files for extended ACLs: # ls -alL /etc/skel
If the permissions include a '+', the file has an extended ACL. If the file has an
extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22358">
+ <title>GEN001830</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37237r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001830</version>
+ <title>All skeleton files (typically in /etc/skel) must be group-owned by
root, bin, sys, system, or other.</title>
+ <description><VulnDiscussion>If the skeleton files are not
protected, unauthorized personnel could change user startup parameters and possibly
jeopardize user
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31184r1_fix">Change the group-owner of the
skeleton file to root, bin, sys, system, or other. Procedure: # chgrp
<group> /etc/skel/[skeleton file] or: # ls -L /etc/skel|xargs stat -L -c
%G:%n|egrep -v
+ "^(root|bin|sy|sytem|other):"|cut -d: -f2|chgrp root will change the
group of all files not already one of the approved group to root.</fixtext>
+ <fix id="F-31184r1_fix" />
+ <check system="C-35927r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the skeleton files are group-owned by root.
Procedure: # ls -alL /etc/skel If a skeleton file is not group-owned by root, bin, sys,
system, or other this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22359">
+ <title>GEN001845</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37246r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001845</version>
+ <title>Global initialization files' library search paths must contain
only absolute paths.</title>
+ <description><VulnDiscussion>The library search path
environment variable(s) contain a list of directories for the dynamic linker to search to
find libraries. If this path includes the current working directory or other relative
paths,
+ libraries in these directories may be loaded instead of system libraries. This
variable is formatted as a colon-separated list of directories. If there is an empty
entry, such as a leading or trailing colon, or two consecutive colons, this is
+ interpreted as the current working directory. Paths starting with a slash (/) are
absolute
+
paths.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31193r1_fix">Edit the global initialization file
and remove the relative path entry from the library search path variable.</fixtext>
+ <fix id="F-31193r1_fix" />
+ <check system="C-35936r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the global initialization files' library search
paths. Procedure: # grep LD_LIBRARY_PATH /etc/bashrc /etc/csh.cshrc /etc/csh.login
/etc/csh.logout /etc/environment /etc/ksh.kshrc /etc/profile /etc/suid_profile
+ /etc/profile.d/* This variable is formatted as a colon-separated list of
directories. If there is an empty entry, such as a leading or trailing colon, or two
consecutive colons, this is a finding. If an entry begins with a character other than a
+ slash (/) this is a relative path, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22360">
+ <title>GEN001850</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37248r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001850</version>
+ <title>Global initialization files' lists of preloaded libraries must
contain only absolute paths.</title>
+ <description><VulnDiscussion>The library preload list
environment variable contains a list of libraries for the dynamic linker to load before
loading the libraries required by the binary. If this list contains paths to libraries
relative to
+ the current working directory, unintended libraries may be preloaded. This variable
is formatted as a space-separated list of libraries. Paths starting with a slash (/) are
absolute
+
paths.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31195r1_fix">Edit the global initialization file
and remove the relative path entry from the library preload variable.</fixtext>
+ <fix id="F-31195r1_fix" />
+ <check system="C-35938r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the global initialization files' library preload
list. # grep -r LD_PRELOAD /etc/bashrc /etc/csh.cshrc /etc/csh.login /etc/csh.logout
/etc/environment /etc/ksh.kshrc /etc/profile /etc/suid_profile /etc/profile.d/* This
+ variable is formatted as a colon-separated list of paths. If there is an empty
entry, such as a leading or trailing colon, or two consecutive colons, this is a finding.
If an entry begins with a character other than a slash (/) this is a relative
+ path, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22361">
+ <title>GEN001870</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37252r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001870</version>
+ <title>Local initialization files must be group-owned by the user's
primary group or root.</title>
+ <description><VulnDiscussion>Local initialization files are
used to configure the user's shell environment upon login. Malicious modification of
these files could compromise accounts upon
+
logon.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31199r1_fix">Change the group-owner of the local
initialization file to the user's primary group, or root. # chgrp <user's
primary GID> <user's local initialization file> Procedure: #
FILES=".bashrc .bash_login
+ .bash_logout .bash_profile .cshrc .kshrc .login .logout .profile .tcshrc .env
.dtprofile .dispatch .emacs .exrc"; # for PWLINE in `cut -d: -f4,6 /etc/passwd`; do
HOMEDIR=$(echo ${PWLINE}|cut -d: -f2);GROUP=$(echo ${PWLINE} | cut -d: -f1);for
+ INIFILE in $FILES;do MATCH=$(stat -c %g/%G:%n ${HOMEDIR}/${INIFILE}
2>null|egrep -c -v "${GROUP}");if [ $MATCH != 0 ] ; then chgrp ${GROUP}
${HOMEDIR}/${INIFILE};fi;done;done</fixtext>
+ <fix id="F-31199r1_fix" />
+ <check system="C-35943r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check user home directories for local initialization files
group-owned by a group other than the user's primary group or root. Procedure: #
FILES=" .login .cshrc .logout .profile .bash_profile .bashrc .bash_logout .env
.dtprofile
+ .dispatch .emacs .exrc"; # for PWLINE in `cut -d: -f4,6 /etc/passwd`; do
HOMEDIR=$(echo ${PWLINE}|cut -d: -f2);GROUP=$(echo ${PWLINE} | cut -d: -f1);for INIFILE in
$FILES;do stat -c %g/%G:%n ${HOMEDIR}/${INIFILE} 2>null|egrep -v
+ "${GROUP}";done;done If any file is not group-owned by root or the
user's primary GID, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22362">
+ <title>GEN001890</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37271r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001890</version>
+ <title>Local initialization files must not have extended ACLs.</title>
+ <description><VulnDiscussion>Local initialization files are
used to configure the user's shell environment upon login. Malicious modification of
these files could compromise accounts upon
+
logon.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31219r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all <local initialization file with extended
ACL></fixtext>
+ <fix id="F-31219r1_fix" />
+ <check system="C-35963r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check user home directories for local initialization files
with extended ACLs. # cut -d : -f 6 /etc/passwd | xargs -n1 -IDIR ls -alL DIR/.bashrc
DIR/.bash_login DIR/.bash_logout DIR/.bash_profile DIR/.cshrc DIR/.kshrc DIR/.login
+ DIR/.logout DIR/.profile DIR/.env DIR/.dtprofile DIR/.dispatch DIR/.emacs
DIR/.exrc If the permissions include a '+', the file has an extended ACL. If the
file has an extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22363">
+ <title>GEN001901</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37305r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001901</version>
+ <title>Local initialization files' library search paths must contain only
absolute paths.</title>
+ <description><VulnDiscussion>The library search path
environment variable(s) contain a list of directories for the dynamic linker to search to
find libraries. If this path includes the current working directory or other relative
paths,
+ libraries in these directories may be loaded instead of system libraries. This
variable is formatted as a colon-separated list of directories. If there is an empty
entry, such as a leading or trailing colon, or two consecutive colons, this is
+ interpreted as the current working directory. Paths starting with a slash (/) are
absolute
+
paths.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31253r1_fix">Edit the local initialization file
and remove the relative path entry from the library search path variable.</fixtext>
+ <fix id="F-31253r1_fix" />
+ <check system="C-36000r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify local initialization files have library search path
containing only absolute paths. Procedure: # cut -d: -f6 /etc/passwd |xargs -n1 -IDIR find
DIR -name ".*" -type f -maxdepth 1 -exec grep -H LD_LIBRARY_PATH {} \; This
+ variable is formatted as a colon-separated list of directories. If there is an
empty entry, such as a leading or trailing colon, or two consecutive colons, this is a
finding. If an entry begins with a character other than a slash (/) this is a
+ relative path, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22364">
+ <title>GEN001902</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37312r1_rule" severity="medium"
weight="10.0">
+ <version>GEN001902</version>
+ <title>Local initialization files' lists of preloaded libraries must
contain only absolute paths.</title>
+ <description><VulnDiscussion>The library preload list
environment variable contains a list of libraries for the dynamic linker to load before
loading the libraries required by the binary. If this list contains paths to libraries
relative to
+ the current working directory, unintended libraries may be preloaded. This variable
is formatted as a space-separated list of libraries. Paths starting with a slash (/) are
absolute
+
paths.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31257r1_fix">Edit the local initialization file
and remove the relative path entry from the library preload variable.</fixtext>
+ <fix id="F-31257r1_fix" />
+ <check system="C-36005r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify local initialization files have library preload list
containing only absolute paths. Procedure: # cut -d: -f6 /etc/passwd |xargs -n1 -IDIR find
DIR -name ".*" -type f -maxdepth 1 -exec grep -H LD_PRELOAD {} \; This variable
+ is formatted as a colon-separated list of paths. If there is an empty entry, such
as a leading or trailing colon, or two consecutive colons, this is a finding. If an entry
begins with a character other than a slash (/) this is a relative path,
+ this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22365">
+ <title>GEN002210</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37399r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002210</version>
+ <title>All shell files must be group-owned by root, bin, sys, or
system.</title>
+ <description><VulnDiscussion>If shell files are group-owned by
users other than root or a system group, they could be modified by intruders or malicious
users to perform unauthorized
+
actions.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31329r1_fix">Change the group-owner of the shell
to root, bin, sys, or system. Procedure: # chgrp root
<shell></fixtext>
+ <fix id="F-31329r1_fix" />
+ <check system="C-36082r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If /etc/shells exists, check the group ownership of each
shell referenced. Procedure: # cat /etc/shells | xargs -n1 ls -l Otherwise, check any
shells found on the system. Procedure: # find / -name "*sh" | xargs -n1 ls -l If
a shell
+ is not group-owned by root, bin, sys, or system, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22366">
+ <title>GEN002230</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37405r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002230</version>
+ <title>All shell files must not have extended ACLs.</title>
+ <description><VulnDiscussion>Shells with world/group write
permissions give the ability to maliciously modify the shell to obtain unauthorized
+
access.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31335r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all [shell]</fixtext>
+ <fix id="F-31335r1_fix" />
+ <check system="C-36088r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If /etc/shells exists, check the permissions of each shell
referenced. # cat /etc/shells | xargs -n1 ls -lL Otherwise, check any shells found on the
system. # find / -name "*sh" | xargs -n1 ls -lL If the permissions include a
'+',
+ the file has an extended ACL. If the file has an extended ACL and it has not been
documented with the IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22367">
+ <title>GEN002330</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37569r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002330</version>
+ <title>Audio devices must not have extended ACLs.</title>
+ <description><VulnDiscussion>File system ACLs can provide
access to files beyond what is allowed by the mode numbers of the
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31478r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all [device file]</fixtext>
+ <fix id="F-31478r1_fix" />
+ <check system="C-36218r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of audio devices. # ls -lL /dev/audio*
/dev/snd/* If the permissions include a '+', the file has an extended ACL. If the
file has an extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22368">
+ <title>GEN002430</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37623r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002430</version>
+ <title>Removable media, remote file systems, and any file system not
containing approved device files must be mounted with the "nodev"
option.</title>
+ <description><VulnDiscussion>The "nodev" (or
equivalent) mount option causes the system to not handle device files as system devices.
This option must be used for mounting any file system not containing approved device
files. Device files can
+ provide direct access to system hardware and can compromise security if not
+
protected.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31660r1_fix">Edit /etc/fstab and add the
"nodev" option to any filesystems mounted from removable media or network
shares.</fixtext>
+ <fix id="F-31660r1_fix" />
+ <check system="C-36822r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/mtab and verify the "nodev" mount
option is used on any filesystems mounted from removable media or network shares. If any
filesystem mounted from removable media or network shares does not have this option, this
is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22369">
+ <title>GEN002710</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37917r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002710</version>
+ <title>All system audit files must not have extended ACLs.</title>
+ <description><VulnDiscussion>If a user can write to the audit
logs, then audit trails can be modified or destroyed and system intrusion may not be
+
detected.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECTP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000163</ident>
+ <fixtext fixref="F-26222r1_fix">Remove the extended ACL from the
system audit file(s).</fixtext>
+ <fix id="F-26222r1_fix" />
+ <check system="C-37143r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system audit log files for extended ACLs.
Procedure: # grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs ls -l
If the permissions include a '+', the file has an extended ACL. If the file has an
extended ACL
+ and it has not been documented with the IAO, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22370">
+ <title>GEN002715</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26504r1_rule" severity="low"
weight="10.0">
+ <version>GEN002715</version>
+ <title>System audit tool executables must be owned by root.</title>
+ <description><VulnDiscussion>To prevent unauthorized access or
manipulation of system audit logs, the tools for manipulating those logs must be
+
protected.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001493</ident>
+ <fixtext fixref="F-23742r1_fix">Change the owner of the audit tool
executable to root. # chown root [audit tool executable]</fixtext>
+ <fix id="F-23742r1_fix" />
+ <check system="C-27558r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the audit tool executables are owned by root. # ls -l
/sbin/auditctl /sbin/auditd /sbin/ausearch /sbin/aureport /sbin/autrace /sbin/audispd If
any listed file is not owned by root, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22371">
+ <title>GEN002716</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26507r1_rule" severity="low"
weight="10.0">
+ <version>GEN002716</version>
+ <title>System audit tool executables must be group-owned by root, bin, sys,
or system.</title>
+ <description><VulnDiscussion>To prevent unauthorized access or
manipulation of system audit logs, the tools for manipulating those logs must be
+
protected.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001493</ident>
+ <fixtext fixref="F-23743r1_fix">Change the group-owner of the audit
tool executable to root, bin, sys, or system. Procedure: # chgrp root <audit tool
executable></fixtext>
+ <fix id="F-23743r1_fix" />
+ <check system="C-27561r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the audit tool executables are group-owned by root,
bin, sys, or system. Procedure: # ls -lL /sbin/auditctl /sbin/auditd /sbin/ausearch
/sbin/aureport /sbin/autrace /sbin/audispd If any listed file is not group-owned by
+ root, bin, sys, or system, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22372">
+ <title>GEN002717</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26510r1_rule" severity="low"
weight="10.0">
+ <version>GEN002717</version>
+ <title>System audit tool executables must have mode 0750 or less
permissive.</title>
+ <description><VulnDiscussion>To prevent unauthorized access or
manipulation of system audit logs, the tools for manipulating those logs must be
+
protected.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001493</ident>
+ <fixtext fixref="F-23745r1_fix">Change the mode of the audit tool
executable to 0750, or less permissive. # chmod 0750 [audit tool
executable]</fixtext>
+ <fix id="F-23745r1_fix" />
+ <check system="C-27564r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of audit tool executables. # ls -l
/sbin/auditctl /sbin/auditd /sbin/ausearch /sbin/aureport /sbin/autrace /sbin/audispd If
any listed file has a mode more permissive than 0750, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22373">
+ <title>GEN002718</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26513r1_rule" severity="low"
weight="10.0">
+ <version>GEN002718</version>
+ <title>System audit tool executables must not have extended
ACLs.</title>
+ <description><VulnDiscussion>To prevent unauthorized access or
manipulation of system audit logs, the tools for manipulating those logs must be
+
protected.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001493</ident>
+ <fixtext fixref="F-23749r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all [audit file]</fixtext>
+ <fix id="F-23749r1_fix" />
+ <check system="C-27567r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of audit tool executables. # ls -l
/sbin/auditctl /sbin/auditd /sbin/ausearch /sbin/aureport /sbin/autrace /sbin/audispd If
the permissions include a '+' the file has an extended ACL, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22374">
+ <title>GEN002719</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26517r1_rule" severity="low"
weight="10.0">
+ <version>GEN002719</version>
+ <title>The audit system must alert the SA in the event of an audit processing
failure.</title>
+ <description><VulnDiscussion>An accurate and current audit
trail is essential for maintaining a record of system activity. If the system fails, the
SA must be notified and must take prompt action to correct the problem. Minimally, the
system
+ must log this event and the SA will receive this notification during the daily
system log review. If feasible, active alerting (such as e-mail or paging) should be
employed consistent with the site’s established operations management systems and
+
procedures.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECAT-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000139</ident>
+ <fixtext fixref="F-32421r1_fix">Edit /etc/audit/auditd.conf and set
the disk_full_action and/or disk_error_action parameters to a valid setting of
"syslog", "exec", "single" or "halt", adding the
parameters if necessary.</fixtext>
+ <fix id="F-32421r1_fix" />
+ <check system="C-37174r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the /etc/audit/auditd.conf has the disk_full_action
and disk_error_action parameters set. Procedure: # grep disk_full_action
/etc/audit/audit.conf If the disk_full_action parameter is missing or set to
"suspend" or "ignore"
+ this is a finding. # grep disk_error_action /etc/audit/audit.conf If the
disk_error_action parameter is missing or set to "suspend" or "ignore"
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22375">
+ <title>GEN002730</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26518r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002730</version>
+ <title>The audit system must alert the SA when the audit storage volume
approaches its capacity.</title>
+ <description><VulnDiscussion>An accurate and current audit
trail is essential for maintaining a record of system activity. If the system fails, the
SA must be notified and must take prompt action to correct the problem. Minimally, the
system
+ must log this event and the SA will receive this notification during the daily
system log review. If feasible, active alerting (such as e-mail or paging) should be
employed consistent with the site’s established operations management systems and
+
procedures.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000143</ident>
+ <fixtext fixref="F-32424r1_fix">Edit /etc/audit/auditd.conf and set
the space_left_action parameter to a valid setting other than "ignore". If the
space_left_action parameter is set to "email" set the action_mail_acct parameter
to an e-mail address
+ for the system administrator.</fixtext>
+ <fix id="F-32424r1_fix" />
+ <check system="C-37192r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/audit/auditd.conf for the space_left_action and
action_mail_accnt parameters. If the space_left_action or the action_mail_accnt parameters
are set to blanks, this is a finding. If the space_left_action is set to
+ "syslog"the system logs the event, this is not a finding. If the
space_left_action is set to "exec"the system executes a designated script. If
this script informs the SA of the event, this is not a finding. If the space_left_action
parameter is
+ missing, this is a finding. If the space_left_action parameter is set to
"ignore" or "suspend" no logging would be performed after the event,
this is a finding. If the space_left_action parameter is set to "single" or
"halt" this effectively
+ stops the system causing a Denial of Service, this is a finding. If the
space_left_action is set to "email" and the action_mail_acct parameter is not
set to the e-mail address of the system administrator, this is a finding. The
action_mail_acct
+ parameter, if missing, defaults to "root". Note that if the email
address of the system administrator is on a remote system "sendmail" must be
available.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22376">
+ <title>GEN002750</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26519r1_rule" severity="low"
weight="10.0">
+ <version>GEN002750</version>
+ <title>The audit system must be configured to audit account
creation.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises, and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECAT-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000018</ident>
+ <fixtext fixref="F-23761r1_fix">Configure execute auditing of the
useradd and groupadd executables. Add the following to audit.rules: -w /usr/sbin/useradd
-p x -k useradd -w /usr/sbin/groupadd -p x -k groupadd Configure append auditing of the
+ passwd, shadow, group, and gshadow files. Add the following to audit.rules: -w
/etc/passwd -p a -k passwd -w /etc/shadow -p a -k shadow -w /etc/group -p a -k group -w
/etc/gshadow -p a -k gshadow Restart the auditd service.</fixtext>
+ <fix id="F-23761r1_fix" />
+ <check system="C-27572r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if execution of the useradd and groupadd
executable are audited. # auditctl -l | egrep '(useradd|groupadd)' If either
useradd or groupadd are not listed with a permissions filter of at least 'x', this
is a finding.
+ Determine if /etc/passwd, /etc/shadow, /etc/group, and /etc/gshadow are audited
for appending. # auditctl -l | egrep
'(/etc/passwd|/etc/shadow|/etc/group|/etc/gshadow)' If any of these are not listed
with a permissions filter of at least 'a',
+ this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22377">
+ <title>GEN002751</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26520r1_rule" severity="low"
weight="10.0">
+ <version>GEN002751</version>
+ <title>The audit system must be configured to audit account
modification.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECAT-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001403</ident>
+ <fixtext fixref="F-23762r1_fix">Configure execute auditing of the
usermod and groupmod executables. Add the following to the audit.rules file: -w
/usr/sbin/usermod -p x -k usermod -w /usr/sbin/groupmod -p x -k groupmod Configure append
auditing of
+ the passwd, shadow, group, and gshadow files. Add the following to the audit.rules
file: -w /etc/passwd -p w -k passwd -w /etc/shadow -p w -k shadow -w /etc/group -p w -k
group -w /etc/gshadow -p w -k gshadow Restart the auditd service.</fixtext>
+ <fix id="F-23762r1_fix" />
+ <check system="C-27573r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if execution of the usermod and groupmod
executable are audited. # auditctl -l | egrep '(usermod|groupmod)' If either
useradd or groupadd are not listed with a permissions filter of at least 'w', this
is a finding.
+ Determine if /etc/passwd, /etc/shadow, /etc/group, and /etc/gshadow are audited
for writing. # auditctl -l | egrep
'(/etc/passwd|/etc/shadow|/etc/group|/etc/gshadow)' If any of these are not listed
with a permissions filter of at least 'w', this
+ is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22378">
+ <title>GEN002752</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26521r1_rule" severity="low"
weight="10.0">
+ <version>GEN002752</version>
+ <title>The audit system must be configured to audit account
disabling.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECAT-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001404</ident>
+ <fixtext fixref="F-23763r1_fix">Configure execute auditing of the
passwd executable. Add the following to the audit.rules file: -w /usr/bin/passwd -p x -k
passwd Restart the auditd service.</fixtext>
+ <fix id="F-23763r1_fix" />
+ <check system="C-27574r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if execution of the passwd executable is audited.
# auditctl -l | grep /usr/bin/passwd If passwd is not listed with a permissions filter of
at least 'x', this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22382">
+ <title>GEN002753</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26522r1_rule" severity="low"
weight="10.0">
+ <version>GEN002753</version>
+ <title>The audit system must be configured to audit account
termination.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECAT-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001405</ident>
+ <fixtext fixref="F-32432r1_fix">Configure execute auditing of the
userdel and groupdel executables. Add the following to the audit.rules file: -w
/usr/sbin/userdel -p x -w /usr/sbin/groupdel -p x Restart the auditd
service.</fixtext>
+ <fix id="F-32432r1_fix" />
+ <check system="C-37216r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if execution of the userdel and groupdel
executable are audited. # auditctl -l | egrep '(userdel|groupdel)' If either
userdel or groupdel are not listed with a permissions filter of at least 'x', this
is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22383">
+ <title>GEN002825</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-38652r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002825</version>
+ <title>The audit system must be configured to audit the loading and unloading
of dynamic kernel modules.</title>
+ <description><VulnDiscussion>Actions concerning dynamic kernel
modules must be recorded as they are substantial events. Dynamic kernel modules can
increase the attack surface of a system. A malicious kernel module can be used to
substantially
+ alter the functioning of a system, often with the purpose of hiding a compromise
from the
+
SA.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECAR-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-32807r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Configure auditing of the init_module
syscalls. Add the following to the "etc/audit/audit.rules" or
"etc/audit.rules" file: -a exit,always -S init_module Restart the auditd
service. # service auditd
+ restart</fixtext>
+ <fix id="F-32807r1_fix" />
+ <check system="C-37564r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if the init_module syscall is audited. # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep -i
"init_module" If the result does not contain "-S init_module", this is
a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22384">
+ <title>GEN002990</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37382r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002990</version>
+ <title>The cron.allow file must not have an extended ACL.</title>
+ <description><VulnDiscussion>A readable and/or writeable
cron.allow file by other users than root could allow potential intruders and malicious
users to use the file contents to help discern information, such as who is allowed to
execute cron
+ programs, which could be harmful to overall system and network
+
security.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31313r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/cron.allow</fixtext>
+ <fix id="F-31313r1_fix" />
+ <check system="C-36069r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the cron.allow file. # ls -l
/etc/cron.allow If the permissions include a '+', the file has an extended ACL. If
the file has an extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22385">
+ <title>GEN003050</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37400r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003050</version>
+ <title>Crontab files must be group-owned by root, cron, or the crontab
creator's primary group.</title>
+ <description><VulnDiscussion>To protect the integrity of
scheduled system jobs and prevent malicious modification to these jobs, crontab files must
be
+
secured.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31323r1_fix">Change the group owner of the
crontab file to root, cron, or the crontab's primary group. Procedure: # chgrp root
[crontab file]</fixtext>
+ <fix id="F-31323r1_fix" />
+ <check system="C-36079r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the crontab files. Procedure: #
ls -lL /var/spool/cron # ls -lL /etc/cron.d /etc/crontab /etc/cron.daily /etc/cron.hourly
/etc/cron.monthly /etc/cron.weekly or # ls -lL /etc/cron*|grep -v deny If the
+ group owner is not root or the crontab owner's primary group, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22386">
+ <title>GEN003090</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37467r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003090</version>
+ <title>Crontab files must not have extended ACLs.</title>
+ <description><VulnDiscussion>To protect the integrity of
scheduled system jobs and to prevent malicious modification to these jobs, crontab files
must be secured. ACLs on crontab files may provide unauthorized access to the
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31378r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all [crontab file]</fixtext>
+ <fix id="F-31378r1_fix" />
+ <check system="C-36133r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the crontab files. Procedure: # ls
-lL /var/spool/cron # ls -lL /etc/cron.d /etc/crontab /etc/cron.daily /etc/cron.hourly
/etc/cron.monthly /etc/cron.weekly or # ls -lL /etc/cron*|grep -v deny If the
+ permissions include a '+', the file has an extended ACL. If the file has
an extended ACL and it has not been documented with the IAO, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22387">
+ <title>GEN003110</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37471r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003110</version>
+ <title>Cron and crontab directories must not have extended
ACLs.</title>
+ <description><VulnDiscussion>To protect the integrity of
scheduled system jobs and to prevent malicious modification to these jobs, crontab files
must be secured. ACLs on cron and crontab directories may provide unauthorized access to
these
+ directories. Unauthorized modifications to these directories or their contents may
result in the addition of unauthorized cron jobs or deny service to authorized cron
+
jobs.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31383r1_fix">Remove the extended ACL from the
directory. # setfacl --remove-all <crontab directory></fixtext>
+ <fix id="F-31383r1_fix" />
+ <check system="C-36138r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the crontab directories. Procedure:
# ls -ld /var/spool/cron # ls -ld /etc/cron.d /etc/crontab /etc/cron.daily
/etc/cron.hourly /etc/cron.monthly /etc/cron.weekly or # ls -ld /etc/cron*|grep -v deny If
the
+ permissions include a '+' the directory has an extended ACL. If the file
has an extended ACL and it has not been documented with the IAO, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22388">
+ <title>GEN003190</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37477r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003190</version>
+ <title>The cron log files must not have extended ACLs.</title>
+ <description><VulnDiscussion>Cron logs contain reports of
scheduled system activities and must be protected from unauthorized access or
+
manipulation.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECLP-1,
ECTP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31390r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /var/log/cron</fixtext>
+ <fix id="F-31390r1_fix" />
+ <check system="C-36144r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the file. Procedure: Check the
configured cron log file found in the cron entry in /etc/syslog (normally /var/log/cron).
# grep cron /etc/syslog.conf # ls -lL /var/log/cron If the permissions include a
'+',
+ the file has an extended ACL. If the file has an extended ACL and it has not been
documented with the IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22389">
+ <title>GEN003210</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37486r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003210</version>
+ <title>The cron.deny file must not have an extended ACL.</title>
+ <description><VulnDiscussion>If there are excessive file
permissions for the cron.deny file, sensitive information could be viewed or edited by
unauthorized
+
users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31394r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/cron.deny</fixtext>
+ <fix id="F-31394r1_fix" />
+ <check system="C-36145r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the file. # ls -lL /etc/cron.deny
If the permissions include a '+', the file has an extended ACL. If the file has an
extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22390">
+ <title>GEN003245</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37495r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003245</version>
+ <title>The at.allow file must not have an extended ACL.</title>
+ <description><VulnDiscussion>File system extended ACLs provide
access to files beyond what is allowed by the mode numbers of the files. Unauthorized
modification of the at.allow file could result in Denial of Service to authorized
"at" users
+ and the granting of the ability to run "at" jobs to unauthorized
+
users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31402r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/at.allow</fixtext>
+ <fix id="F-31402r1_fix" />
+ <check system="C-36151r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the file. # ls -lL /etc/at.allow If
the permissions include a '+', the file has an extended ACL. If the file has an
extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22391">
+ <title>GEN003250</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37499r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003250</version>
+ <title>The cron.allow file must be group-owned by root, bin, sys, or
cron.</title>
+ <description><VulnDiscussion>If the group of the cron.allow is
not set to root, bin, sys, or cron, the possibility exists for an unauthorized user to
view or edit the list of users permitted to use cron. Unauthorized modification of this
file
+ could cause Denial of Service to authorized cron users or provide unauthorized
users with the ability to run cron
+
jobs.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31406r1_fix">Change the group ownership of the
file. Procedure: # chgrp root /etc/cron.allow</fixtext>
+ <fix id="F-31406r1_fix" />
+ <check system="C-36155r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the file. Procedure: # ls -lL
/etc/cron.allow If the file exists and is not group-owned by root, bin, sys or cron, this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22392">
+ <title>GEN003252</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26555r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003252</version>
+ <title>The at.deny file must have mode 0600 or less
permissive.</title>
+ <description><VulnDiscussion>The "at" daemon control
files restrict access to scheduled job manipulation and must be protected. Unauthorized
modification of the at.deny file could result in Denial of Service to authorized
"at" users or
+ provide unauthorized users with the ability to run "at"
+
jobs.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-23799r1_fix">Change the mode of the file. #
chmod 0600 /etc/at.deny</fixtext>
+ <fix id="F-23799r1_fix" />
+ <check system="C-27598r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the file. # ls -lL /etc/at.deny If
the file has a mode more permissive than 0600, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22393">
+ <title>GEN003255</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26558r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003255</version>
+ <title>The at.deny file must not have an extended ACL.</title>
+ <description><VulnDiscussion>The "at" daemon control
files restrict access to scheduled job manipulation and must be protected. Unauthorized
modification of the at.deny file could result in Denial of Service to authorized
"at" users or
+ provide unauthorized users with the ability to run "at"
+
jobs.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31412r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/at.deny</fixtext>
+ <fix id="F-31412r1_fix" />
+ <check system="C-36161r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the file. # ls -lL /etc/at.deny If
the permissions include a '+', the file has an extended ACL. If the file has an
extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22394">
+ <title>GEN003270</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26562r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003270</version>
+ <title>The cron.deny file must be group-owned by root, bin, sys, or
cron.</title>
+ <description><VulnDiscussion>Cron daemon control files restrict
the scheduling of automated tasks and must be protected. Unauthorized modification of the
cron.deny file could result in Denial of Service to authorized cron users or could
+ provide unauthorized users with the ability to run cron
+
jobs.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31415r1_fix">Change the group ownership of the
file. # chgrp root /etc/cron.deny</fixtext>
+ <fix id="F-31415r1_fix" />
+ <check system="C-36164r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the file. Procedure: # ls -lL
/etc/cron.deny If the file is not group-owned by root, bin, sys, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22395">
+ <title>GEN003410</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37523r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003410</version>
+ <title>The "at" directory must not have an extended
ACL.</title>
+ <description><VulnDiscussion>If the "at" directory
has an extended ACL, unauthorized users could be allowed to view or to edit files
containing sensitive information within the "at" directory. Unauthorized
modifications could result in Denial
+ of Service to authorized "at"
+
jobs.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31438r1_fix">Remove the extended ACL from the
directory. # setfacl --remove-all /var/spool/at</fixtext>
+ <fix id="F-31438r1_fix" />
+ <check system="C-36184r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the directory. # ls -lLd
/var/spool/at If the permissions include a '+', the file has an extended ACL. If
the file has an extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22396">
+ <title>GEN003430</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37529r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003430</version>
+ <title>The "at" directory must be group-owned by root, bin, sys, or
cron.</title>
+ <description><VulnDiscussion>If the group of the "at"
directory is not root, bin, sys, or cron, unauthorized users could be allowed to view or
edit files containing sensitive information within the
+
directory.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31443r1_fix">Change the group ownership of the
file to root, bin, sys, daemon or cron. Procedure: # chgrp <root or other system
group> <"at" directory></fixtext>
+ <fix id="F-31443r1_fix" />
+ <check system="C-36188r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the file. Procedure: # ls -lL
/var/spool/at If the file is not group-owned by root, bin, sys, daemon or cron, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22397">
+ <title>GEN003470</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26569r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003470</version>
+ <title>The at.allow file must be group-owned by root, bin, sys, or
cron.</title>
+ <description><VulnDiscussion>If the group owner of the at.allow
file is not set to root, bin, sys, or cron, unauthorized users could be allowed to view or
edit the list of users permitted to run "at" jobs. Unauthorized modification
could
+ result in Denial of Service to authorized "at" users or provide
unauthorized users with the ability to run "at"
+
jobs.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31450r1_fix">Change the group ownership of the
file. Procedure: # chgrp root /etc/at.allow</fixtext>
+ <fix id="F-31450r1_fix" />
+ <check system="C-36193r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the file. Procedure: # ls -lL
/etc/at.allow If the file is not group-owned by root, bin, sys, or cron, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22398">
+ <title>GEN003490</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26572r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003490</version>
+ <title>The at.deny file must be group-owned by root, bin, sys, or
cron.</title>
+ <description><VulnDiscussion>If the group owner of the at.deny
file is not set to root, bin, sys, or cron, unauthorized users could be allowed to view or
edit sensitive information contained within the file. Unauthorized modification could
+ result in Denial of Service to authorized "at" users or provide
unauthorized users with the ability to run "at"
+
jobs.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31455r1_fix">Change the group ownership of the
at.deny file to root, sys, bin, or cron. Procedure: # chgrp root
/etc/at.deny</fixtext>
+ <fix id="F-31455r1_fix" />
+ <check system="C-36197r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the file. Procedure: # ls -lL
/etc/at.deny If the file is not group-owned by root, bin, sys, or cron, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22404">
+ <title>GEN003510</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26604r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003510</version>
+ <title>Kernel core dumps must be disabled unless needed.</title>
+ <description><VulnDiscussion>Kernel core dumps may contain the
full contents of system memory at the time of the crash. Kernel core dumps may consume a
considerable amount of disk space and may result in Denial of Service by exhausting the
+ available space on the target file system. The kernel core dump process may
increase the amount of time a system is unavailable due to a crash. Kernel core dumps can
be useful for kernel
+
debugging.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-23849r1_fix">Disable kdump. # service kdump stop
# chkconfig kdump off</fixtext>
+ <fix id="F-23849r1_fix" />
+ <check system="C-27645r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the kdump service is not running. Procedure: #
service kdump status If "Kdump is operational" is returned, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22405">
+ <title>GEN003521</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26608r1_rule" severity="low"
weight="10.0">
+ <version>GEN003521</version>
+ <title>The kernel core dump data directory must be group-owned by root, bin,
sys, or system.</title>
+ <description><VulnDiscussion>Kernel core dumps may contain the
full contents of system memory at the time of the crash. As the system memory may contain
sensitive information, it must be protected accordingly. If the kernel core dump data
+ directory is not group-owned by a system group, the core dumps contained in the
directory may be subject to unauthorized
+
access.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31609r1_fix">Change the group-owner of the
kernel core dump data directory. # chgrp root <kernel core dump data
directory></fixtext>
+ <fix id="F-31609r1_fix" />
+ <check system="C-27647r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine the kernel core dump data directory and check its
ownership. Procedure: Examine /etc/kdump.conf. The "path" parameter, which
defaults to /var/crash, determines the path relative to the crash dump device. The crash
device
+ is specified with a filesystem type and device, such as "ext3
/dev/sda2". Using this information, determine where this path is currently mounted on
the system. # ls -ld <kernel dump data directory> If the directory is not
group-owned by
+ root, bin, sys, or system, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22406">
+ <title>GEN003522</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26612r1_rule" severity="low"
weight="10.0">
+ <version>GEN003522</version>
+ <title>The kernel core dump data directory must have mode 0700 or less
permissive.</title>
+ <description><VulnDiscussion>Kernel core dumps may contain the
full contents of system memory at the time of the crash. As the system memory may contain
sensitive information, it must be protected accordingly. If the mode of the kernel core
+ dump data directory is more permissive than 0700, unauthorized users may be able to
view or to modify kernel core dump data
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31610r1_fix">Change the group-owner of the
kernel core dump data directory. # chmod 0700 <kernel core dump data
directory></fixtext>
+ <fix id="F-31610r1_fix" />
+ <check system="C-27651r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine the kernel core dump data directory and check its
permissions. Procedure: Examine /etc/kdump.conf. The "path" parameter, which
defaults to /var/crash, determines the path relative to the crash dump device. The crash
+ device is specified with a filesystem type and device, such as "ext3
/dev/sda2". Using this information, determine where this path is currently mounted on
the system. # ls -l <kernel dump directory> If the directory has a mode
more
+ permissive than 0700, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22407">
+ <title>GEN003523</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26616r1_rule" severity="low"
weight="10.0">
+ <version>GEN003523</version>
+ <title>The kernel core dump data directory must not have an extended
ACL.</title>
+ <description><VulnDiscussion>Kernel core dumps may contain the
full contents of system memory at the time of the crash. As the system memory may contain
sensitive information, it must be protected accordingly. If there is an extended ACL for
+ the kernel core dump data directory, unauthorized users may be able to view or to
modify kernel core dump data
+
files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-23859r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all <core file directory></fixtext>
+ <fix id="F-23859r1_fix" />
+ <check system="C-36352r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine the kernel core dump data directory and check its
permissions. Procedure: Examine /etc/kdump.conf. The "path" parameter, which
defaults to /var/crash, determines the path relative to the crash dump device. The crash
+ device is specified with a filesystem type and device, such as "ext3
/dev/sda2". Using this information, determine where this path is currently mounted on
the system. # ls -l <kernel dump directory> If the permissions include a
'+', the
+ file has an extended ACL. If the file has an extended ACL and it has not been
documented with the IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22408">
+ <title>GEN003581</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26620r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003581</version>
+ <title>Network interfaces must not be configured to allow user
control.</title>
+ <description><VulnDiscussion>Configuration of network
interfaces should be limited to privileged users. Manipulation of network interfaces may
result in a Denial of Service or bypass of network security
+
mechanisms.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-23863r1_fix">Edit the configuration for the
user-controlled interface and remove the "USERCTL=yes" configuration line or set
to "USERCTL=no".</fixtext>
+ <fix id="F-23863r1_fix" />
+ <check system="C-27658r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system for user-controlled network interfaces. #
grep -l '^USERCTL=yes' /etc/sysconfig/network-scripts/ifcfg* If any results are
returned, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22409">
+ <title>GEN003602</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37601r1_rule" severity="low"
weight="10.0">
+ <version>GEN003602</version>
+ <title>The system must not process Internet Control Message Protocol (ICMP)
timestamp requests.</title>
+ <description><VulnDiscussion>The processing of (ICMP) timestamp
requests increases the attack surface of the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31637r1_fix">Configure the system to not respond
to ICMP TIMESTAMP_REQUESTs. This is done by rejecting ICMP type 13 and 14 messages at the
firewall. Procedure: Edit /etc/sysconfig/iptables to add: -A RH-Firewall-1-INPUT -p ICMP
+ --icmp-type timestamp-request -j DROP -A RH-Firewall-1-INPUT -p ICMP --icmp-type
timestamp-reply -j DROP Restart the firewall: # service iptables restart</fixtext>
+ <fix id="F-31637r1_fix" />
+ <check system="C-36721r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the system does not respond to ICMP
TIMESTAMP_REQUESTs Procedure: # grep "timestamp" /etc/sysconfig/iptables This
should return entries for "timestamp-reply" and "timestamp_request".
Both should end with "-j DROP'. If either
+ does not exist or does not "DROP" the message, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22410">
+ <title>GEN003603</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37608r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003603</version>
+ <title>The system must not respond to Internet Control Message Protocol v4
(ICMPv4) echoes sent to a broadcast address.</title>
+ <description><VulnDiscussion>Responding to broadcast (ICMP)
echoes facilitates network mapping and provides a vector for amplification
+
attacks.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31641r1_fix">Configure the system to not respond
to ICMP ECHO_REQUESTs sent to broadcast addresses. Edit /etc/sysctl.conf and add a setting
for "net.ipv4.icmp_echo_ignore_broadcasts=1" and reload the sysctls. Procedure:
# echo
+ "net.ipv4.icmp_echo_ignore_broadcasts=1" >>
/etc/sysctl.conf # sysctl -p</fixtext>
+ <fix id="F-31641r1_fix" />
+ <check system="C-36776r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the system does not respond to ICMP ECHO_REQUESTs set
to broadcast addresses. Procedure: # cat /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts If
the result is not 1, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22411">
+ <title>GEN003604</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-29288r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003604</version>
+ <title>The system must not respond to Internet Control Message Protocol
(ICMP) timestamp requests sent to a broadcast address.</title>
+ <description><VulnDiscussion>The processing of (ICMP) timestamp
requests increases the attack surface of the system. Responding to broadcast ICMP
timestamp requests facilitates network mapping and provides a vector for amplification
+
attacks.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations>GEN000000-FW</Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl>The
+ system's firewall default-deny policy mitigates the risk from this
vulnerability.</MitigationControl><Responsibility>System
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31645r1_fix">Configure the system to not respond
to ICMP TIMESTAMP_REQUESTs sent to broadcast addresses. Edit /etc/sysctl.conf and add a
setting for "net.ipv4.icmp_echo_ignore_broadcasts=1" and reload the sysctls.
Procedure: #
+ echo "net.ipv4.icmp_echo_ignore_broadcasts=1" >>
/etc/sysctl.conf # sysctl -p</fixtext>
+ <fix id="F-31645r1_fix" />
+ <check system="C-36792r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the system does not respond to ICMP
TIMESTAMP_REQUESTs set to broadcast addresses. Procedure: # cat
/proc/sys/net/ipv4/icmp_echo_ignore_broadcasts If the result is not 1, this is a finding.
Note: The same parameter controls
+ both ICMP ECHO_REQUESTs and TIMESTAMP_REQUESTs.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22414">
+ <title>GEN003607</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37622r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003607</version>
+ <title>The system must not accept source-routed IPv4 packets.</title>
+ <description><VulnDiscussion>Source-routed packets allow the
source of the packet to suggest routers forward the packet along a different path than
configured on the router, which can be used to bypass network security measures. This
+ requirement applies only to the handling of source-routed traffic destined to the
system itself, not to traffic forwarded by the system to another system, such as when IPv4
forwarding is enabled and the system is functioning as a
+
router.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31659r1_fix">Configure the system to not accept
source-routed IPv4 packets. Edit /etc/sysctl.conf and add a setting for
"net.ipv4.conf.all.accept_source_route=0" and
"net.ipv4.conf.default.accept_source_route=0". Reload the
+ sysctls. Procedure: # sysctl -p</fixtext>
+ <fix id="F-31659r1_fix" />
+ <check system="C-36821r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the system does not accept source-routed IPv4
packets. Procedure: # grep [01] /proc/sys/net/ipv4/conf/*/accept_source_route|egrep
"default|all" If all of the resulting lines do not end with "0", this
is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22415">
+ <title>GEN003608</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37624r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003608</version>
+ <title>Proxy Address Resolution Protocol (Proxy ARP) must not be enabled on
the system.</title>
+ <description><VulnDiscussion>Proxy ARP allows a system to
respond to ARP requests on one interface on behalf of hosts connected to another
interface. If this function is enabled when not required, addressing information may be
leaked between
+ the attached network
+
segments.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31661r1_fix">Configure the system to not use
proxy ARP. Edit /etc/sysctl.conf and add a setting for
"net.ipv4.conf.all.proxy_arp=0" and
"net.ipv4.conf.default.proxy_arp=0". # sysctl -p</fixtext>
+ <fix id="F-31661r1_fix" />
+ <check system="C-36823r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the system does not use proxy ARP. # grep [01]
/proc/sys/net/ipv4/conf/*/proxy_arp|egrep "default|all" If all of the resulting
lines do not end with "0", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22416">
+ <title>GEN003609</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37626r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003609</version>
+ <title>The system must ignore IPv4 Internet Control Message Protocol (ICMP)
redirect messages.</title>
+ <description><VulnDiscussion>ICMP redirect messages are used by
routers to inform hosts that a more direct route exists for a particular destination.
These messages modify the host's route table and are unauthenticated. An illicit ICMP
+ redirect message could result in a man-in-the-middle
+
attack.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001503</ident>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31663r1_fix">Configure the system to not accept
IPv4 ICMP redirect messages. Edit /etc/sysctl.conf and add a setting for
"net.ipv4.conf.all.accept_redirects=0" and
"net.ipv4.conf.default.accept_redirects=0". # sysctl -p</fixtext>
+ <fix id="F-31663r1_fix" />
+ <check system="C-36825r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the system does not accept IPv4 ICMP redirect
messages. # grep [01] /proc/sys/net/ipv4/conf/*/accept_redirects|egrep
"default|all" If all of the resulting lines do not end with "0", this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22417">
+ <title>GEN003610</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37629r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003610</version>
+ <title>The system must not send IPv4 Internet Control Message Protocol (ICMP)
redirects.</title>
+ <description><VulnDiscussion>ICMP redirect messages are used by
routers to inform hosts that a more direct route exists for a particular destination.
These messages contain information from the system's route table possibly revealing
portions
+ of the network
+
topology.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31666r1_fix">Configure the system to not send
IPv4 ICMP redirect messages. Edit /etc/sysctl.conf and add a setting for
"net.ipv4.conf.all.send_redirects=0" and
"net.ipv4.conf.default.send_redirects=0". # sysctl -p</fixtext>
+ <fix id="F-31666r1_fix" />
+ <check system="C-36828r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the system does not send IPv4 ICMP redirect messages.
# grep [01] /proc/sys/net/ipv4/conf/*/send_redirects|egrep "default|all" If all
of the resulting lines do not end with "0", this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22418">
+ <title>GEN003611</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37630r1_rule" severity="low"
weight="10.0">
+ <version>GEN003611</version>
+ <title>The system must log martian packets.</title>
+ <description><VulnDiscussion>Martian packets are packets
containing addresses known by the system to be invalid. Logging these messages allows the
SA to identify misconfigurations or attacks in
+
progress.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECAT-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-31667r1_fix">Configure the system to log martian
packets. Edit /etc/sysctl.conf and add a setting for
"net.ipv4.conf.all.log_martians=1" and
"net.ipv4.conf.default.log_martians=1". Reload the sysctls. Procedure: # sysctl
+ -p</fixtext>
+ <fix id="F-31667r1_fix" />
+ <check system="C-36830r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the system logs martian packets. # grep [01]
/proc/sys/net/ipv4/conf/*/log_martians|egrep "default|all" If all of the
resulting lines do not end with "1", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22419">
+ <title>GEN003612</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37633r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003612</version>
+ <title>The system must be configured to use TCP syncookies when experiencing
a TCP SYN flood.</title>
+ <description><VulnDiscussion>A TCP SYN flood attack can cause
Denial of Service by filling a system's TCP connection table with connections in the
SYN_RCVD state. Syncookies are a mechanism used to only track a connection when a
subsequent
+ ACK is received, verifying the initiator is attempting a valid connection and is
not a flood source. This technique does not operate in a fully standards-compliant manner,
but is only activated when a flood condition is detected, and allows defense
+ of the system while continuing to service valid
+
requests.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001092</ident>
+ <fixtext fixref="F-31670r1_fix">Configure the system to use TCP
syncookies when experiencing a TCP SYN flood. Edit /etc/sysctl.conf and add a setting for
"net.ipv4.tcp_syncookies=1". # sysctl -p</fixtext>
+ <fix id="F-31670r1_fix" />
+ <check system="C-36832r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the system configured to use TCP syncookies when
experiencing a TCP SYN flood. # cat /proc/sys/net/ipv4/tcp_syncookies If the result is not
"1", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22421">
+ <title>GEN003619</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37639r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003619</version>
+ <title>The system must not be configured for network bridging.</title>
+ <description><VulnDiscussion>Some systems have the ability to
bridge or switch frames (link-layer forwarding) between multiple interfaces. This can be
useful in a variety of situations but, if enabled when not needed, has the potential to
+ bypass network partitioning and
+
security.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31674r1_fix">Configure the system to not use
bridging. # rmmod bridge Edit /etc/modprobe.conf and add a line such as "install
bridge /bin/false" to prevent the loading of the bridge module.</fixtext>
+ <fix id="F-31674r1_fix" />
+ <check system="C-36836r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the system is not configured for bridging. # ls
/proc/sys/net/bridge If the directory exists, this is a finding. # lsmod | grep
'^bridge ' If any results are returned, this is a finding. Fix Text: Configure the
system to not
+ use bridging.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22422">
+ <title>GEN003650</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37401r1_rule" severity="low"
weight="10.0">
+ <version>GEN003650</version>
+ <title>All local file systems must employ journaling or another mechanism
ensuring file system consistency.</title>
+ <description><VulnDiscussion>File system journaling, or
logging, can allow reconstruction of file system data after a system crash preserving the
integrity of data that may have otherwise been lost. Journaling file systems typically do
not
+ require consistency checks upon booting after a crash, which can improve system
availability. Some file systems employ other mechanisms to ensure consistency also
satisfying this
+
requirement.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000553</ident>
+ <fixtext fixref="F-31331r1_fix">Convert local file systems to use
journaling or another mechanism ensuring file system consistency.</fixtext>
+ <fix id="F-31331r1_fix" />
+ <check system="C-36084r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify local filesystems use journaling. # mount | grep
'^/dev/' | egrep -v 'type (ext3|ext4|jfs|reiserfs|xfs|iso9660|udf)' If a
mount is listed, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22423">
+ <title>GEN003730</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37407r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003730</version>
+ <title>The inetd.conf file, xinetd.conf file, and the xinetd.d directory must
be group-owned by root, bin, sys, or system.</title>
+ <description><VulnDiscussion>Failure to give ownership of
sensitive files or utilities to system groups may provide unauthorized users with the
potential to access sensitive information or change the system configuration possibly
weakening
+ the system's security
+
posture.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31337r1_fix">Change the group-owner of the
xinetd configuration files and directories. Procedure: # chgrp -R root /etc/xinetd.conf
/etc/xinetd.d</fixtext>
+ <fix id="F-31337r1_fix" />
+ <check system="C-36090r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the xinetd configuration files
and directories. Procedure: # ls -alL /etc/xinetd.conf /etc/xinetd.d If a file or
directory is not group-owned by root, bin, sys, or system, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22424">
+ <title>GEN003745</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37409r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003745</version>
+ <title>The inetd.conf and xinetd.conf files must not have extended
ACLs.</title>
+ <description><VulnDiscussion>The Internet service daemon
configuration files must be protected as malicious modification could cause Denial of
Service or increase the attack surface of the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31339r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/xinetd.conf</fixtext>
+ <fix id="F-31339r1_fix" />
+ <check system="C-36092r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the xinetd configuration files.
Procedure: # ls -alL /etc/xinetd.conf If the permissions include a '+', the file
has an extended ACL. If the file has an extended ACL and it has not been documented with
the
+ IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22425">
+ <title>GEN003750</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37410r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003750</version>
+ <title>The xinetd.d directory must have mode 0755 or less
permissive.</title>
+ <description><VulnDiscussion>The Internet service daemon
configuration files must be protected as malicious modification could cause Denial of
Service or increase the attack surface of the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31340r1_fix">Change the mode of the directory. #
chmod 0755 /etc/xinetd.d</fixtext>
+ <fix id="F-31340r1_fix" />
+ <check system="C-36093r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the xinetd configuration
directories. # ls -dlL /etc/xinetd.d If the mode of the directory is more permissive than
0755, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22426">
+ <title>GEN003755</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37411r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003755</version>
+ <title>The xinetd.d directory must not have an extended ACL.</title>
+ <description><VulnDiscussion>The Internet service daemon
configuration files must be protected as malicious modification could cause Denial of
Service or increase the attack surface of the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31341r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/xinetd.d</fixtext>
+ <fix id="F-31341r1_fix" />
+ <check system="C-36094r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the xinetd configuration files and
directories. # ls -alL /etc/xinetd.conf /etc/xinetd.d If the permissions include a
'+', the file has an extended ACL. If the file has an extended ACL and it has not
been
+ documented with the IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22427">
+ <title>GEN003770</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37425r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003770</version>
+ <title>The services file must be group-owned by root, bin, sys, or
system.</title>
+ <description><VulnDiscussion>Failure to give ownership of
system configuration files to root or a system group provides the designated owner and
unauthorized users with the potential to change the system configuration possibly
weakening the
+ system's security
+
posture.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31352r1_fix">Change the group-owner of the
services file. Procedure: # chgrp root /etc/services</fixtext>
+ <fix id="F-31352r1_fix" />
+ <check system="C-36106r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the services file. Procedure: #
ls -lL /etc/services If the file is not group-owned by root, bin, sys, or system, this is
a finding</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22428">
+ <title>GEN003790</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37438r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003790</version>
+ <title>The services file must not have an extended ACL.</title>
+ <description><VulnDiscussion>The services file is critical to
the proper operation of network services and must be protected from unauthorized
modification. If the services file has an extended ACL, it may be possible for
unauthorized users
+ to modify the file. Unauthorized modification could result in the failure of
network
+
services.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31356r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/services</fixtext>
+ <fix id="F-31356r1_fix" />
+ <check system="C-36109r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the /etc/services file. # ls -lL
/etc/services If the permissions include a '+', the file has an extended ACL. If
the file has an extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22429">
+ <title>GEN003810</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26662r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003810</version>
+ <title>The portmap or rpcbind service must not be running unless
needed.</title>
+ <description><VulnDiscussion>The portmap and rpcbind services
increase the attack surface of the system and should only be used when needed. The portmap
or rpcbind services are used by a variety of services using Remote Procedure Calls
+
(RPCs).</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001436</ident>
+ <fixtext fixref="F-23904r1_fix">Shutdown and disable the portmap
service. # service portmap stop; chkconfig portmap off</fixtext>
+ <fix id="F-23904r1_fix" />
+ <check system="C-27694r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the status of the portmap service. # service portmap
status If the service is running, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22430">
+ <title>GEN003815</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26666r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003815</version>
+ <title>The portmap or rpcbind service must not be installed unless
needed.</title>
+ <description><VulnDiscussion>The portmap and rpcbind services
increase the attack surface of the system and should only be used when needed. The portmap
or rpcbind services are used by a variety of services using Remote Procedure Calls
+
(RPCs).</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000305</ident>
+ <fixtext fixref="F-23908r1_fix">Remove the portmap package. # rpm
-e portmap or # yum remove portmap</fixtext>
+ <fix id="F-23908r1_fix" />
+ <check system="C-27698r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check if the portmap package is installed. # rpm -qa | grep
portmap If a package is found, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22431">
+ <title>GEN003825</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26667r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003825</version>
+ <title>The rshd service must not be installed.</title>
+ <description><VulnDiscussion>The rshd process provides a
typically unencrypted, host-authenticated remote access service. SSH should be used in
place of this
+
service.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCPP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000305</ident>
+ <fixtext fixref="F-23909r1_fix">Remove the rsh-server package.
Procedure: # rpm -e rsh-server</fixtext>
+ <fix id="F-23909r1_fix" />
+ <check system="C-27699r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check if the rsh-server package is installed. Procedure: #
rpm -qa | grep rsh-server If a package is found, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22432">
+ <title>GEN003830</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26671r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003830</version>
+ <title>The rlogind service must not be running.</title>
+ <description><VulnDiscussion>The rlogind process provides a
typically unencrypted, host-authenticated remote access service. SSH should be used in
place of this
+
service.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCPP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000068</ident>
+ <fixtext fixref="F-23912r1_fix">Remove or disable the rlogin
configuration and restart xinetd. # rm /etc/xinetd.d/rlogin ; service xinetd
restart</fixtext>
+ <fix id="F-23912r1_fix" />
+ <check system="C-27701r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the rlogind configuration. # cat /etc/xinetd.d/rlogin
If the file exists and does not contain "disable = yes" this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22433">
+ <title>GEN003835</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26669r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003835</version>
+ <title>The rlogind service must not be installed.</title>
+ <description><VulnDiscussion>The rlogind process provides a
typically unencrypted, host-authenticated remote access service. SSH should be used in
place of this
+
service.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCPP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000305</ident>
+ <fixtext fixref="F-23909r1_fix">Remove the rsh-server package.
Procedure: # rpm -e rsh-server</fixtext>
+ <fix id="F-23909r1_fix" />
+ <check system="C-27699r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check if the rsh-server package is installed. Procedure: #
rpm -qa | grep rsh-server If a package is found, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22434">
+ <title>GEN003845</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26673r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003845</version>
+ <title>The rexecd service must not be installed.</title>
+ <description><VulnDiscussion>The rexecd process provides a
typically unencrypted, host-authenticated remote access service. SSH should be used in
place of this
+
service.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000305</ident>
+ <fixtext fixref="F-23909r1_fix">Remove the rsh-server package.
Procedure: # rpm -e rsh-server</fixtext>
+ <fix id="F-23909r1_fix" />
+ <check system="C-27699r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check if the rsh-server package is installed. Procedure: #
rpm -qa | grep rsh-server If a package is found, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22435">
+ <title>GEN003930</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37449r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003930</version>
+ <title>The hosts.lpd (or equivalent) file must be group-owned by root, bin,
sys, or system.</title>
+ <description><VulnDiscussion>Failure to give group-ownership of
the hosts.lpd file to root, bin, sys, or system provides the members of the owning group
and possible unauthorized users, with the potential to modify the hosts.lpd file.
+ Unauthorized modifications could disrupt access to local printers from authorized
remote hosts or permit unauthorized remote access to local
+
printers.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31367r1_fix">Change the group-owner of the
printers.conf file. Procedure: # chgrp lp /etc/cups/printers.conf</fixtext>
+ <fix id="F-31367r1_fix" />
+ <check system="C-36121r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the /etc/cups/printers.conf
file. Procedure: # ls -lL /etc/cups/printers.conf If the file is not group-owned by lp,
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22436">
+ <title>GEN003950</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37462r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003950</version>
+ <title>The hosts.lpd (or equivalent) file must not have an extended
ACL.</title>
+ <description><VulnDiscussion>Excessive permissions on the
hosts.lpd (or equivalent) file may permit unauthorized modification. Unauthorized
modifications could disrupt access to local printers from authorized remote hosts or
permit
+ unauthorized remote access to local
+
printers.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31372r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/cups/printers.conf</fixtext>
+ <fix id="F-31372r1_fix" />
+ <check system="C-36128r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the /etc/cups/printers.conf file. #
ls -lL /etc/cups/printers.conf If the permissions include a '+', the file has an
extended ACL. If the file has an extended ACL and it has not been documented with the
+ IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22437">
+ <title>GEN004010</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37468r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004010</version>
+ <title>The traceroute file must not have an extended ACL.</title>
+ <description><VulnDiscussion>If an extended ACL exists on the
traceroute executable file, it may provide unauthorized users with access to the file.
Malicious code could be inserted by an attacker and triggered whenever the traceroute
command
+ is executed by authorized users. Additionally, if an unauthorized user is granted
executable permissions to the traceroute command, it could be used to gain information
about the network topology behind the firewall. This information may allow an
+ attacker to determine trusted routers and other network information potentially
leading to system and network
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31379r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /bin/traceroute</fixtext>
+ <fix id="F-31379r1_fix" />
+ <check system="C-36134r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the /bin/traceroute file. # ls -lL
/bin/traceroute If the permissions include a '+', the file has an extended ACL. If
the file has an extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22438">
+ <title>GEN004370</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37473r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004370</version>
+ <title>The aliases file must be group-owned by root, sys, bin, or
system.</title>
+ <description><VulnDiscussion>If the alias file is not
group-owned by root or a system group, an unauthorized user may modify the file adding
aliases to run malicious code or redirect
+
e-mail.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31385r1_fix">Change the group-owner of the
/etc/aliases file. Procedure: for sendmail: # chgrp root /etc/aliases # chgrp smmsp
/etc/aliases.db The aliases.db file must be owned by the same system group as sendmail,
which is smmsp
+ by default. for postfix # chgrp root /etc/postfix/aliases # chgrp root
/etc/postfix/aliases.db</fixtext>
+ <fix id="F-31385r1_fix" />
+ <check system="C-36139r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the alias files. Procedure: for
sendmail: # ls -lL /etc/aliases If the files are not group-owned by root, this is a
finding. # ls -lL /etc/aliases.db If the file is not group-owned by the same system
+ group as sendmail, which is smmsp by default, this is a finding. for postfix:
Verify the location of the alias file. # postconf alias maps This will return the location
of the "aliases" file, by default "/etc/postfix/aliases" # ls -lL
<postfix
+ aliases file> If the files are not group-owned by root, this is a finding.
# ls -lL <postfix aliases.db file> If the file is not group-owned by root,
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22439">
+ <title>GEN004390</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37488r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004390</version>
+ <title>The alias file must not have an extended ACL.</title>
+ <description><VulnDiscussion>Excessive permissions on the
aliases file may permit unauthorized modification. If the alias file is modified by an
unauthorized user, they may modify the file to run malicious code or redirect
+
e-mail.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31396r1_fix">Remove the extended permissions
from the alias files. Procedure: for sendmail: # setfacl --remove-all /etc/aliases
/etc/aliases.db for postfix (assuming the default postfix directory): # setfacl
--remove-all
+ /etc/postfix/aliases /etc/postfix/aliases.db</fixtext>
+ <fix id="F-31396r1_fix" />
+ <check system="C-36146r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the alias file. Procedure: for
sendmail: # ls -lL /etc/aliases /etc/aliases.db If the permissions include a '+',
the file has an extended ACL. If the file has an extended ACL and it has not been
documented
+ with the IAO, this is a finding. for postfix: Verify the location of the alias
file. # postconf alias maps This will return the location of the "aliases" file,
by default "/etc/postfix/aliases" # ls -lL <postfix aliases file>
<postfix
+ aliases.db file> If the permissions include a '+', the file has an
extended ACL. If the file has an extended ACL and it has not been documented with the IAO,
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22440">
+ <title>GEN004410</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37493r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004410</version>
+ <title>Files executed through a mail aliases file must be group-owned by
root, bin, sys, or system, and must reside within a directory group-owned by root, bin,
sys, or system.</title>
+ <description><VulnDiscussion>If a file executed through a mail
aliases file is not group-owned by root or a system group, it may be subject to
unauthorized modification. Unauthorized modification of files executed through aliases may
allow
+ unauthorized users to attain root
+
privileges.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31401r1_fix">Change the group ownership of the
file referenced from /etc/aliases. Procedure: # chgrp root <file referenced from
aliases></fixtext>
+ <fix id="F-31401r1_fix" />
+ <check system="C-36150r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Examine the contents of the /etc/aliases file. Procedure: #
more /etc/aliases Examine the aliases file for any utilized directories or paths. # ls -lL
<file referenced from aliases> Check the permissions for any paths
+ referenced. If the group owner of any file is not root, bin, sys, or system, this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22441">
+ <title>GEN004430</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37496r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004430</version>
+ <title>Files executed through a mail aliases file must not have extended
ACLs.</title>
+ <description><VulnDiscussion>Excessive permissions on files
executed through a mail aliases file could result in modification by an unauthorized user,
execution of malicious code, and/or system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31404r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all <file referenced from aliases></fixtext>
+ <fix id="F-31404r1_fix" />
+ <check system="C-36153r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Examine the contents of the /etc/aliases file. Procedure: #
more /etc/aliases Examine the aliases file for any utilized directories or paths. # ls -lL
<file referenced from aliases> Check the permissions for any paths
+ referenced. If the permissions include a '+', the file has an extended
ACL. If the file has an extended ACL and it has not been documented with the IAO, this is
a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22442">
+ <title>GEN004510</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37503r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004510</version>
+ <title>The SMTP service log file must not have an extended
ACL.</title>
+ <description><VulnDiscussion>If the SMTP service log file has
an extended ACL, unauthorized users may be allowed to access or to modify the log
+
file.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31411r1_fix">This fix is applicable to both
Postfix and sendmail servers. Remove the extended ACL from the file. # setfacl
--remove-all <log file></fixtext>
+ <fix id="F-31411r1_fix" />
+ <check system="C-36160r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Examine /etc/syslog.conf and determine the log file(s)
receiving logs for "mail.crit", "mail.debug", mail.*, or
"*.crit". Procedure: This check is applicable to both Postfix or sendmail
servers. Check the permissions on these log
+ files.Identify any log files configured for "*.crit" and the
"mail" service (excluding mail.none) and at any severity level. # egrep
"(\*.crit|mail\.[^n][^/]*)" /etc/syslog.conf|sed 's/^[^/]*//'|xargs ls
-lL If the permissions include a '+', the
+ file has an extended ACL. If the file has an extended ACL and it has not been
documented with the IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22444">
+ <title>GEN004930</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37538r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004930</version>
+ <title>The ftpusers file must be group-owned by root, bin, sys, or
system.</title>
+ <description><VulnDiscussion>If the ftpusers file is not
group-owned by root or a system group, an unauthorized user may modify the file to allow
unauthorized accounts to use
+
FTP.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31454r1_fix">Change the group owner of the
ftpusers file. Procedure: # chgrp root /etc/ftpusers /etc/vsftpd.ftpusers
/etc/vsftpd/ftpusers</fixtext>
+ <fix id="F-31454r1_fix" />
+ <check system="C-36196r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the ftpusers file. Procedure: #
ls -lL /etc/ftpusers /etc/vsftpd.ftpusers /etc/vsftpd/ftpusers If the file is not
group-owned by root, bin, sys, or system, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22445">
+ <title>GEN004950</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37544r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004950</version>
+ <title>The ftpusers file must not have an extended ACL.</title>
+ <description><VulnDiscussion>Excessive permissions on the
ftpusers file could permit unauthorized modification. Unauthorized modification could
result in Denial of Service to authorized FTP users or permit unauthorized users to access
the FTP
+
service.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31459r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/ftpusers /etc/vsftpd.ftpusers
/etc/vsftpd/ftpusers</fixtext>
+ <fix id="F-31459r1_fix" />
+ <check system="C-36200r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the /etc/ftpusers file. # ls -lL
/etc/ftpusers /etc/vsftpd.ftpusers /etc/vsftpd/ftpusers If the permissions include a
'+', the file has an extended ACL. If the file has an extended ACL and it has not
been
+ documented with the IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22446">
+ <title>GEN005190</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37682r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005190</version>
+ <title>The .Xauthority files must not have extended ACLs.</title>
+ <description><VulnDiscussion>.Xauthority files ensure the user
is authorized to access specific X Windows host. Extended ACLs may permit unauthorized
modification of these files, which could lead to Denial of Service to authorized access
or
+ allow unauthorized access to be
+
obtained.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-31834r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all .Xauthority</fixtext>
+ <fix id="F-31834r1_fix" />
+ <check system="C-36869r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the file permissions for the .Xauthority files. These
files will be located in user home directories. Procedure: # ls -la ~username |egrep
"(\.Xauthority|\.xauth)" If the permissions include a '+', the file has
an extended
+ ACL. If the file has an extended ACL and it has not been documented with the IAO,
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22447">
+ <title>GEN005305</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37692r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005305</version>
+ <title>The SNMP service must use only SNMPv3 or its
successors.</title>
+ <description><VulnDiscussion>SNMP Versions 1 and 2 are not
considered secure. Without the strong authentication and privacy provided by the SNMP
Version 3 User-based Security Model (USM), an attacker or other unauthorized users may
gain
+ access to detailed system management information and use the information to launch
attacks against the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCPP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001435</ident>
+ <fixtext fixref="F-31966r1_fix">Edit /etc/snmpd.conf and remove
references to the "v1", "v2c", "community", or
"com2sec". Restart the SNMP service. # service snmpd restart</fixtext>
+ <fix id="F-31966r1_fix" />
+ <check system="C-36889r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the SNMP daemon is not configured to use the v1 or v2c
security models. Procedure: Examine the default install location /etc/snmpd.conf or: #
find / -name snmpd.conf # grep -E '(v1|v2c|community|com2sec)' <snmp.conf
+ file> | grep -v '^#' If any configuration is found, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22448">
+ <title>GEN005306</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37693r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005306</version>
+ <title>The SNMP service must require the use of a FIPS 140-2 approved
cryptographic hash algorithm as part of its authentication and integrity
methods.</title>
+ <description><VulnDiscussion>The SNMP service must use SHA-1 or
a FIPS 140-2 approved successor for authentication and
+
integrity.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCNR-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001453</ident>
+ <fixtext fixref="F-31971r1_fix">Edit /etc/snmp/snmpd.conf and add
the SHA keyword for any create user statement without one. Restart the SNMP service. #
service snmpd restart</fixtext>
+ <fix id="F-31971r1_fix" />
+ <check system="C-36890r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the SNMP daemon uses SHA for SNMPv3 users. Procedure:
Examine the default install location /etc/snmp/snmpd.conf or: # find / -name snmpd.conf #
grep -v '^#' <snmpd.conf file> | grep -i createuser | grep -vi SHA
If any
+ line is present this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22449">
+ <title>GEN005307</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37695r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005307</version>
+ <title>The SNMP service must require the use of a FIPS 140-2 approved
encryption algorithm for protecting the privacy of SNMP messages.</title>
+ <description><VulnDiscussion>The SNMP service must use AES or a
FIPS 140-2 approved successor algorithm for protecting the privacy of
+
communications.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCNR-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000068</ident>
+ <fixtext fixref="F-31986r1_fix">Edit /etc/snmp/snmpd.conf and add
the AES keyword for any create user statement without one. Restart the SNMP service. #
service snmpd restart</fixtext>
+ <fix id="F-31986r1_fix" />
+ <check system="C-36891r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the SNMP daemon uses AES for SNMPv3 users. Procedure:
Examine the default install location /etc/snmp/snmpd.conf or: # find / -name snmpd.conf #
grep -v '^#' <snmpd.conf file> | grep -i createuser | grep -vi AES
If any
+ line is present this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22450">
+ <title>GEN005350</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37700r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005350</version>
+ <title>Management Information Base (MIB) files must not have extended
ACLs.</title>
+ <description><VulnDiscussion>The ability to read the MIB file
could impart special knowledge to an intruder or malicious user about the ability to
extract compromising information about the system or
+
network.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32014r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all <mib file></fixtext>
+ <fix id="F-32014r1_fix" />
+ <check system="C-36895r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the file permissions for the MIB files. # find / -name
*.mib # ls -lL <mib file> If the permissions include a '+', the file
has an extended ACL. If the file has an extended ACL and it has not been documented with
the
+ IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22451">
+ <title>GEN005365</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37704r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005365</version>
+ <title>The snmpd.conf file must be group-owned by root, bin, sys, or
system.</title>
+ <description><VulnDiscussion>The snmpd.conf file contains
authenticators and must be protected from unauthorized access and modification. If the
file is not group-owned by a system group, it may be subject to access and modification
from
+ unauthorized
+
users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32038r1_fix">Change the group ownership of the
SNMP configuration file. Procedure: # chgrp root
<snmpd.conf></fixtext>
+ <fix id="F-32038r1_fix" />
+ <check system="C-36898r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the SNMP configuration file.
Procedure: Examine the default install location /etc/snmp/snmpd.conf or: # find / -name
snmpd.conf # ls -lL <snmpd.conf> If the file is not group-owned by root,
bin,
+ sys, or system, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22452">
+ <title>GEN005375</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37706r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005375</version>
+ <title>The snmpd.conf file must not have an extended ACL.</title>
+ <description><VulnDiscussion>The snmpd.conf file contains
authenticators and must be protected from unauthorized access and
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32047r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all <snmpd.conf file></fixtext>
+ <fix id="F-32047r1_fix" />
+ <check system="C-36900r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the SNMP configuration file.
Procedure: Examine the default install location /etc/snmp/snmpd.conf or: # find / -name
snmpd.conf # ls -lL <snmpd.conf> If the permissions include a '+',
the file has an
+ extended ACL. If the file has an extended ACL and it has not been documented with
the IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22453">
+ <title>GEN005390</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37709r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005390</version>
+ <title>The /etc/syslog.conf file must have mode 0640 or less
permissive.</title>
+ <description><VulnDiscussion>Unauthorized users must not be
allowed to access or modify the /etc/syslog.conf
+
file.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32082r1_fix">Change the permissions of the
syslog configuration file. # chmod 0640 /etc/syslog.conf</fixtext>
+ <fix id="F-32082r1_fix" />
+ <check system="C-36907r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the syslog configuration file. # ls
-lL /etc/syslog.conf If the mode of the file is more permissive than 0640, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22454">
+ <title>GEN005395</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37710r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005395</version>
+ <title>The /etc/syslog.conf file must not have an extended
ACL.</title>
+ <description><VulnDiscussion>Unauthorized users must not be
allowed to access or modify the /etc/syslog.conf
+
file.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32087r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/syslog.conf</fixtext>
+ <fix id="F-32087r1_fix" />
+ <check system="C-36909r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the syslog configuration file. # ls
-lL /etc/syslog.conf If the permissions include a '+', the file has an extended
ACL. If the file has an extended ACL and it has not been documented with the IAO, this is
+ a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22455">
+ <title>GEN005450</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37811r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005450</version>
+ <title>The system must use a remote syslog server (loghost).</title>
+ <description><VulnDiscussion>A syslog server (loghost) receives
syslog messages from one or more systems. This data can be used as an authoritative log
source in the event a system is compromised and its local logs are
+
suspect.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECAT-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000136</ident>
+ <fixtext fixref="F-32277r1_fix">Edit the syslog configuration file
and add an appropriate remote syslog server.</fixtext>
+ <fix id="F-32277r1_fix" />
+ <check system="C-37012r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the syslog configuration file for remote syslog
servers. # grep '@' /etc/syslog.conf | grep -v '^#' If no line is
returned, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22456">
+ <title>GEN005501</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37820r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005501</version>
+ <title>The SSH client must be configured to only use the SSHv2
protocol.</title>
+ <description><VulnDiscussion>SSHv1 is not a DoD-approved
protocol and has many well-known vulnerability exploits. Exploits of the SSH client could
provide access to the system with the privileges of the user running the
+
client.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCPP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001436</ident>
+ <fixtext fixref="F-32289r1_fix">Edit the /etc/ssh/ssh_config file
and add or edit a "Protocol" configuration line not allowing versions less than
2.</fixtext>
+ <fix id="F-32289r1_fix" />
+ <check system="C-37022r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the SSH client configuration for allowed protocol
versions. # grep -i protocol /etc/ssh/ssh_config | grep -v '^#' If the returned
protocol configuration allows versions less than 2, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22457">
+ <title>GEN005504</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37823r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005504</version>
+ <title>The SSH daemon must only listen on management network addresses unless
authorized for uses other than management.</title>
+ <description><VulnDiscussion>The SSH daemon should only listen
on network addresses designated for management traffic. If the system has multiple network
interfaces and SSH listens on addresses not designated for management traffic, the SSH
+ service could be subject to unauthorized access. If SSH is used for purposes other
than management, such as providing an SFTP service, the list of approved listening
addresses may be
+
documented.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000069</ident>
+ <fixtext fixref="F-32292r1_fix">Edit the SSH daemon configuration
to specify listening network addresses designated for management traffic.</fixtext>
+ <fix id="F-32292r1_fix" />
+ <check system="C-37024r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Ask the SA to identify which interfaces on the system are
designated for management traffic. If all interfaces on the system are authorized for
management traffic, this is not applicable. Check the SSH daemon configuration for
+ listening network addresses. # grep -i Listen /etc/ssh/sshd_config | grep -v
'^#' If no configuration is returned, or if a returned 'Listen'
configuration contains addresses not designated for management traffic, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22458">
+ <title>GEN005505</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37824r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005505</version>
+ <title>The SSH daemon must be configured to only use FIPS 140-2 approved
ciphers.</title>
+ <description><VulnDiscussion>DoD information systems are
required to use FIPS 140-2 approved ciphers. SSHv2 ciphers meeting this requirement are
3DES and
+
AES.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCNR-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000068</ident>
+ <fixtext fixref="F-32293r1_fix">Edit the SSH daemon configuration
and remove any ciphers not starting with with "3des" or "aes" and
remove any ciphers ending with "cbc". If necessary, add a "Ciphers"
line.  </fixtext>
+ <fix id="F-32293r1_fix" />
+ <check system="C-37025r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the SSH daemon configuration for allowed ciphers. #
grep -i ciphers /etc/ssh/sshd_config | grep -v '^#' If no lines are returned, or
the returned ciphers list contains any cipher not starting with "3des" or
"aes", this is a
+ finding</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22459">
+ <title>GEN005506</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26752r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005506</version>
+ <title>The SSH daemon must be configured to not use Cipher-Block Chaining
(CBC) ciphers.</title>
+ <description><VulnDiscussion>The Cipher-Block Chaining (CBC)
mode of encryption as implemented in the SSHv2 protocol is vulnerable to chosen plain text
attacks and must not be used.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-24001r1_fix">Edit /etc/ssh/sshd_config and add
or edit the "Ciphers" line. Only include ciphers that start with
"3des" or "aes" and do not contain "cbc". For the list of
available ciphers for the particular version of your
+ software, consult the sshd_config manpage.</fixtext>
+ <fix id="F-24001r1_fix" />
+ <check system="C-27761r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the SSH daemon configuration for allowed ciphers. #
grep -i ciphers /etc/ssh/sshd_config | grep -v '^#' If no lines are returned, or
the returned ciphers list contains any cipher ending with cbc, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22460">
+ <title>GEN005507</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37826r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005507</version>
+ <title>The SSH daemon must be configured to only use Message Authentication
Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.</title>
+ <description><VulnDiscussion>DoD information systems are
required to use FIPS 140-2 approved cryptographic hash
+
functions.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCNR-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001453</ident>
+ <fixtext fixref="F-32294r1_fix">Edit the SSH daemon configuration
and remove any MACs other than "hmac-sha1". If necessary, add a "MACs"
line.</fixtext>
+ <fix id="F-32294r1_fix" />
+ <check system="C-37026r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the SSH daemon configuration for allowed MACs.
Procedure: # grep -i macs /etc/ssh/sshd_config | grep -v '^#' If no lines are
returned, or the returned MACs list contains any MAC other than "hmac-sha1",
this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22461">
+ <title>GEN005510</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37828r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005510</version>
+ <title>The SSH client must be configured to only use FIPS 140-2 approved
ciphers.</title>
+ <description><VulnDiscussion>DoD information systems are
required to use FIPS 140-2 approved ciphers. SSHv2 ciphers meeting this requirement are
3DES and
+
AES.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCNR-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000068</ident>
+ <fixtext fixref="F-32297r1_fix">Edit the SSH client configuration
and remove any ciphers not starting with with "3des" or "aes" and
remove any ciphers ending with "cbc". If necessary, add a "Ciphers"
line.  </fixtext>
+ <fix id="F-32297r1_fix" />
+ <check system="C-37029r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the SSH client configuration for allowed ciphers. #
grep -i ciphers /etc/ssh/ssh_config | grep -v '^#' If no lines are returned, or
the returned ciphers list contains any cipher not starting with "3des" or
"aes", this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22462">
+ <title>GEN005511</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37830r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005511</version>
+ <title>The SSH client must be configured to not use Cipher-Block Chaining
(CBC)-based ciphers.</title>
+ <description><VulnDiscussion>The (CBC) mode of encryption as
implemented in the SSHv2 protocol is vulnerable to chosen-plaintext attacks and must not
be used.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32298r1_fix">Edit the SSH client configuration
and remove any ciphers not starting with with "3des" or "aes" and
remove any ciphers ending with "cbc". If necessary, add a "Ciphers"
line.</fixtext>
+ <fix id="F-32298r1_fix" />
+ <check system="C-37030r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the SSH client configuration for allowed ciphers. #
grep -i ciphers /etc/ssh/ssh_config | grep -v '^#' If no lines are returned, or
the returned ciphers list contains any cipher ending with "cbc", this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22463">
+ <title>GEN005512</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37836r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005512</version>
+ <title>The SSH client must be configured to only use Message Authentication
Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.</title>
+ <description><VulnDiscussion>DoD information systems are
required to use FIPS 140-2 approved cryptographic hash
+
functions.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCNR-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001453</ident>
+ <fixtext fixref="F-32301r1_fix">Edit the SSH client configuration
and remove any MACs other than "hmac-sha1". If necessary, add a "MACs"
line.</fixtext>
+ <fix id="F-32301r1_fix" />
+ <check system="C-37033r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the SSH client configuration for allowed MACs. # grep
-i macs /etc/ssh/ssh_config | grep -v '^#' If no lines are returned, or the
returned MACs list contains any MAC other than "hmac-sha1", this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22470">
+ <title>GEN005521</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37843r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005521</version>
+ <title>The SSH daemon must restrict login ability to specific users and/or
groups.</title>
+ <description><VulnDiscussion>Restricting SSH logins to a
limited group of users, such as system administrators, prevents password-guessing and
other SSH attacks from reaching system accounts and other accounts not authorized for SSH
+
access.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32309r1_fix">Edit the SSH daemon configuration
and add an "AllowGroups" or "AllowUsers" directive specifying the
groups and users allowed to have access. Alternatively, modify the /etc/pam.d/sshd file to
include the line account
+ required pam_access.so accessfile=<path to access.conf for sshd> If
the "accessfile" option is not specified the default "access.conf"
file will be used. The "access.conf" file must contain the user restriction
definitions.</fixtext>
+ <fix id="F-32309r1_fix" />
+ <check system="C-37041r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>There are two ways in which access to SSH may restrict users
or groups. Check if /etc/pam.d/sshd is configured to require daemon style login control. #
grep pam_access.so /etc/pam.d/sshd|grep "required"|grep "account"|
grep -v '^#'
+ If no lines are returned, sshd is not configured to use pam_access. Check the SSH
daemon configuration for the AllowGroups setting. # egrep -i
"AllowGroups|AllowUsers" /etc/ssh/sshd_config | grep -v '^#' If no lines
are returned, sshd is not
+ configured to limit access to users/groups. If sshd is not configured to limit
access either through pam_access or the use "AllowUsers" or
"Allowgroups", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22471">
+ <title>GEN005522</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37844r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005522</version>
+ <title>The SSH public host key files must have mode 0644 or less
permissive.</title>
+ <description><VulnDiscussion>If a public host key file is
modified by an unauthorized user, the SSH service may be
+
compromised.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32310r1_fix">Change the permissions for the SSH
public host key files. # chmod 0644 /etc/ssh/*key.pub</fixtext>
+ <fix id="F-32310r1_fix" />
+ <check system="C-37042r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions for SSH public host key files. # ls
-lL /etc/ssh/*key.pub If any file has a mode more permissive than 0644, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22472">
+ <title>GEN005523</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37863r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005523</version>
+ <title>The SSH private host key files must have mode 0600 or less
permissive.</title>
+ <description><VulnDiscussion>If an unauthorized user obtains
the private SSH host key file, the host could be
+
impersonated.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32347r1_fix">Change the permissions for the SSH
private host key files. # chmod 0600 /etc/ssh/*key</fixtext>
+ <fix id="F-32347r1_fix" />
+ <check system="C-37075r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions for SSH private host key files. # ls
-lL /etc/ssh/*key If any file has a mode more permissive than 0600, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22473">
+ <title>GEN005524</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37866r1_rule" severity="low"
weight="10.0">
+ <version>GEN005524</version>
+ <title>The SSH daemon must not permit GSSAPI authentication unless
needed.</title>
+ <description><VulnDiscussion>GSSAPI authentication is used to
provide additional authentication mechanisms to applications. Allowing GSSAPI
authentication through SSH exposes the system’s GSSAPI to remote hosts, increasing the
attack surface
+ of the system. GSSAPI authentication must be disabled unless
+
needed.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32342r1_fix">Edit the SSH daemon configuration
and set (add if necessary) a "GSSAPIAuthentication" directive set to
"no".</fixtext>
+ <fix id="F-32342r1_fix" />
+ <check system="C-37074r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Ask the SA if GSSAPI authentication is used for SSH
authentication to the system. If so, this is not applicable. Check the SSH daemon
configuration for the GSSAPIAuthentication setting. # grep -i GSSAPIAuthentication
+ /etc/ssh/sshd_config | grep -v '^#' If no lines are returned, or the
setting is set to "yes", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22474">
+ <title>GEN005525</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37868r1_rule" severity="low"
weight="10.0">
+ <version>GEN005525</version>
+ <title>The SSH client must not permit GSSAPI authentication unless
needed.</title>
+ <description><VulnDiscussion>GSSAPI authentication is used to
provide additional authentication mechanisms to applications. Allowing GSSAPI
authentication through SSH exposes the system’s GSSAPI to remote hosts, increasing the
attack surface
+ of the system. GSSAPI authentication must be disabled unless
+
needed.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32356r1_fix">Edit the SSH client configuration
and set the GSSAPIAuthentication" directive set to "no".
 </fixtext>
+ <fix id="F-32356r1_fix" />
+ <check system="C-37084r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>The default setting for GSSAPIAuthentication is
"no" . Check for a change from the default. # grep -i GSSAPIAuthentication
/etc/ssh/ssh_config | grep -v '^#' If the setting is "yes" this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22475">
+ <title>GEN005526</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37872r1_rule" severity="low"
weight="10.0">
+ <version>GEN005526</version>
+ <title>The SSH daemon must not permit Kerberos authentication unless
needed.</title>
+ <description><VulnDiscussion>Kerberos authentication for SSH is
often implemented using GSSAPI. If Kerberos is enabled through SSH, the SSH daemon
provides a means of access to the system's Kerberos implementation. Vulnerabilities in
the
+ system's Kerberos implementation may then be subject to exploitation. To reduce
the attack surface of the system, the Kerberos authentication mechanism within SSH must be
disabled for systems not using this capability.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32363r1_fix">Edit the SSH daemon configuration
and set (add if necessary) the "KerberosAuthentication" directive set to
"no".</fixtext>
+ <fix id="F-32363r1_fix" />
+ <check system="C-37088r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Ask the SA if Kerberos authentication is used by the system.
If it is, this is not applicable. Check the SSH daemon configuration for the
KerberosAuthentication setting. # grep -i KerberosAuthentication /etc/ssh/sshd_config |
grep
+ -v '^#' If no lines are returned, or the setting is set to
"yes", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22485">
+ <title>GEN005536</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37900r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005536</version>
+ <title>The SSH daemon must perform strict mode checking of home directory
configuration files.</title>
+ <description><VulnDiscussion>If other users have access to
modify user-specific SSH configuration files, they may be able to log into the system as
another
+
user.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32394r1_fix">Edit the SSH daemon configuration
and add or edit the "StrictModes" setting value to
"yes".</fixtext>
+ <fix id="F-32394r1_fix" />
+ <check system="C-37126r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the SSH daemon configuration for the StrictModes
setting. # grep -i StrictModes /etc/ssh/sshd_config | grep -v '^#' If the setting
is not present, or not set to "yes", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22486">
+ <title>GEN005537</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37904r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005537</version>
+ <title>The SSH daemon must use privilege separation.</title>
+ <description><VulnDiscussion>SSH daemon privilege separation
causes the SSH process to drop root privileges when not needed, which would decrease the
impact of software vulnerabilities in the unprivileged
+
section.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32398r1_fix">Edit the SSH daemon configuration
and add or edit the "UsePrivilegeSeparation" setting value to
"yes".</fixtext>
+ <fix id="F-32398r1_fix" />
+ <check system="C-37130r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the SSH daemon configuration for the
UsePrivilegeSeparation setting. # grep -i UsePrivilegeSeparation /etc/ssh/sshd_config |
grep -v '^#' If the setting is not present, or not set to "yes", this is
a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22487">
+ <title>GEN005538</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37905r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005538</version>
+ <title>The SSH daemon must not allow rhosts RSA
authentication.</title>
+ <description><VulnDiscussion>If SSH permits rhosts RSA
authentication, a user may be able to log in based on the keys of the host originating the
request and not any user-specific
+
authentication.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32399r1_fix">Edit the SSH daemon configuration
and add or edit the "RhostsRSAAuthentication" setting value to
"no".</fixtext>
+ <fix id="F-32399r1_fix" />
+ <check system="C-37131r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the SSH daemon configuration for the
RhostsRSAAuthentication setting. # grep -i RhostsRSAAuthentication /etc/ssh/sshd_config |
grep -v '^#' If the setting is set to "yes", this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22488">
+ <title>GEN005539</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37908r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005539</version>
+ <title>The SSH daemon must not allow compression or must only allow
compression after successful authentication.</title>
+ <description><VulnDiscussion>If compression is allowed in an
SSH connection prior to authentication, vulnerabilities in the compression software could
result in compromise of the system from an unauthenticated connection, potentially with
+ root
+
privileges.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32403r1_fix">Edit the SSH daemon configuration
and add or edit the "Compression" setting value to "no" or
"delayed".</fixtext>
+ <fix id="F-32403r1_fix" />
+ <check system="C-37134r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the SSH daemon configuration for the compression
setting. # grep -i Compression /etc/ssh/sshd_config | egrep "no|delayed" If the
setting is missing or is commented out, this is a finding. If the setting is present but
is not
+ set to "no" or "delayed", this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22489">
+ <title>GEN005550</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37915r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005550</version>
+ <title>The SSH daemon must be configured with the Department of Defense (DoD)
logon banner.</title>
+ <description><VulnDiscussion>Failure to display the DoD logon
banner prior to a logon attempt will negate legal proceedings resulting from unauthorized
access to system resources. The SSH service must be configured to display the DoD logon
+ warning banner either through the SSH configuration or a wrapper program such as
TCP_WRAPPERS. The SSH daemon may also be used to provide SFTP service. The warning banner
configuration for SSH will apply to
+
SFTP.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECWM-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000048</ident>
+ <fixtext fixref="F-32408r1_fix">Edit /etc/issue and the DoD login
banner. DoD Login Banners: You are accessing a U.S. Government (USG) Information System
(IS) that is provided for USG-authorized use only. By using this IS (which includes any
device
+ attached to this IS), you consent to the following conditions: -The USG routinely
intercepts and monitors communications on this IS for purposes including, but not limited
to, penetration testing, COMSEC monitoring, network operations and defense,
+ personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI)
investigations. -At any time, the USG may inspect and seize data stored on this IS.
-Communications using, or data stored on, this IS are not private, are subject to
+ routine monitoring, interception, and search, and may be disclosed or used for any
USG-authorized purpose. -This IS includes security measures (e.g., authentication and
access controls) to protect USG interests- -not for your personal benefit or
+ privacy. -Notwithstanding the above, using this IS does not constitute consent to
PM, LE or CI investigative searching or monitoring of the content of privileged
communications, or work product, related to personal representation or services by
+ attorneys, psychotherapists, or clergy, and their assistants. Such communications
and work product are private and confidential. See User Agreement for details. Find the
location of the banner file for sshd and examine the content: # grep -i banner
+ /etc/ssh/sshd_config | grep -v '^#' # cat Edit the SSH daemon configuration
and add or edit a "Banner" setting referencing a file containing a logon warning
banner.</fixtext>
+ <fix id="F-32408r1_fix" />
+ <check system="C-37141r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the SSH daemon is configured for logon warning
banners. Procedure: An exact match is required to have a valid warning banner. Check for
the following login banner. You are accessing a U.S. Government (USG) Information System
+ (IS) that is provided for USG-authorized use only. By using this IS (which
includes any device attached to this IS), you consent to the following conditions: -The
USG routinely intercepts and monitors communications on this IS for purposes
+ including, but not limited to, penetration testing, COMSEC monitoring, network
operations and defense, personnel misconduct (PM), law enforcement (LE), and
counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data
+ stored on this IS. -Communications using, or data stored on, this IS are not
private, are subject to routine monitoring, interception, and search, and may be disclosed
or used for any USG-authorized purpose. -This IS includes security measures
+ (e.g., authentication and access controls) to protect USG interests--not for your
personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute
consent to PM, LE or CI investigative searching or monitoring of the
+ content of privileged communications, or work product, related to personal
representation or services by attorneys, psychotherapists, or clergy, and their
assistants. Such communications and work product are private and confidential. See User
+ Agreement for details.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22490">
+ <title>GEN005570</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37921r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005570</version>
+ <title>The system must be configured with a default gateway for IPv6 if the
system uses IPv6, unless the system is a router.</title>
+ <description><VulnDiscussion>If a system has no default gateway
defined, the system is at increased risk of man-in-the-middle, monitoring, and Denial of
Service
+
attacks.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-24048r1_fix">Add a default route for IPv6. Edit
/etc/sysconfig/network-scripts/ifcfg-eth0 (substitute interface as appropriate). Add an
IPV6_DEFAULTGW=<gateway> configuration setting. Restart the interface. #
ifdown eth0;
+ ifup eth0</fixtext>
+ <fix id="F-24048r1_fix" />
+ <check system="C-37153r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for a default route for IPv6. If the system is a VM
host and acts as a router solely for the benefit of its client systems, then this rule is
not applicable. # ip -6 route list | grep default If the system uses IPv6, and no
+ results are returned, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22491">
+ <title>GEN005610</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37930r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005610</version>
+ <title>The system must not have IP forwarding for IPv6 enabled, unless the
system is an IPv6 router.</title>
+ <description><VulnDiscussion>If the system is configured for IP
forwarding and is not a designated router, it could be used to bypass network security by
providing a path for communication not filtered by network
+
devices.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32423r1_fix">Disable IPv6 forwarding. Edit
/etc/sysctl.conf and add a setting for "net.ipv6.conf.all.forwarding=0" and
"net.ipv6.conf.default.forwarding=0". Reload the sysctls. Procedure: # sysctl
-p</fixtext>
+ <fix id="F-32423r1_fix" />
+ <check system="C-37186r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check if the system is configured for IPv6 forwarding. #
grep [01] /proc/sys/net/ipv6/conf/*/forwarding|egrep "default|all" If all of the
resulting lines do not end with 0, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22492">
+ <title>GEN005750</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37940r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005750</version>
+ <title>The Network File System (NFS) export configuration file must be
group-owned by root, bin, sys, or system.</title>
+ <description><VulnDiscussion>Failure to give group-ownership of
the NFS export configuration file to root or a system group provides the designated
group-owner and possible unauthorized users with the potential to change system
configuration
+ which could weaken the system's security
+
posture.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32431r1_fix">Change the group ownership of the
NFS export configuration file. Procedure: # chgrp root /etc/exports</fixtext>
+ <fix id="F-32431r1_fix" />
+ <check system="C-37213r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the NFS export configuration
file. Procedure: # ls -lL /etc/exports If the file is not group-owned by root, bin, sys,
or system, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22493">
+ <title>GEN005770</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37947r1_rule" severity="low"
weight="10.0">
+ <version>GEN005770</version>
+ <title>The Network File System (NFS) exports configuration file must not have
an extended ACL.</title>
+ <description><VulnDiscussion>File system extended ACLs provide
access to files beyond what is allowed by the mode numbers of the files. Excessive
permissions on the NFS export configuration file could allow unauthorized modification of
the
+ file, which could result in Denial of Service to authorized NFS exports and the
creation of additional unauthorized
+
exports.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32439r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/exports</fixtext>
+ <fix id="F-32439r1_fix" />
+ <check system="C-37232r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the NFS export configuration file.
# ls -lL /etc/exports If the permissions include a '+', the file has an extended
ACL. If the file has an extended ACL and it has not been documented with the IAO, this is
+ a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22496">
+ <title>GEN005810</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37851r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005810</version>
+ <title>All Network File System (NFS) exported system files and system
directories must be group-owned by root, bin, sys, or system.</title>
+ <description><VulnDiscussion>Failure to give group-ownership of
sensitive files or directories to root provides the members of the owning group with the
potential to access sensitive information or change system configuration which could
+ weaken the system's security
+
posture.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32314r1_fix">Change the group owner of the
export directory. # chgrp root <export></fixtext>
+ <fix id="F-32314r1_fix" />
+ <check system="C-37046r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>List the exports. # cat /etc/exports For each file system
displayed, check the ownership. # ls -ldL <exported file system path> If the
directory is not group-owned by root, bin, sys, or system, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22497">
+ <title>GEN006150</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37877r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006150</version>
+ <title>The /etc/smb.conf file must not have an extended ACL.</title>
+ <description><VulnDiscussion>Excessive permissions could
endanger the security of the Samba configuration file and, ultimately, the system and
+
network.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32372r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/samba/smb.conf</fixtext>
+ <fix id="F-32372r1_fix" />
+ <check system="C-37098r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the Samba configuration file. # ls
-lL /etc/samba/smb.conf If the permissions include a '+', the file has an extended
ACL. If the file has an extended ACL and it has not been documented with the IAO, this
+ is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22498">
+ <title>GEN006210</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37884r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006210</version>
+ <title>The /etc/smbpasswd file must not have an extended ACL.</title>
+ <description><VulnDiscussion>If the permissions of the
"smbpasswd" file are too permissive, it may be maliciously accessed or modified,
potentially resulting in the compromise of Samba
+
accounts.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32377r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/samba/passdb.tdb /etc/samba/secrets.tdb</fixtext>
+ <fix id="F-32377r1_fix" />
+ <check system="C-37109r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the Samba password files.
Procedure: # ls -lL /etc/samba/passdb.tdb /etc/samba/secrets.tdb If the permissions
include a '+', the file has an extended ACL. If the file has an extended ACL and
it has not been
+ documented with the IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22499">
+ <title>GEN006225</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37891r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006225</version>
+ <title>Samba must be configured to use an authentication mechanism other than
"share."</title>
+ <description><VulnDiscussion>Samba share authentication does
not provide for individual user identification and must not be
+
used.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32385r1_fix">Edit the
"/etc/samba/smb.conf" file and change the "security" setting to
"user" or another valid setting other than "share".</fixtext>
+ <fix id="F-32385r1_fix" />
+ <check system="C-37117r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the security mode of the Samba configuration. # grep
-i security /etc/samba/smb.conf If the security mode is "share", this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22500">
+ <title>GEN006230</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37894r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006230</version>
+ <title>Samba must be configured to use encrypted passwords.</title>
+ <description><VulnDiscussion>Samba must be configured to
protect authenticators. If Samba passwords are not encrypted for storage, plain-text user
passwords may be read by those with access to the Samba password
+
file.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32388r1_fix">Edit the
"/etc/samba/smb.conf" file and change the "encrypt passwords" setting
to "yes".</fixtext>
+ <fix id="F-32388r1_fix" />
+ <check system="C-37120r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the encryption setting of Samba. # grep -i
'encrypt passwords' /etc/samba/smb.conf If the setting is not present, or not set
to 'yes', this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22501">
+ <title>GEN006235</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37896r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006235</version>
+ <title>Samba must be configured to not allow guest access to
shares.</title>
+ <description><VulnDiscussion>Guest access to shares permits
anonymous access and is not
+
permitted.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32390r1_fix">Edit the
"/etc/samba/smb.conf" file and change the "guest ok" setting to
"no".</fixtext>
+ <fix id="F-32390r1_fix" />
+ <check system="C-37122r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the access to shares for Samba. # grep -i 'guest
ok' /etc/samba/smb.conf If the setting exists and is set to 'yes', this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22502">
+ <title>GEN006270</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37902r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006270</version>
+ <title>The /etc/news/hosts.nntp file must not have an extended
ACL.</title>
+ <description><VulnDiscussion>File system extended ACLs provide
access to files beyond what is allowed by the mode numbers of the files. Excessive
permissions on the "hosts.nntp" file may allow unauthorized modification which
could lead to
+ Denial of Service to authorized users or provide access to unauthorized
+
users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32396r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/news/hosts.nntp</fixtext>
+ <fix id="F-32396r1_fix" />
+ <check system="C-37128r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the file. # ls -lL
/etc/news/hosts.nntp If the permissions include a '+', the file has an extended
ACL. If the file has an extended ACL and it has not been documented with the IAO, this is
a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22503">
+ <title>GEN006290</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37713r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006290</version>
+ <title>The /etc/news/hosts.nntp.nolimit file must not have an extended
ACL.</title>
+ <description><VulnDiscussion>File system extended ACLs provide
access to files beyond what is allowed by the mode numbers of the files. Excessive
permissions on the hosts.nntp.nolimit file may allow unauthorized modification which could
lead
+ to Denial of Service to authorized users or provide access to unauthorized
+
users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32132r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/news/hosts.nntp.nolimit</fixtext>
+ <fix id="F-32132r1_fix" />
+ <check system="C-36914r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions for
"/etc/news/hosts.nntp.nolimit". # ls -lL /etc/news/hosts.nntp.nolimit If the
permissions include a '+', the file has an extended ACL. If the file has an
extended ACL and it has not been documented with the
+ IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22504">
+ <title>GEN006310</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37730r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006310</version>
+ <title>The /etc/news/nnrp.access file must not have an extended
ACL.</title>
+ <description><VulnDiscussion>File system extended ACLs provide
access to files beyond what is allowed by the mode numbers of the files. Excessive
permissions on the nnrp.access file may allow unauthorized modification which could lead
to
+ Denial of Service to authorized users or provide access to unauthorized
+
users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32191r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/news/nnrp.access</fixtext>
+ <fix id="F-32191r1_fix" />
+ <check system="C-36926r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the file. # ls -lL
/etc/news/nnrp.access If the permissions include a '+', the file has an extended
ACL. If the file has an extended ACL and it has not been documented with the IAO, this is
a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22505">
+ <title>GEN006330</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37733r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006330</version>
+ <title>The /etc/news/passwd.nntp file must not have an extended
ACL.</title>
+ <description><VulnDiscussion>Extended ACLs may provide
excessive permissions on the /etc/news/passwd.nntp file, which may permit unauthorized
access or modification to the NNTP
+
configuration.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32194r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/news/passwd.nntp</fixtext>
+ <fix id="F-32194r1_fix" />
+ <check system="C-36929r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the file. # ls -lL
/etc/news/passwd.nntp If the mode includes a '+', the file has an extended ACL. If
the file has an extended ACL and it has not been documented with the IAO, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22506">
+ <title>GEN006565</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37751r1_rule" severity="medium"
weight="10.0">
+ <version>GEN006565</version>
+ <title>The system package management tool must be used to verify system
software periodically.</title>
+ <description><VulnDiscussion>Verification using the system
package management tool can be used to determine that system software has not been
tampered with. This requirement is not applicable to systems not using package management
+
tools.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECAT-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <ident
system="http://iase.disa.mil/cci">CCI-000698</ident>
+ <fixtext fixref="F-32212r1_fix">Add a cron job to run an rpm
verification command such as: rpm -qVa | awk '$2!="c" {print $0}' For
packages which failed verification: If the package is not necessary for operations, remove
it from the system. If the
+ package is necessary for operations, re-install the package.</fixtext>
+ <fix id="F-32212r1_fix" />
+ <check system="C-36948r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the root crontab (crontab -l) and the global crontabs
in "/etc/crontab", "/etc/cron.*" for the presence of an rpm
verification command such as: rpm -qVa | awk '$2!="c" {print $0}' If no
such cron job is found, this is a
+ finding. If the result of the cron job indicates packages which do not pass
verification exist, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22507">
+ <title>GEN006570</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37752r1_rule" severity="low"
weight="10.0">
+ <version>GEN006570</version>
+ <title>The file integrity tool must be configured to verify
ACLs.</title>
+ <description><VulnDiscussion>ACLs can provide permissions
beyond those permitted through the file mode and must be verified by file integrity
+
tools.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECAT-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001297</ident>
+ <fixtext fixref="F-32214r1_fix">If using AIDE, edit the
configuration and add the "ACL" option for all monitored files and directories.
If using a different file integrity tool, configure ACL checking per the tool's
documentation.</fixtext>
+ <fix id="F-32214r1_fix" />
+ <check system="C-36950r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If using an Advanced Intrusion Detection Environment (AIDE),
verify that the configuration contains the "ACL" option for all monitored files
and directories. Procedure: Check for the default location /etc/aide/aide.conf or: # find
+ / -name aide.conf # egrep "[+]?acl" <aide.conf file> If
the option is not present. This is a finding. If using a different file integrity tool,
check the configuration per tool documentation.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22508">
+ <title>GEN006571</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37753r1_rule" severity="low"
weight="10.0">
+ <version>GEN006571</version>
+ <title>The file integrity tool must be configured to verify extended
attributes.</title>
+ <description><VulnDiscussion>Extended attributes in file
systems are used to contain arbitrary data and file metadata with security
+
implications.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECAT-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001297</ident>
+ <fixtext fixref="F-32215r1_fix">If using AIDE, edit the
configuration and add the "xattrs" option for all monitored files and
directories. If using a different file integrity tool, configure extended attributes
checking per the tool's
+ documentation.</fixtext>
+ <fix id="F-32215r1_fix" />
+ <check system="C-36951r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If using an Advanced Intrusion Detection Environment (AIDE),
verify the configuration contains the "xattrs" option for all monitored files
and directories. Procedure: Check for the default location /etc/aide/aide.conf or: # find
/
+ -name aide.conf # egrep "[+]?xattrs" <aide.conf file> If
the option is not present. This is a finding. If using a different file integrity tool,
check the configuration per tool documentation.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22509">
+ <title>GEN006575</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37754r1_rule" severity="low"
weight="10.0">
+ <version>GEN006575</version>
+ <title>The file integrity tool must use FIPS 140-2 approved cryptographic
hashes for validating file contents.</title>
+ <description><VulnDiscussion>File integrity tools often use
cryptographic hashes for verifying that file contents have not been altered. These hashes
must be FIPS 140-2
+
approved.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001297</ident>
+ <fixtext fixref="F-32217r1_fix">If using AIDE, edit the
configuration and add the "sha512" option for all monitored files and
directories. If using a different file integrity tool, configure FIPS 140-2 approved
cryptographic hashes per the tool's
+ documentation.</fixtext>
+ <fix id="F-32217r1_fix" />
+ <check system="C-36952r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If using an Advanced Intrusion Detection Environment (AIDE),
verify the configuration contains the "sha256" or "sha512" options for
all monitored files and directories. Procedure: Check for the default location
/etc/aide/aide.conf
+ or: # find / -name aide.conf # egrep "[+]?(sha256|sha512)"
<aide.conf file> If the option is not present. This is a finding. If one of
these options is not present. This is a finding. If using a different file integrity tool,
check the
+ configuration per tool documentation.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22511">
+ <title>GEN007020</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37761r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007020</version>
+ <title>The Stream Control Transmission Protocol (SCTP) must be disabled
unless required.</title>
+ <description><VulnDiscussion>The Stream Control Transmission
Protocol (SCTP) is an Internet Engineering Task Force (IETF)-standardized transport layer
protocol. This protocol is not yet widely used. Binding this protocol to the network
stack
+ increases the attack surface of the host. Unprivileged local processes may be able
to cause the system to dynamically load a protocol handler by opening a socket using the
+
protocol.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000382</ident>
+ <fixtext fixref="F-32222r1_fix">Prevent the SCTP protocol handler
for dynamic loading. # echo "install sctp /bin/true" >>
/etc/modprobe.conf</fixtext>
+ <fix id="F-32222r1_fix" />
+ <check system="C-36957r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the SCTP protocol handler is prevented from dynamic
loading. # grep 'install sctp /bin/true' /etc/modprobe.conf /etc/modprobe.d/* If
no result is returned, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22514">
+ <title>GEN007080</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37763r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007080</version>
+ <title>The Datagram Congestion Control Protocol (DCCP) must be disabled
unless required.</title>
+ <description><VulnDiscussion>The DCCP is a proposed transport
layer protocol. This protocol is not yet widely used. Binding this protocol to the network
stack increases the attack surface of the host. Unprivileged local processes may be able
+ to cause the system to dynamically load a protocol handler by opening a socket
using the
+
protocol.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000382</ident>
+ <fixtext fixref="F-32223r1_fix">Prevent the DCCP protocol handler
for dynamic loading. # echo "install dccp /bin/true" >>
/etc/modprobe.conf # echo "install dccp_ipv4 /bin/true" >>
/etc/modprobe.conf # echo "install dccp_ipv6 /bin/true"
+ >> /etc/modprobe.conf</fixtext>
+ <fix id="F-32223r1_fix" />
+ <check system="C-36958r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the DCCP protocol handler is prevented from dynamic
loading. # grep 'install dccp /bin/true' /etc/modprobe.conf /etc/modprobe.d/* If
no result is returned, this is a finding. # grep 'install dccp_ipv4 /bin/true'
+ /etc/modprobe.conf /etc/modprobe.d/* If no result is returned, this is a finding.
# grep 'install dccp_ipv6 /bin/true' /etc/modprobe.conf /etc/modprobe.d/* If no
result is returned, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22524">
+ <title>GEN007260</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26887r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007260</version>
+ <title>The AppleTalk protocol must be disabled or not
installed.</title>
+ <description><VulnDiscussion>The AppleTalk suite of protocols
is no longer in common use. Binding this protocol to the network stack increases the
attack surface of the host. Unprivileged local processes may be able to cause the system
to
+ dynamically load a protocol handler by opening a socket using the
+
protocol.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000382</ident>
+ <fixtext fixref="F-24130r1_fix">Prevent the AppleTalk protocol
handler for dynamic loading. # echo "install appletalk /bin/true"
>> /etc/modprobe.conf</fixtext>
+ <fix id="F-24130r1_fix" />
+ <check system="C-27846r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the AppleTalk protocol handler is prevented from
dynamic loading. # grep 'install appletalk' /etc/modprobe.conf /etc/modprobe.d/*
If anything is returned check that appletalk is disabled by having the executable set to
+ '/bin/true'. If an uncommented line containing "appletalk" is
found which has not been disabled, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22530">
+ <title>GEN007480</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37603r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007480</version>
+ <title>The Reliable Datagram Sockets (RDS) protocol must be disabled or not
installed unless required.</title>
+ <description><VulnDiscussion>The RDS protocol is a relatively
new protocol developed by Oracle for communication between the nodes of a cluster. Binding
this protocol to the network stack increases the attack surface of the host. Unprivileged
+ local processes may be able to cause the system to dynamically load a protocol
handler by opening a socket using the
+
protocol.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000382</ident>
+ <fixtext fixref="F-31638r1_fix">Prevent the RDS protocol handler
for dynamic loading. # echo "install rds /bin/true" >>
/etc/modprobe.conf</fixtext>
+ <fix id="F-31638r1_fix" />
+ <check system="C-36740r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Ask the SA if RDS is required by application software
running on the system. If so, this is not applicable. Verify the RDS protocol handler is
prevented from dynamic loading. # grep 'install rds /bin/true' /etc/modprobe.conf
+ /etc/modprobe.d/* If no result is returned, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22533">
+ <title>GEN007540</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37604r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007540</version>
+ <title>The Transparent Inter-Process Communication (TIPC) protocol must be
disabled or uninstalled.</title>
+ <description><VulnDiscussion>The TIPC protocol is a relatively
new cluster communications protocol developed by Ericsson. Binding this protocol to the
network stack increases the attack surface of the host. Unprivileged local processes may
be
+ able to cause the system to dynamically load a protocol handler by opening a socket
using the
+
protocol.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000382</ident>
+ <fixtext fixref="F-31639r1_fix">Prevent the TIPC protocol handler
for dynamic loading. # echo "install tipc /bin/true" >>
/etc/modprobe.conf</fixtext>
+ <fix id="F-31639r1_fix" />
+ <check system="C-36758r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the TIPC protocol handler is prevented from dynamic
loading. # grep 'install tipc /bin/true' /etc/modprobe.conf /etc/modprobe.d/* If
no result is returned, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22539">
+ <title>GEN007660</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37605r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007660</version>
+ <title>The Bluetooth protocol handler must be disabled or not
installed.</title>
+ <description><VulnDiscussion>Bluetooth is a Personal Area
Network (PAN) technology. Binding this protocol to the network stack increases the attack
surface of the host. Unprivileged local processes may be able to cause the kernel to
+ dynamically load a protocol handler by opening a socket using the
+
protocol.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31640r1_fix">Prevent the Bluetooth protocol
handler for dynamic loading. # echo "install bluetooth /bin/true"
>> /etc/modprobe.conf</fixtext>
+ <fix id="F-31640r1_fix" />
+ <check system="C-36766r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the Bluetooth protocol handler is prevented from
dynamic loading. # grep 'install bluetooth /bin/true' /etc/modprobe.conf
/etc/modprobe.d/* If no result is returned, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22541">
+ <title>GEN007700</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37606r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007700</version>
+ <title>The IPv6 protocol handler must not be bound to the network stack
unless needed.</title>
+ <description><VulnDiscussion>IPv6 is the next version of the
Internet protocol. Binding this protocol to the network stack increases the attack surface
of the
+
host.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31643r1_fix">Remove the capability to use IPv6
protocol handler. Procedure: Edit /etc/sysconfig/network and change NETWORKING_IPV6=yes to
NETWORKING_IPV6=no Edit /etc/modprobe.conf and add these lines (if they are not in it):
+ alias net-pf-10 off alias ipv6 off Stop the ipv6tables service by typing: service
ip6tables stop Disable the ipv6tables service by typing: chkconfig ip6tables off Remove
the ipv6 kernel module # rmmod ipv6 Reboot</fixtext>
+ <fix id="F-31643r1_fix" />
+ <check system="C-36779r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If the IPv6 protocol handler is bound to the network stack,
and the system does not need IPv6, this is a finding. # grep NETWORKING_IPV6
/etc/sysconfig/network If the line is set to "yes", this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22542">
+ <title>GEN007720</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37609r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007720</version>
+ <title>The IPv6 protocol handler must be prevented from dynamic loading
unless needed.</title>
+ <description><VulnDiscussion>IPv6 is the next generation of the
Internet protocol. Binding this protocol to the network stack increases the attack surface
of the host. Unprivileged local processes may be able to cause the system to
+ dynamically load a protocol handler by opening a socket using the
+
protocol.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31644r1_fix">Prevent the IPv6 protocol handler
for dynamic loading. # echo "install ipv6 /bin/true" >>
/etc/modprobe.conf</fixtext>
+ <fix id="F-31644r1_fix" />
+ <check system="C-36786r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If this system uses IPv6, this is not applicable. Verify the
IPv6 protocol handler is prevented from dynamic loading. # grep 'install ipv6
/bin/true' /etc/modprobe.conf /etc/modprobe.d/* If no result is returned, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22545">
+ <title>GEN007780</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37610r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007780</version>
+ <title>The system must not have 6to4 enabled.</title>
+ <description><VulnDiscussion>6to4 is an IPv6 transition
mechanism involving tunneling IPv6 packets encapsulated in IPv4 packets on an ad-hoc
basis. This is not a preferred transition strategy and increases the attack surface of
the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31646r1_fix">Disable the active 6to4 tunnel. #
ip link set <tunnel> down Add this command to a startup script, or remove
the configuration creating the tunnel.</fixtext>
+ <fix id="F-31646r1_fix" />
+ <check system="C-36796r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system for any active 6to4 tunnels without
specific remote addresses. # ip tun list | grep "remote any" | grep
"ipv6/ip" If any results are returned the "tunnel" is the first field.
If any results are returned, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22546">
+ <title>GEN007800</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37611r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007800</version>
+ <title>The system must not have Teredo enabled.</title>
+ <description><VulnDiscussion>Teredo is an IPv6 transition
mechanism involving tunneling IPv6 packets encapsulated in IPv4 packets. Unauthorized
tunneling may circumvent network
+
security.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31647r1_fix">Edit startup scripts to prevent the
service from running on startup.</fixtext>
+ <fix id="F-31647r1_fix" />
+ <check system="C-36805r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the Miredo service is not running. # ps ax | grep
miredo | grep -v grep If the miredo process is running, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22547">
+ <title>GEN007820</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37613r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007820</version>
+ <title>The system must not have IP tunnels configured.</title>
+ <description><VulnDiscussion>IP tunneling mechanisms can be
used to bypass network
+
filtering.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31648r1_fix">Remove the tunnels. # ip tun del
<tunnel> Edit system startup scripts to prevent tunnel creation on
startup.</fixtext>
+ <fix id="F-31648r1_fix" />
+ <check system="C-36809r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for any IP tunnels. # ip tun list # ip -6 tun list If
any tunnels are listed, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22548">
+ <title>GEN007840</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37615r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007840</version>
+ <title>The DHCP client must be disabled if not needed.</title>
+ <description><VulnDiscussion>DHCP allows for the
unauthenticated configuration of network parameters on the system by exchanging
information with a DHCP
+
server.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-24173r1_fix">Edit the
"/etc/sysconfig/network-scripts/ifcfg-*" file(s) and change the
"bootproto" setting to "static".</fixtext>
+ <fix id="F-24173r1_fix" />
+ <check system="C-36811r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify no interface is configured to use DHCP. # grep -i
bootproto=dhcp /etc/sysconfig/network-scripts/ifcfg-* If any configuration is found, this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22549">
+ <title>GEN007850</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26933r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007850</version>
+ <title>The DHCP client must not send dynamic DNS updates.</title>
+ <description><VulnDiscussion>Dynamic DNS updates transmit
unencrypted information about a system including its name and address and should not be
used unless
+
needed.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-24178r1_fix">Edit or add the
"/etc/dhclient.conf" file and add or edit the "do-forward-updates"
setting to false. Procedure: # echo "do-forward-updates false;" >>
/etc/dhclient.conf</fixtext>
+ <fix id="F-24178r1_fix" />
+ <check system="C-27883r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the DHCP client is configured to not send dynamic DNS
updates. Procedure: # grep do-forward-updates /etc/dhclient.conf If the file is not
present, does not contain this configuration, or has the setting set to "true",
this
+ is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22550">
+ <title>GEN007860</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37616r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007860</version>
+ <title>The system must ignore IPv6 ICMP redirect messages.</title>
+ <description><VulnDiscussion>ICMP redirect messages are used by
routers to inform hosts that a more direct route exists for a particular destination.
These messages modify the host's route table and are unauthenticated. An illicit ICMP
+ redirect message could result in a man-in-the-middle
+
attack.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31651r1_fix">Configure the system to ignore IPv6
ICMP redirect messages. Edit "/etc/sysctl.conf" and add a settings for
"net.ipv6.conf.default.accept_redirects=0" and
"net.ipv6.conf.all.accept_redirects=0". Restart the system for
+ the setting to take effect.</fixtext>
+ <fix id="F-31651r1_fix" />
+ <check system="C-36813r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the system is configured to ignore IPv6 ICMP redirect
messages. # cat /proc/sys/net/ipv6/conf/all/accept_redirects If the returned value is not
"0", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22553">
+ <title>GEN007920</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37618r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007920</version>
+ <title>The system must not forward IPv6 source-routed packets.</title>
+ <description><VulnDiscussion>Source-routed packets allow the
source of the packet to suggest that routers forward the packet along a different path
than configured on the router, which can be used to bypass network security measures.
This
+ requirement applies only to the forwarding of source-routed traffic, such as when
IPv6 forwarding is enabled and the system is functioning as a router.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001551</ident>
+ <fixtext fixref="F-31656r1_fix">Configure the system to not forward
IPv6 source-routed packets. Procedure: Edit the /etc/sysctl.conf file to include:
net.ipv6.conf.all.forwarding = 0 net.ipv6.conf.default.forwarding = 0 Reload the kernel
+ parameters: # sysctl -p</fixtext>
+ <fix id="F-31656r1_fix" />
+ <check system="C-36815r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if the system is configured to forward IPv6
source-routed packets. Procedure: # egrep "net.ipv6.conf.*forwarding"
/etc/sysctl.conf If there are no entries found or the value of the entries is not =
"0", this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22555">
+ <title>GEN007980</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37627r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007980</version>
+ <title>If the system is using LDAP for authentication or account information,
the system must use a TLS connection using FIPS 140-2 approved cryptographic
algorithms.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. Communication
between an LDAP server and a host using LDAP requires
+
protection.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCNR-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001453</ident>
+ <fixtext fixref="F-31665r1_fix">Edit "/etc/ldap.conf" and
add a "ssl start_tls" and "tls_ciphers" options with only FIPS 140-2
approved ciphers.</fixtext>
+ <fix id="F-31665r1_fix" />
+ <check system="C-36827r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check if the system is using NSS LDAP. # grep -v
'^#' /etc/nsswitch.conf | grep ldap If no lines are returned, this vulnerability
is not applicable. Check if NSS LDAP is using TLS. # grep '^ssl start_tls'
/etc/ldap.conf If no lines
+ are returned, this is a finding. Check if NSS LDAP TLS is using only FIPS 140-2
approved cryptographic algorithms. # grep '^tls_ciphers' /etc/ldap.conf If the
line is not present, or contains ciphers not approved by FIPS 140-2, this is a finding.
+ FIPS approved ciphers include 3DES and AES. FIPS approved hashes include the SHA
hash family.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22556">
+ <title>GEN008000</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37631r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008000</version>
+ <title>If the system is using LDAP for authentication or account information,
certificates used to authenticate to the LDAP server must be provided from DoD PKI or a
DoD-approved external PKI.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. Communication
between an LDAP server and a host using LDAP requires
+
authentication.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCNR-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000185</ident>
+ <fixtext fixref="F-31668r1_fix">Edit "/etc/ldap.conf" and
add or edit the 'tls_cert' setting to reference a file containing a client
certificate issued by DoD PKI or a DoD-approved external PKI.</fixtext>
+ <fix id="F-31668r1_fix" />
+ <check system="C-36829r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the source of the LDAP certificates Check if the
system is using NSS LDAP. # grep -v '^#' /etc/nsswitch.conf | grep ldap If no
lines are returned, this vulnerability is not applicable. Verify with the SA that the
system is
+ connected to the GIG. If the system part of a stand alone network which is not
connected to the GIG this vulnerability is not applicable. Verify a certificate is used
for client authentication to the server. # grep -i '^tls_cert' /etc/ldap.conf
+ If no line is found, this is a finding. List the certificate issuer. # openssl
x509 -text -in <cert> If the certificate is not issued by DoD PKI or a
DoD-approved external PKI, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22557">
+ <title>GEN008020</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37632r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008020</version>
+ <title>If the system is using LDAP for authentication or account information,
the LDAP TLS connection must require the server provide a certificate with a valid trust
path to a trusted CA.</title>
+ <description><VulnDiscussion>The NSS LDAP service provides user
mappings which are a vital component of system security. Communication between an LDAP
server and a host using LDAP for NSS require
+
authentication.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCNR-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000185</ident>
+ <fixtext fixref="F-31669r1_fix">Edit "/etc/ldap.conf" and
add or set the "tls_checkpeer" setting to "yes".</fixtext>
+ <fix id="F-31669r1_fix" />
+ <check system="C-36831r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check if the system is using NSS LDAP. # grep -v
'^#' /etc/nsswitch.conf | grep ldap If no lines are returned, this vulnerability
is not applicable. Verify a server certificate is required and verified by the NSS LDAP
+ configuration. # grep -i '^tls_checkpeer' /etc/ldap.conf If no line is
returned, or the value is not "yes", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22558">
+ <title>GEN008040</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37634r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008040</version>
+ <title>If the system is using LDAP for authentication or account information,
the system must verify the LDAP server's certificate has not been
revoked.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. Communication
between an LDAP server and a host using LDAP requires
+
authentication.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCNR-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000185</ident>
+ <fixtext fixref="F-31672r1_fix">Edit "/etc/ldap.conf" and
add or set the "tls_crlcheck" setting to "all".</fixtext>
+ <fix id="F-31672r1_fix" />
+ <check system="C-36834r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check if the system is using NSS LDAP. # grep -v
'^#' /etc/nsswitch.conf | grep ldap If no lines are returned, this vulnerability
is not applicable. Verify the NSS LDAP client is configured to check certificates against
a
+ certificate revocation list. # grep -i '^tls_crlcheck' /etc/ldap.conf If
the setting does not exist, or the value is not "all", this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22559">
+ <title>GEN008060</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37951r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008060</version>
+ <title>If the system is using LDAP for authentication or account information
the /etc/ldap.conf (or equivalent) file must have mode 0644 or less
permissive.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. The LDAP
client configuration must be protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32441r1_fix">Change the permissions of the file.
# chmod 0644 /etc/ldap.conf</fixtext>
+ <fix id="F-32441r1_fix" />
+ <check system="C-37235r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the file. # ls -lL /etc/ldap.conf
If the mode of the file is more permissive than 0644, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22560">
+ <title>GEN008080</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37953r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008080</version>
+ <title>If the system is using LDAP for authentication or account information,
the /etc/ldap.conf (or equivalent) file must be owned by root.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. The LDAP
client configuration must be protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32442r1_fix">Change the owner of the file. #
chown root /etc/ldap.conf</fixtext>
+ <fix id="F-32442r1_fix" />
+ <check system="C-37239r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of the file. # ls -lL /etc/ldap.conf If
the file is not owned by root, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22561">
+ <title>GEN008100</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37955r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008100</version>
+ <title>If the system is using LDAP for authentication or account information,
the /etc/ldap.conf (or equivalent) file must be group-owned by root, bin, sys, or
system.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. The LDAP
client configuration must be protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32444r1_fix">Change the group owner of the file
to root, bin, sys, or system. Procedure: # chgrp root /etc/ldap.conf</fixtext>
+ <fix id="F-32444r1_fix" />
+ <check system="C-37244r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the file. Procedure: # ls -lL
/etc/ldap.conf If the file is not group-owned by root, bin, sys, or system, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22562">
+ <title>GEN008120</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37956r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008120</version>
+ <title>If the system is using LDAP for authentication or account information,
the /etc/ldap.conf (or equivalent) file must not have an extended ACL.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. The LDAP
client configuration must be protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32445r1_fix">Remove the extended ACL from the
"/etc/ldap.conf" file. # setfacl --remove-all /etc/ldap.conf</fixtext>
+ <fix id="F-32445r1_fix" />
+ <check system="C-37245r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the file. # ls -lL /etc/ldap.conf
If the mode includes a '+', the file has an extended ACL. If the file has an
extended ACL and it has not been documented with the IAO, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22563">
+ <title>GEN008140</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37959r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008140</version>
+ <title>If the system is using LDAP for authentication or account information,
the TLS certificate authority file and/or directory (as appropriate) must be owned by
root.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. The LDAP
client configuration must be protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32446r1_fix">Change the ownership of the file or
directory. # chown root <certpath></fixtext>
+ <fix id="F-32446r1_fix" />
+ <check system="C-37252r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if LDAP is used for account information on the
system. # grep -i ldap /etc/nsswitch.conf If no un-commented reference to "ldap"
is identified, LDAP is not used for account information on the system and this is not
+ applicable. Determine the certificate authority file and/or directory. # grep -i
'^tls_cacert' /etc/ldap.conf For each file or directory returned, check the
ownership. # ls -lLd <certpath> If the owner of any file or directory is not
root,
+ this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22564">
+ <title>GEN008160</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37961r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008160</version>
+ <title>If the system is using LDAP for authentication or account information,
the TLS certificate authority file and/or directory (as appropriate) must be group-owned
by root, bin, sys, or system.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. The LDAP
client configuration must be protected from unauthorized
+
modification</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32447r1_fix">Change the group ownership of the
file or directory. # chgrp root <certpath></fixtext>
+ <fix id="F-32447r1_fix" />
+ <check system="C-37260r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine the certificate authority file and/or directory. #
grep -i '^tls_cacert' /etc/ldap.conf For each file or directory returned, check
the group ownership. # ls -lLd <certpath> If the group-owner of any file or
+ directory is not root, bin, sys, or system, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22565">
+ <title>GEN008180</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37962r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008180</version>
+ <title>If the system is using LDAP for authentication or account information,
the TLS certificate authority file and/or directory (as appropriate) must have mode 0644
(0755 for directories) or less permissive.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. The LDAP
client configuration must be protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32448r1_fix">Change the mode of the file or
directory. File Procedure: # chmod 0644 <certpath> Directory Procedure: #
chmod 0755 <certpath></fixtext>
+ <fix id="F-32448r1_fix" />
+ <check system="C-37261r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine the certificate authority file and/or directory.
Procedure: # grep -i '^tls_cacert' /etc/ldap.conf For each file or directory
returned, check the permissions. Procedure: # ls -lLd <certpath> If the mode
of the file
+ is more permissive than 0644 (or 0755 for directories), this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22566">
+ <title>GEN008200</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37964r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008200</version>
+ <title>If the system is using LDAP for authentication or account information,
the LDAP TLS certificate authority file and/or directory (as appropriate) must not have an
extended ACL.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. The LDAP
client configuration must be protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32461r1_fix">Remove the extended ACL from the
certificate file. Procedure: For each certificate file found remove all extended
permissions # setfacl --remove-all <certpath></fixtext>
+ <fix id="F-32461r1_fix" />
+ <check system="C-37262r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine the certificate authority file and/or directory. #
grep -i '^tls_cacert' /etc/ldap.conf For each file or directory returned, check
the permissions. # ls -lLd <certpath> If the mode of the file or directory
contains
+ a '+', an extended ACL is present. If the file has an extended ACL and it
has not been documented with the IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22567">
+ <title>GEN008220</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37965r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008220</version>
+ <title>For systems using NSS LDAP, the TLS certificate file must be owned by
root.</title>
+ <description><VulnDiscussion>The NSS LDAP service provides user
mappings which are a vital component of system security. Its configuration must be
protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32470r1_fix">Change the ownership of the file. #
chown root <certpath></fixtext>
+ <fix id="F-32470r1_fix" />
+ <check system="C-37263r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine the certificate file. # grep -i
'^tls_cert' /etc/ldap.conf Check the ownership. # ls -lL <certpath>
If the owner of the file is not root, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22568">
+ <title>GEN008240</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37967r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008240</version>
+ <title>If the system is using LDAP for authentication or account information,
the LDAP TLS certificate file must be group-owned by root, bin, sys, or
system.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. The LDAP
client configuration must be protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32501r1_fix">Change the group ownership of the
file. Procedure: # chgrp root <certpath></fixtext>
+ <fix id="F-32501r1_fix" />
+ <check system="C-37265r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine the certificate file. Procedure: # grep -i
'^tls_cert' /etc/ldap.conf Check the group ownership. Procedure: # ls -lL
<certpath> If the group owner of the file is not root, bin, sys, or system,
this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22569">
+ <title>GEN008260</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37966r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008260</version>
+ <title>If the system is using LDAP for authentication or account information,
the LDAP TLS certificate file must have mode 0644 or less permissive.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. The LDAP
client configuration must be protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32487r1_fix">Change the mode of the file. #
chmod 0644 <certpath></fixtext>
+ <fix id="F-32487r1_fix" />
+ <check system="C-37264r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine the certificate file. # grep -i
'^tls_cacert' /etc/ldap.conf Check the permissions. # ls -lL
<certpath> If the mode of the file is more permissive than 0644, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22570">
+ <title>GEN008280</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37968r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008280</version>
+ <title>If the system is using LDAP for authentication or account information,
the LDAP TLS certificate file must not have an extended ACL.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. The LDAP
client configuration must be protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32502r1_fix">Remove the extended ACL from the
certificate file. Procedure: For each certificate file found remove all extended
permissions. # setfacl --remove-all <certpath></fixtext>
+ <fix id="F-32502r1_fix" />
+ <check system="C-37266r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine the certificate file. # grep -i
'^tls_cert' /etc/ldap.conf Check the permissions. # ls -lL
<certpath> If the mode of the file contains a '+', an extended ACL
is present. This is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22571">
+ <title>GEN008300</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37969r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008300</version>
+ <title>If the system is using LDAP for authentication or account information,
the LDAP TLS key file must be owned by root.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. The LDAP
client configuration must be protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32503r1_fix">Change the ownership of the file. #
chown root <keypath></fixtext>
+ <fix id="F-32503r1_fix" />
+ <check system="C-37267r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine the key file. # grep -i '^tls_key'
/etc/ldap.conf Check the ownership. # ls -lL <keypath> If the owner of the
file is not root, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22572">
+ <title>GEN008320</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37971r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008320</version>
+ <title>If the system is using LDAP for authentication or account information,
the LDAP TLS key file must be group-owned by root, bin, or sys.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. The LDAP
client configuration must be protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32505r1_fix">Change the group ownership of the
file. # chgrp root <keypath></fixtext>
+ <fix id="F-32505r1_fix" />
+ <check system="C-37268r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine the key file. # grep -i '^tls_key'
/etc/ldap.conf Check the group ownership. # ls -lL <keypath> If the file is
not group owned by root, bin, or sys, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22573">
+ <title>GEN008340</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37973r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008340</version>
+ <title>If the system is using LDAP for authentication or account information,
the LDAP TLS key file must have mode 0600 or less permissive.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. The LDAP
client configuration must be protected from unauthorized modification. Note: Depending on
the
+ particular implementation, group and other read permission may be necessary for
unprivileged users to successfully resolve account information using LDAP. This will still
be a finding, as these permissions provide users with access to system
+
authenticators.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32506r1_fix">Change the mode of the file. #
chmod 0600 <keypath></fixtext>
+ <fix id="F-32506r1_fix" />
+ <check system="C-37269r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine the key file. # grep -i '^tls_key'
/etc/ldap.conf Check the permissions. # ls -lL <keypath> If the mode of the
file is more permissive than 0600, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22574">
+ <title>GEN008360</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37977r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008360</version>
+ <title>If the system is using LDAP for authentication or account information,
the LDAP TLS key file must not have an extended ACL.</title>
+ <description><VulnDiscussion>LDAP can be used to provide user
authentication and account information, which are vital to system security. The LDAP
client configuration must be protected from unauthorized
+
modification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32509r1_fix">Remove the extended ACL from the
key file. Procedure: For each key file found remove all extended permissions. # setfacl
--remove-all <keypath></fixtext>
+ <fix id="F-32509r1_fix" />
+ <check system="C-37272r3_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine the key file. # grep -i '^tls_key'
/etc/ldap.conf Check the permissions. # ls -lL <keypath> If the permissions
of the file contains a '+', an extended ACL is present. If the file has an
extended ACL and it has not
+ been documented with the IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22575">
+ <title>GEN008380</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37978r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008380</version>
+ <title>A root kit check tool must be run on the system at least
weekly.</title>
+ <description><VulnDiscussion>Root kits are software packages
designed to conceal the compromise of a system from the SA. Root kit checking tools
examine a system for evidence that a root kit is installed. Dedicated root kit detection
software
+ or root kit detection capabilities included in anti-virus packages may be used to
satisfy this
+
requirement.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCSL-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001199</ident>
+ <fixtext fixref="F-32511r1_fix">Create an automated job or
establish a site-defined procedure to check the system weekly with a root kit check
tool.</fixtext>
+ <fix id="F-32511r1_fix" />
+ <check system="C-37274r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Ask the SA if a root kit check tool is run on the system
weekly. If this is not performed, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22576">
+ <title>GEN008420</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37979r1_rule" severity="low"
weight="10.0">
+ <version>GEN008420</version>
+ <title>The system must use available memory address randomization
techniques.</title>
+ <description><VulnDiscussion>Successful exploitation of buffer
overflow vulnerabilities relies in some measure to having a predictable address structure
of the executing program. Address randomization techniques reduce the probability of a
+ successful
+
exploit.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32513r1_fix">Edit the kernel boot parameters, or
"/etc/sysctl.conf", and set exec-shield to "1". Reboot the
system.</fixtext>
+ <fix id="F-32513r1_fix" />
+ <check system="C-37277r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify exec-shield is enabled if present. # cat
/proc/sys/kernel/exec-shield If the file is present and contains a value of "0",
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22577">
+ <title>GEN008440</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37980r1_rule" severity="low"
weight="10.0">
+ <version>GEN008440</version>
+ <title>Automated file system mounting tools must not be enabled unless
needed.</title>
+ <description><VulnDiscussion>Automated file system mounting
tools may provide unprivileged users with the ability to access local media and network
shares. If this access is not necessary for the system’s operation, it must be disabled
to
+ reduce the risk of unauthorized access to these
+
resources.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32515r1_fix">Stop and disable the autofs
service. # service autofs stop # chkconfig autofs off</fixtext>
+ <fix id="F-32515r1_fix" />
+ <check system="C-37278r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If the autofs service is needed, this vulnerability is not
applicable. Check if the autofs service is running. # service autofs status If the service
is running, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22578">
+ <title>GEN008460</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37981r1_rule" severity="low"
weight="10.0">
+ <version>GEN008460</version>
+ <title>The system must have USB disabled unless needed.</title>
+ <description><VulnDiscussion>USB is a common computer
peripheral interface. USB devices may include storage devices with the potential to
install malicious software on a system or exfiltrate
+
data.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32517r1_fix">Edit the grub bootloader file
"/boot/grub/grub.conf" or "/boot/grub/menu.lst" by appending the
"nousb" parameter to the kernel boot line.</fixtext>
+ <fix id="F-32517r1_fix" />
+ <check system="C-37280r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If the system needs USB, this vulnerability is not
applicable. Check if the directory "/proc/bus/usb" exists. If so, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22579">
+ <title>GEN008480</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37982r1_rule" severity="low"
weight="10.0">
+ <version>GEN008480</version>
+ <title>The system must have USB Mass Storage disabled unless
needed.</title>
+ <description><VulnDiscussion>USB is a common computer
peripheral interface. USB devices may include storage devices with the potential to
install malicious software on a system or exfiltrate
+
data</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32519r1_fix">Prevent the usb-storage module from
loading. # echo 'install usb-storage /bin/true' >>
/etc/modprobe.conf</fixtext>
+ <fix id="F-32519r1_fix" />
+ <check system="C-37282r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If the system needs USB storage, this vulnerability is not
applicable. Check if usb-storage is prevented from loading. # grep 'install
usb-storage /bin/true' /etc/modprobe.conf /etc/modprobe.d/* If no results are
returned, this is
+ a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22580">
+ <title>GEN008500</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37983r1_rule" severity="low"
weight="10.0">
+ <version>GEN008500</version>
+ <title>The system must have IEEE 1394 (Firewire) disabled unless
needed.</title>
+ <description><VulnDiscussion>Firewire is a common computer
peripheral interface. Firewire devices may include storage devices with the potential to
install malicious software on a system or exfiltrate
+
data.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32520r1_fix">Prevent the system from loading the
firewire module. # echo 'install ieee1394 /bin/true' >>
/etc/modprobe.conf</fixtext>
+ <fix id="F-32520r1_fix" />
+ <check system="C-37283r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If the system needs IEEE 1394 (Firewire), this is not
applicable. Check if the firewire module is not disabled. # grep 'install ieee1394
/bin/true' /etc/modprobe.conf /etc/modprobe.d/* If no results are returned, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22582">
+ <title>GEN008520</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37984r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008520</version>
+ <title>The system must employ a local firewall.</title>
+ <description><VulnDiscussion>A local firewall protects the
system from exposing unnecessary or undocumented network services to the local enclave. If
a system within the enclave is compromised, firewall protection on an individual system
+ continues to protect it from
+
attack.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001118</ident>
+ <fixtext fixref="F-32522r1_fix">Enable the system's local
firewall. # chkconfig iptables on # service iptables start</fixtext>
+ <fix id="F-32522r1_fix" />
+ <check system="C-37285r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if the system is using a local firewall. #
chkconfig --list iptables If the service is not "on" in the standard runlevel
(ordinarily 3 or 5), this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22583">
+ <title>GEN008540</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37985r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008540</version>
+ <title>The system's local firewall must implement a deny-all,
allow-by-exception policy.</title>
+ <description><VulnDiscussion>A local firewall protects the
system from exposing unnecessary or undocumented network services to the local enclave. If
a system within the enclave is compromised, firewall protection on an individual system
+ continues to protect it from
+
attack.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001109</ident>
+ <fixtext fixref="F-32525r2_fix">Edit
"/etc/sysconfig/iptables" and add a default deny rule. An example of a default
deny rule: -A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited Restart the
iptable service. # service iptables
+ restart</fixtext>
+ <fix id="F-32525r2_fix" />
+ <check system="C-37287r3_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the firewall rules for a default deny rule. # iptables
--list Example of a rule meeting this criteria: REJECT all -- anywhere anywhere
reject-with icmp-host-prohibited A rule using DROP is also acceptable. The default rule
+ should be the last rule of a table and match all traffic. If there is no default
deny rule, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22584">
+ <title>GEN000000-LNX00800</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26978r1_rule" severity="low"
weight="10.0">
+ <version>GEN000000-LNX00800</version>
+ <title>The system must use a Linux Security Module configured to limit the
privileges of system services.</title>
+ <description><VulnDiscussion>Linux Security Modules such as
SELinux and AppArmor can be used to provide protection from software exploits by
explicitly defining the privileges permitted to each software
+
package.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000032</ident>
+ <fixtext fixref="F-31279r1_fix">Enable one of the SELinux
prolicies. Edit /etc/sysconfig/selinux and set the value of the SELINUX option to
"enforcing" and SELINUXTYPE to "targeted" or "strict".
Restart the system.</fixtext>
+ <fix id="F-31279r1_fix" />
+ <check system="C-36036r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check if SELinux is enabled with at least a
"targeted" policy. # grep ^SELINUX /etc/sysconfig/selinux If the SELINUX option
is not set to "enforcing", this is a finding. If the SELINUXTYPE option is not
set to "targeted" or
+ "strict", this is a finding. If the use of the system is incompatible
with the confines of SELinux this rule may be waived.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22585">
+ <title>GEN008740</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26984r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008740</version>
+ <title>The system's boot loader configuration file(s) must not have
extended ACLs.</title>
+ <description><VulnDiscussion>File system extended ACLs provide
access to files beyond what is allowed by the mode numbers of the files. If extended ACLs
are present on the system's boot loader configuration file(s), these files may be
+ vulnerable to unauthorized access or modification, which could compromise the
system's boot
+
process.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-24248r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/grub.conf</fixtext>
+ <fix id="F-24248r1_fix" />
+ <check system="C-37229r3_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the file. # ls -lL
/boot/grub/grub.conf If the permissions of the file or directory contains a '+',
an extended ACL is present. This is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22586">
+ <title>GEN008760</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26986r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008760</version>
+ <title>The system's boot loader configuration files must be owned by
root.</title>
+ <description><VulnDiscussion>The system's boot loader
configuration files are critical to the integrity of the system and must be protected.
Unauthorized modification of these files resulting from improper ownership could
compromise the
+ system's boot loader
+
configuration.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32438r1_fix">Change the ownership of the file. #
chown root /boot/grub/grub.conf</fixtext>
+ <fix id="F-32438r1_fix" />
+ <check system="C-37231r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the ownership of the file. # ls -lLd
/boot/grub/grub.conf If the owner of the file is not root, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22587">
+ <title>GEN008780</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26988r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008780</version>
+ <title>The system's boot loader configuration file(s) must be group-owned
by root, bin, sys, or system.</title>
+ <description><VulnDiscussion>The system's boot loader
configuration files are critical to the integrity of the system and must be protected.
Unauthorized modifications resulting from improper group ownership may compromise the boot
loader
+
configuration.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32443r1_fix">Change the group ownership of the
file. # chgrp root /boot/grub/grub.conf</fixtext>
+ <fix id="F-32443r1_fix" />
+ <check system="C-37240r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the file. # ls -lLd
/boot/grub/grub.conf If the group-owner of the file is not root, bin, sys, or system this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22588">
+ <title>GEN008800</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26990r1_rule" severity="low"
weight="10.0">
+ <version>GEN008800</version>
+ <title>The system package management tool must cryptographically verify the
authenticity of software packages during installation.</title>
+ <description><VulnDiscussion>To prevent the installation of
software from unauthorized sources, the system package management tool must use
cryptographic algorithms to verify the packages are
+
authentic.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000351</ident>
+ <fixtext fixref="F-24256r1_fix">Edit the RPM configuration file
containing the "nosignature" option and remove the option. Edit the YUM
configuration containing "gpgcheck=0" and set the value to
"1".</fixtext>
+ <fix id="F-24256r1_fix" />
+ <check system="C-27933r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify RPM signature validation is not disabled. # grep
nosignature /etc/rpmrc /usr/lib/rpm/rpmrc /usr/lib/rpm/redhat/rpmrc ~root/.rpmrc If any
configuration is found, this is a finding. Verify YUM signature validation is not
+ disabled. # grep gpgcheck /etc/yum.conf /etc/yum.repos.d/* If any
"gpgcheck" setting is returned that is not equal to "1", this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22589">
+ <title>GEN008820</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26992r1_rule" severity="low"
weight="10.0">
+ <version>GEN008820</version>
+ <title>The system package management tool must not automatically obtain
updates.</title>
+ <description><VulnDiscussion>System package management tools
can obtain a list of updates and patches from a package repository and make this
information available to the SA for review and action. Using a package repository outside
of the
+ organization's control presents a risk of malicious packages being
+
introduced.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001233</ident>
+ <fixtext fixref="F-24258r1_fix">Disable the yum service. #
chkconfig yum-updatesd off ; service yum-updatesd stop</fixtext>
+ <fix id="F-24258r1_fix" />
+ <check system="C-27935r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the YUM service is enabled. # service yum-updatesd
status If the service is enabled, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22595">
+ <title>GEN000000-LNX00450</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26998r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX00450</version>
+ <title>The access.conf file must not have an extended ACL.</title>
+ <description><VulnDiscussion>If the access permissions are more
permissive than 0640, system security could be
+
compromised.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-24264r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/security/access.conf</fixtext>
+ <fix id="F-24264r1_fix" />
+ <check system="C-35941r3_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the file. # ls -lL
/etc/security/access.conf If the permissions of the file or directory contain a
'+', an extended ACL is present. If the file has an extended ACL and it has not
been documented with the
+ IAO, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22596">
+ <title>GEN000000-LNX00530</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-26999r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000000-LNX00530</version>
+ <title>The /etc/sysctl.conf file must not have an extended
ACL.</title>
+ <description><VulnDiscussion>The sysctl.conf file specifies the
values for kernel parameters to be set on boot. These settings can affect the
system's
+
security.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-24265r1_fix">Remove the extended ACL from the
file. # setfacl --remove-all /etc/sysctl.conf</fixtext>
+ <fix id="F-24265r1_fix" />
+ <check system="C-35992r3_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the permissions of the file. # ls -lL /etc/sysctl.conf
If the permissions of the file or directory contain a '+', an extended ACL is
present. If the file has an extended ACL and it has not been documented with the IAO,
this
+ is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22598">
+ <title>GEN000000-LNX00720</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27001r1_rule" severity="low"
weight="10.0">
+ <version>GEN000000-LNX00720</version>
+ <title>Auditing must be enabled at boot by setting a kernel
parameter.</title>
+ <description><VulnDiscussion>If auditing is enabled late in the
boot process, the actions of startup scripts may not be audited. Some audit systems also
maintain state information only available if auditing is enabled before a given process
+ is
+
created.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000032</ident>
+ <fixtext fixref="F-31278r1_fix">Edit the grub bootloader file
/boot/grub/grub.conf or /boot/grub/menu.lst by appending the "audit=1" parameter
to the kernel boot line. Reboot the system for the change to take effect.</fixtext>
+ <fix id="F-31278r1_fix" />
+ <check system="C-36032r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for the audit=1 kernel parameter. # grep
'audit=1' /proc/cmdline If no results are returned, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22665">
+ <title>GEN005590</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37926r1_rule" severity="medium"
weight="10.0">
+ <version>GEN005590</version>
+ <title>The system must not be running any routing protocol daemons, unless
the system is a router.</title>
+ <description><VulnDiscussion>Routing protocol daemons are
typically used on routers to exchange network topology information with other routers. If
this software is used when not required, system network information may be unnecessarily
+ transmitted across the
+
network.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-32420r1_fix">Disable any routing protocol
daemons.</fixtext>
+ <fix id="F-32420r1_fix" />
+ <check system="C-37168r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for any running routing protocol daemons. If the
system is a VM host and acts as a router solely for the benefits of its client systems,
then this rule is not applicable. # chkconfig --list |grep :on|egrep
+ '(ospf|route|bgp|zebra|quagga)' If any routing protocal daemons are
listed, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-22702">
+ <title>GEN002690</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37914r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002690</version>
+ <title>System audit logs must be group-owned by root, bin, sys, or
system.</title>
+ <description><VulnDiscussion>Sensitive system and user
information could provide a malicious user with enough information to penetrate further
into the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECLP-1,
ECTP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000162</ident>
+ <ident
system="http://iase.disa.mil/cci">CCI-000163</ident>
+ <fixtext fixref="F-24520r1_fix">Change the group ownership of the
audit log file(s). Procedure: # chgrp root <audit log file></fixtext>
+ <fix id="F-24520r1_fix" />
+ <check system="C-37140r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the group ownership of the audit logs. Procedure: #
grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs stat -c %G:%n If
any audit log file is not group-owned by root, bin, sys, or system, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-23732">
+ <title>GEN000410</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-28606r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000410</version>
+ <title>The FTPS/FTP service on the system must be configured with the
Department of Defense (DoD) login banner.</title>
+ <description><VulnDiscussion>Failure to display the logon
banner prior to a logon attempt will negate legal proceedings resulting from unauthorized
access to system resources. Note: SFTP and FTPS are encrypted alternatives to FTP to be
used
+ in place of FTP. SFTP is implemented by the SSH service and uses its banner
+
configuration.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECWM-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000048</ident>
+ <fixtext fixref="F-25878r2_fix">Provide the proper text for the DoD
banner to be presented by the FTP server to the user. For vsftp: Examine the
/etc/vsftp.conf file for the "banner_file" entry. (i.e. banner_file =
/etc/banner/vsftp) For gssftp:
+ Examine the /etc/xinetd.d/gssftp file for the "banner" entry. (i.e.
banner = /etc/banner/gssftp) For both: Add the banner entry if one is not found. Modify or
create the referenced banner file to contain one of the following DoD login banners
+ (based on the character limitations imposed by the system). DoD Login Banners: You
are accessing a U.S. Government (USG) Information System (IS) that is provided for
USG-authorized use only. By using this IS (which includes any device attached to
+ this IS), you consent to the following conditions: -The USG routinely intercepts
and monitors communications on this IS for purposes including, but not limited to,
penetration testing, COMSEC monitoring, network operations and defense, personnel
+ misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.
-At any time, the USG may inspect and seize data stored on this IS. -Communications using,
or data stored on, this IS are not private, are subject to routine
+ monitoring, interception, and search, and may be disclosed or used for any
USG-authorized purpose. -This IS includes security measures (e.g., authentication and
access controls) to protect USG interests--not for your personal benefit or privacy.
+ -Notwithstanding the above, using this IS does not constitute consent to PM, LE or
CI investigative searching or monitoring of the content of privileged communications, or
work product, related to personal representation or services by attorneys,
+ psychotherapists, or clergy, and their assistants. Such communications and work
product are private and confidential. See User Agreement for details. OR I've read
& consent to terms in IS user agreem't.</fixtext>
+ <fix id="F-25878r2_fix" />
+ <check system="C-35878r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>FTP to the system. # ftp localhost Check for either of the
following login banners based on the character limitations imposed by the system. An exact
match is required. If one of these banners is not displayed, this is a finding.
+ If the system does not run the FTP service, this is not applicable. DoD Login
Banners: You are accessing a U.S. Government (USG) Information System (IS) that is
provided for USG-authorized use only. By using this IS (which includes any device
+ attached to this IS), you consent to the following conditions: -The USG routinely
intercepts and monitors communications on this IS for purposes including, but not limited
to, penetration testing, COMSEC monitoring, network operations and
+ defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence
(CI) investigations. -At any time, the USG may inspect and seize data stored on this IS.
-Communications using, or data stored on, this IS are not private, are
+ subject to routine monitoring, interception, and search, and may be disclosed or
used for any USG-authorized purpose. -This IS includes security measures (e.g.,
authentication and access controls) to protect USG interests--not for your personal
+ benefit or privacy. -Notwithstanding the above, using this IS does not constitute
consent to PM, LE or CI investigative searching or monitoring of the content of privileged
communications, or work product, related to personal representation or
+ services by attorneys, psychotherapists, or clergy, and their assistants. Such
communications and work product are private and confidential. See User Agreement for
details. OR I've read & consent to terms in IS user
agreem't.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-23736">
+ <title>GEN003621</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37641r1_rule" severity="low"
weight="10.0">
+ <version>GEN003621</version>
+ <title>The system must use a separate file system for /var.</title>
+ <description><VulnDiscussion>The use of separate file systems
for different paths can protect the system from failures resulting from a file system
becoming full or
+
failing.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001208</ident>
+ <fixtext fixref="F-31676r1_fix">Migrate the /var path onto a
separate file system.</fixtext>
+ <fix id="F-31676r1_fix" />
+ <check system="C-36839r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if the /var path is a separate filesystem. # grep
/var /etc/fstab If no result is returned, /var is not on a separate filesystem this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-23738">
+ <title>GEN003623</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37642r1_rule" severity="low"
weight="10.0">
+ <version>GEN003623</version>
+ <title>The system must use a separate file system for the system audit data
path.</title>
+ <description><VulnDiscussion>The use of separate file systems
for different paths can protect the system from failures resulting from a file system
becoming full or
+
failing.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001208</ident>
+ <fixtext fixref="F-31677r1_fix">Migrate the /var/log/audit path
onto a separate filesystem.</fixtext>
+ <fix id="F-31677r1_fix" />
+ <check system="C-36840r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if the /var/log/audit path is a separate
filesystem. # grep /var/log/audit /etc/fstab If no result is returned, /var/log/audit is
not on a separate filesystem this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-23739">
+ <title>GEN003624</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37395r1_rule" severity="low"
weight="10.0">
+ <version>GEN003624</version>
+ <title>The system must use a separate file system for /tmp (or
equivalent).</title>
+ <description><VulnDiscussion>The use of separate file systems
for different paths can protect the system from failures resulting from a file system
becoming full or
+
failing.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001208</ident>
+ <fixtext fixref="F-31325r1_fix">Migrate the /tmp path onto a
separate file system.</fixtext>
+ <fix id="F-31325r1_fix" />
+ <check system="C-36078r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if the /tmp path is a separate filesystem. # egrep
"[\t ]/tmp[\t ]" /etc/fstab If no result is returned, /tmp is not on a separate
filesystem this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-23741">
+ <title>GEN003601</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37594r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003601</version>
+ <title>TCP backlog queue sizes must be set appropriately.</title>
+ <description><VulnDiscussion>To provide some mitigation to TCP
Denial of Service attacks, the TCP backlog queue sizes must be set to at least 1280 or in
accordance with product-specific
+
guidelines.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-31631r1_fix">Edit /etc/sysctl.conf and add a
setting for "net.ipv4.tcp_max_syn_backlog=1280". Procedure: # sysctl
-p</fixtext>
+ <fix id="F-31631r1_fix" />
+ <check system="C-36673r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content># cat /proc/sys/net/ipv4/tcp_max_syn_backlog If the result
is not 1280 or greater, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-23952">
+ <title>GEN004710</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37514r1_rule" severity="medium"
weight="10.0">
+ <version>GEN004710</version>
+ <title>Mail relaying must be restricted.</title>
+ <description><VulnDiscussion>If unrestricted mail relaying is
permitted, unauthorized senders could use this host as a mail relay for the purpose of
sending SPAM or other unauthorized
+
activity.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-001305</ident>
+ <fixtext fixref="F-31424r1_fix">If the system uses sendmail, edit
the sendmail.mc file and remove the "promiscuous_relay" configuration. Rebuild
the sendmail.cf file from the modified sendmail.mc and restart the service. If the system
does not need
+ to receive mail from external hosts, add one or more DaemonPortOptions lines
referencing system loopback addresses (such as "O
DaemonPortOptions=Addr=127.0.0.1,Port=smtp,Name=MTA") and remove lines containing
non-loopback addresses. Restart the
+ service. If the system uses Postfix, edit the main.cf file and add or edit the
"smtpd_client_restrictions" line to have contents "permit mynetworks,
reject" or a similarly restrictive rule. If the system does not need to receive mail
from external
+ hosts, add or edit the "inet_interfaces" line to have contents
"loopback-only" or a set of loopback addresses for the system. Restart the
service. If the system is using other SMTP software, consult the software's
documentation for procedures to
+ restrict mail relaying.</fixtext>
+ <fix id="F-31424r1_fix" />
+ <check system="C-36173r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>If the system uses sendmail examine the configuration files.
Determine if sendmail only binds to loopback addresses by examining the
"DaemonPortOptions" configuration options. Procedure: # grep -i "O
DaemonPortOptions"
+ /etc/mail/sendmail.cf If there are uncommented DaemonPortOptions lines, and all
such lines specify system loopback addresses, this is not a finding. Otherwise, determine
if sendmail is configured to allow open relay operation. Procedure: # grep
+ -i promiscuous_relay /etc/mail/sendmail.mc If the promiscuous relay feature is
enabled, this is a finding. If the system uses Postfix, locate the main.cf file.
Procedure: # find / -name main.cf Determine if Postfix only binds to loopback
+ addresses by examining the "inet_interfaces" line. Procedure: # grep
inet_interfaces </path/to/main.cf> If "inet_interfaces" is set to
"loopback-only" or contains only loopback addresses such as 127.0.0.1 and [::1],
Postfix is not listening
+ on external network interfaces, and this is not a finding. Otherwise, determine
if Postfix is configured to restrict clients permitted to relay mail by examining the
"smtpd_client_restrictions" line. Procedure: # grep smtpd_client_restrictions
+ </path/to/main.cf> If the "smtpd_client_restrictions"
line is missing, or does not contain "reject", this is a finding. If the line
contains "permit" before "reject", this is a finding. If the system is
using other SMTP software, consult
+ the software's documentation for procedures to verify mail relaying is
restricted.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-23953">
+ <title>GEN007960</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37621r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007960</version>
+ <title>The 'ldd' command must be disabled unless it protects against
the execution of untrusted files.</title>
+ <description><VulnDiscussion>The 'ldd' command provides
a list of dependent libraries needed by a given binary, which is useful for
troubleshooting software. Instead of parsing the binary file, some 'ldd'
implementations invoke the program
+ with a special environment variable set, which causes the system dynamic linker to
display the list of libraries. Specially crafted binaries can specify an alternate dynamic
linker which may cause a program to be executed instead of examined. If
+ the program is from an untrusted source, such as in a user home directory, or a
file suspected of involvement in a system compromise, unauthorized software may be
executed with the rights of the user running 'ldd'. Some 'ldd'
implementations
+ include protections that prevent the execution of untrusted files. If such
protections exist, this requirement is not applicable. An acceptable method of disabling
'ldd' is changing its mode to 0000. The SA may conduct troubleshooting by
+ temporarily changing the mode to allow execution and running the 'ldd'
command as an unprivileged user upon trusted system
+
binaries.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000305</ident>
+ <fixtext fixref="F-31658r1_fix">Remove the execute permissions from
the 'ldd' executable. Procedure: # chmod a-x /usr/bin/ldd</fixtext>
+ <fix id="F-31658r1_fix" />
+ <check system="C-36820r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system for the 'ldd' executable.
Procedure: # ls -lL /usr/bin/ldd If the returned line is set to "yes", this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-23972">
+ <title>GEN007950</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-29788r1_rule" severity="medium"
weight="10.0">
+ <version>GEN007950</version>
+ <title>The system must not respond to ICMPv6 echo requests sent to a
broadcast address.</title>
+ <description><VulnDiscussion>Responding to broadcast ICMP echo
requests facilitates network mapping and provides a vector for amplification
+
attacks.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000366</ident>
+ <fixtext fixref="F-26899r1_fix">Add an iptables rule that drops
inbound IPv6 ICMP ECHO_REQUESTs sent to the all-hosts multicast address. Edit
/etc/sysconfig/ip6tables and add a rule in, or referenced by, the INPUT chain such as: -A
INPUT -p icmpv6
+ -d ff02::1 --icmpv6-type 128 -j DROP Reload the iptables rules. Procedure: #
service ip6tables restart</fixtext>
+ <fix id="F-26899r1_fix" />
+ <check system="C-30069r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for an iptables rule that drops inbound IPv6 ICMP
ECHO_REQUESTs sent to the all-hosts multicast address. Procedure: # less
/etc/sysconfig/ip6tables Check for a rule in, or referenced by, the INPUT chain such as:
-A INPUT -p
+ icmpv6 -d ff02::1 --icmpv6-type 128 -j DROP If such a rule does not exist, this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-24331">
+ <title>GEN000402</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37171r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000402</version>
+ <title>The Department of Defense (DoD) login banner must be displayed
immediately prior to, or as part of, graphical desktop environment login
prompts.</title>
+ <description><VulnDiscussion>Failure to display the logon
banner prior to a logon attempt will negate legal proceedings resulting from unauthorized
access to system resources. This requirement applies to graphical desktop environments
+ provided by the system to locally attached displays and input devices as well as to
graphical desktop environments provided to remote systems, including thin
+
clients.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECWM-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000048</ident>
+ <fixtext fixref="F-31131r1_fix">Configure the system to display one
of the DoD login banners prior to, or as part of, the graphical desktop environment login
process. Procedure: Modify /usr/share/gdm/themes/RHEL/RHEL.xml by adding the following
xml
+ after the first two "pixmap" entries. <item type="rect"
id="custom-dod-banner"> <pos anchor="nw"
x="20%" y="10" width="80%" height="100%"/>
<box> <item type="label"> <normal
font="Sans Bold 9" color="#ffffff"/>
+ <text> Insert the "approved text" here based on the
character limitations imposed by the system. </text> </item>
</box> </item> Approved text: DoD Login Banners: You are
accessing a U.S. Government (USG) Information
+ System (IS) that is provided for USG-authorized use only. By using this IS (which
includes any device attached to this IS), you consent to the following conditions: -The
USG routinely intercepts and monitors communications on this IS for purposes
+ including, but not limited to, penetration testing, COMSEC monitoring, network
operations and defense, personnel misconduct (PM), law enforcement (LE), and
counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data
+ stored on this IS. -Communications using, or data stored on, this IS are not
private, are subject to routine monitoring, interception, and search, and may be disclosed
or used for any USG-authorized purpose. -This IS includes security measures
+ (e.g., authentication and access controls) to protect USG interests--not for your
personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute
consent to PM, LE or CI investigative searching or monitoring of the
+ content of privileged communications, or work product, related to personal
representation or services by attorneys, psychotherapists, or clergy, and their
assistants. Such communications and work product are private and confidential. See User
+ Agreement for details. OR I've read & consent to terms in IS user
agreem't.</fixtext>
+ <fix id="F-31131r1_fix" />
+ <check system="C-35876r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Access the graphical desktop environment(s) provided by the
system and attempt to log in. Check for either of the following login banners based on the
character limitations imposed by the system. An exact match is required. If one
+ of these banners is not displayed, this is a finding. You are accessing a U.S.
Government (USG) Information System (IS) that is provided for USG-authorized use only. By
using this IS (which includes any device attached to this IS), you consent to
+ the following conditions: -The USG routinely intercepts and monitors
communications on this IS for purposes including, but not limited to, penetration testing,
COMSEC monitoring, network operations and defense, personnel misconduct (PM), law
+ enforcement (LE), and counterintelligence (CI) investigations. -At any time, the
USG may inspect and seize data stored on this IS. -Communications using, or data stored
on, this IS are not private, are subject to routine monitoring, interception,
+ and search, and may be disclosed or used for any USG-authorized purpose. -This IS
includes security measures (e.g., authentication and access controls) to protect USG
interests- -not for your personal benefit or privacy. -Notwithstanding the
+ above, using this IS does not constitute consent to PM, LE or CI investigative
searching or monitoring of the content of privileged communications, or work product,
related to personal representation or services by attorneys, psychotherapists, or
+ clergy, and their assistants. Such communications and work product are private
and confidential. See User Agreement for details. OR I've read & consent to
terms in IS user agreem't.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-24347">
+ <title>GEN009120</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-30004r1_rule" severity="medium"
weight="10.0">
+ <version>GEN009120</version>
+ <title>The system, if capable, must be configured to require the use of a
CAC, PIV compliant hardware token, or Alternate Logon Token (ALT) for
authentication.</title>
+ <description><VulnDiscussion>In accordance with CTO 07-015 PKI
authentication is required. This provides stronger, two-factor authentication than using a
username/password. NOTE: The following are exempt from this, however, they must meet all
+ password requirements and must be documented with the IAO: - SIPRNET systems. -
Stand-alone systems. - Application Accounts. - Students or unpaid employees (such as,
interns) who are not eligible to receive or not in receipt of a CAC, PIV, or ALT.
+ - Warfighters and support personnel located at operational tactical locations
conducting wartime operations that are not collocated with RAPIDS workstations to issue
CAC; are not eligible for CAC or do not have the capability to use ALT. - Test
+ systems that have an Interim Approval to Test (IATT) and provide protection via
separate VPN, firewall, or security measures preventing access to network and system
components from outside the protection boundary documented in the
+
IATT.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000768</ident>
+ <fixtext fixref="F-27447r1_fix">Consult vendor documentation to
determine the procedures necessary for configuring CAC authentication. Configure all
accounts required by policy to use CAC authentication.</fixtext>
+ <fix id="F-27447r1_fix" />
+ <check system="C-30833r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Consult vendor documentation to determine if the system is
capable of CAC authentication. If it is not, this is not applicable. Interview the SA to
determine if all accounts not exempted by policy are using CAC authentication. If
+ non-exempt accounts are not using CAC authentication, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-24357">
+ <title>GEN002870</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37948r1_rule" severity="low"
weight="10.0">
+ <version>GEN002870</version>
+ <title>The system must be configured to send audit records to a remote audit
server.</title>
+ <description><VulnDiscussion>Audit records contain evidence
that can be used in the investigation of compromised systems. To prevent this evidence
from compromise, it must be sent to a separate system continuously. Methods for sending
audit
+ records include, but are not limited to, system audit tools used to send logs
directly to another host or through the system's syslog service to another host.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECTB-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000136</ident>
+ <fixtext fixref="F-32440r1_fix">Configure the system to send audit
records to a remote server. Procedure: These instructions assume a known remote audit
server is available to this system. Modify /etc/syslog.conf to contain a line sending all
audit
+ records to a remote audit server. The server is specified by placing an
"@" before the DNS name or IP address in the line. *.* @<remote audit
server> Edit the "active" line in /etc/audisp/plugins.d/syslog.conf so it
shows "active = yes".
+ Restart audit and syslog: # service auditd restart # service syslog
restart</fixtext>
+ <fix id="F-32440r1_fix" />
+ <check system="C-37233r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the system is configured to forward all audit records
to a remote server. If the system is not configured to provide this function, this is a
finding. Procedure: Ensure the audit option for the kernel is enabled. # grep
+ "audit" /boot/grub/grub.conf If the kernel does not have the
"audit=1" option specified, this is a finding. Ensure the kernel auditing is
active. # grep "active" /etc/audisp/plugins.d/syslog.conf If the
"active" setting is either missing or not
+ set to "yes", this is a finding. Ensure all audit records are forwarded
to a remote server. # grep "\*.\*" /etc/syslog.conf |grep "@" (for
syslog) or: # grep "\*.\*" /etc/rsyslog.conf | grep "@" (for rsyslog)
If neither of these lines exist, it
+ is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-24384">
+ <title>GEN008050</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37643r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008050</version>
+ <title>If the system is using LDAP for authentication or account information,
the /etc/ldap.conf file (or equivalent) must not contain passwords.</title>
+ <description><VulnDiscussion>The authentication of automated
LDAP connections between systems must not use passwords since more secure methods are
available, such as PKI and Kerberos. Additionally, the storage of unencrypted passwords on
the
+ system is not
+
permitted.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000196</ident>
+ <fixtext fixref="F-31678r1_fix">Edit the "/etc/ldap.conf"
file to use anonymous binding by removing the "bindpw" option.</fixtext>
+ <fix id="F-31678r1_fix" />
+ <check system="C-36837r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check for the "bindpw" option being used in the
"/etc/ldap.conf" file. # grep bindpw /etc/ldap.conf If an uncommented
"bindpw" option is returned then a cleartext password is in the file, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-24386">
+ <title>GEN003850</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37444r1_rule" severity="high"
weight="10.0">
+ <version>GEN003850</version>
+ <title>The telnet daemon must not be running.</title>
+ <description><VulnDiscussion>The telnet daemon provides a
typically unencrypted remote access service which does not provide for the confidentiality
and integrity of user passwords or the remote session. If a privileged user were to log
on
+ using this service, the privileged user password could be
+
compromised.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations>GEN003850</Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl>If
+ an enabled telnet daemon is configured to only allow encrypted sessions, such as
with Kerberos or the use of encrypted network tunnels, the risk of exposing sensitive
information is mitigated, and this is not a
+ finding.</MitigationControl><Responsibility>System
Administrator</Responsibility><IAControls>DCPP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000197</ident>
+ <fixtext fixref="F-31362r2_fix">Identify the telnet service running
and disable it. Procedure: Disable the telnet server. # chkconfig telnet off Verify the
telnet daemon is no longer running. # ps -ef |grep telnet</fixtext>
+ <fix id="F-31362r2_fix" />
+ <check system="C-36116r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>The telnet service included in the RHEL distribution is part
of krb5-workstation. There are two versions of telnetd server provided. The xinetd.d file
ekrb5-telnet allows only connections authenticated through kerberos. The
+ xinetd.d krb5-telnet allows normal telnet connections as well as kerberized
connections. Both are set to "disable = yes" by default. Ensure that neither is
running. Procedure: Check if telnetd is running: # ps -ef |grep telnetd If the telnet
+ daemon is running, this is a finding. Check if telnetd is enabled on startup: #
chkconfig --list|grep telnet If an entry with "on" is found, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-24624">
+ <title>GEN008710</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37938r1_rule" severity="medium"
weight="10.0">
+ <version>GEN008710</version>
+ <title>The system boot loader must protect passwords using an MD5 or stronger
cryptographic hash.</title>
+ <description><VulnDiscussion>If system boot loader passwords
are compromised, users with console access to the system may be able to alter the system
boot configuration or boot the system into single user or maintenance mode, which could
+ result in Denial of Service or unauthorized privileged access to the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000213</ident>
+ <fixtext fixref="F-27516r1_fix">Consult vendor documentation for
procedures concerning the system's boot loader. Configure the boot loader to hash boot
loader passwords using MD5 or a stronger hash.</fixtext>
+ <fix id="F-27516r1_fix" />
+ <check system="C-37206r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check GRUB for password configuration. Procedure: Check the
/boot/grub/grub.conf or /boot/grub/menu.lst files. # grep "password"
/boot/grub/grub.conf /boot/grub/menu.lst Check for a password configuration line, such as:
password
+ --md5 <password-hash> If the boot loader passwords are not
protected using an MD5 hash or stronger, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-27250">
+ <title>GEN000140-2</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-34549r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000140-2</version>
+ <title>A file integrity baseline including cryptographic hashes must be
created.</title>
+ <description><VulnDiscussion>A file integrity baseline is a
collection of file metadata which is to evaluate the integrity of the system. A minimal
baseline must contain metadata for all device files, setuid files, setgid files, system
+ libraries, system binaries, and system configuration files. The minimal metadata
must consist of the mode, owner, group owner, and modification times. For regular files,
metadata must also include file size and a cryptographic hash of the file’s
+ contents.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCSW-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000293</ident>
+ <fixtext fixref="F-32799r2_fix">Use AIDE to create a file integrity
baseline, including cryptographic hashes, for the system. Configure the /etc/aide.conf
file to ensure some form of cryptographic hash (ie. md5,rmd168,sha256) is used for files.
In
+ the default /etc/aide.conf the "NORMAL" or "LSPP" rules which
are used for virtually all files DO include some form of cryptographic
hash.</fixtext>
+ <fix id="F-32799r2_fix" />
+ <check system="C-37553r3_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify a system integrity baseline exists. The Advanced
Intrusion Detection Environment (AIDE) is included in the distribution of RHEL. Other host
intrusion detection system (HIDS) software is available but must be checked
+ manually. Procedure: # grep DBDIR /etc/aide.conf If /etc/aide.conf does not exist
AIDE has not been installed. Unless another HIDS is used on the system, this is a finding.
Examine the response for "database" this indicates the location of the
+ system integrity baseline database used as input to a comparison. # ls -la
<DBDIR> If no "database" file as defined in /etc/aide.conf exists
a system integrity baseline has not been created, this is a finding. Examine
/etc/aide.conf to
+ ensure some form of cryptographic hash (i.e. md5,rmd168,sha256) is used for
files. In the default /etc/aide.conf the "NORMAL" or "LSPP" rules
which are used for virtually all files DO include some form of cryptographic hash. If the
site has
+ defined rules to replace the functionality provided by the default
"NORMAL" and "LSPP" rules but DOES NOT include cryptographic hashes,
this is a finding. Otherwise, if any element used to define the "NORMAL" and
"LSPP" rules has been modified
+ resulting in cryptographic hashes not being used, this is a finding. If any other
modification to the default /etc/aide.conf file have been made resulting in rules which do
not include cryptographic hashes on appropriate files, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-27251">
+ <title>GEN000140-3</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-34550r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000140-3</version>
+ <title>A file integrity baseline including cryptographic hashes must be
maintained.</title>
+ <description><VulnDiscussion>A file integrity baseline is a
collection of file metadata which is to evaluate the integrity of the system. A minimal
baseline must contain metadata for all device files, setuid files, setgid files, system
+ libraries, system binaries, and system configuration files. The minimal metadata
must consist of the mode, owner, group owner, and modification times. For regular files,
metadata must also include file size and a cryptographic hash of the file’s
+ contents.
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>DCSW-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000293</ident>
+ <fixtext fixref="F-32808r1_fix">Regularly rebuild the integrity
baseline, including cryptographic hashes, for the system to be consistent with the latest
approved system configuration. Procedure: After an approved modification to the system
+ configuration has been made perform: # aide -u This will update the
database.</fixtext>
+ <fix id="F-32808r1_fix" />
+ <check system="C-37565r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify a system integrity baseline is maintained. The
baseline has been updated to be consistent with the latest approved system configuration
changes. The Advanced Intrusion Detection Environment (AIDE) is included in the
+ distribution of RHEL-5. Other host intrusion detection system (HIDS) software is
available but must be checked manually. Procedure: # grep DBDIR /etc/aide.conf If
/etc/aide.conf does not exist AIDE has not been installed. Unless another HIDS is
+ used on the system, this is a finding. Examine the response for
"database" indicates the location of the system integrity baseline database used
as input to a comparison. # ls -la <DBDIR> If the no "database"
file as defined in
+ /etc/aide.conf a system integrity baseline has not been created, this is a
finding. Ask the SA when the last approved system configuration changes occurred. If the
modification date of the AIDE database is prior to the last approved configuration
+ change, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-27275">
+ <title>GEN000290-2</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-34574r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000290-2</version>
+ <title>The system must not have the unnecessary "news"
account.</title>
+ <description><VulnDiscussion>Accounts that provide no
operational purpose provide additional opportunities for system compromise. Unnecessary
accounts include user accounts for individuals not requiring access to the system and
application
+ accounts for applications not installed on the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>IAAC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000012</ident>
+ <fixtext fixref="F-33038r1_fix">Remove the "news" account
from the /etc/passwd file before connecting a system to the network.</fixtext>
+ <fix id="F-33038r1_fix" />
+ <check system="C-37783r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system for the unnecessary "news"
accounts. Procedure: # rpm -q inn If the "inn" is installed the "news"
user is necessary and this is not a finding. # grep ^news /etc/passwd If this account
exists and "inn" is not
+ installed, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-27276">
+ <title>GEN000290-3</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-34575r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000290-3</version>
+ <title>The system must not have the unnecessary "gopher"
account.</title>
+ <description><VulnDiscussion>Accounts that provide no
operational purpose provide additional opportunities for system compromise. Unnecessary
accounts include user accounts for individuals not requiring access to the system and
application
+ accounts for applications not installed on the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>IAAC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000012</ident>
+ <fixtext fixref="F-33039r1_fix">Remove the "gopher"
account from the /etc/passwd file before connecting a system to the
network.</fixtext>
+ <fix id="F-33039r1_fix" />
+ <check system="C-37784r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system for the unnecessary "gopher"
accounts. Procedure: # grep ^gopher /etc/passwd If this account exists, it is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-27279">
+ <title>GEN000290-4</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-34578r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000290-4</version>
+ <title>The system must not have the unnecessary "ftp"
account.</title>
+ <description><VulnDiscussion>Accounts that provide no
operational purpose provide additional opportunities for system compromise. Unnecessary
accounts include user accounts for individuals not requiring access to the system and
application
+ accounts for applications not installed on the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>IAAC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000012</ident>
+ <fixtext fixref="F-33040r1_fix">Remove the "ftp" account
from the /etc/passwd file before connecting a system to the network.</fixtext>
+ <fix id="F-33040r1_fix" />
+ <check system="C-37785r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system for the unnecessary "ftp"
accounts. Procedure: # rpm -q krb5-workstation An ftp server is part of
"krb5-workstation". If it is installed the "ftp" user is necessary and
this is not a finding. # rpm -q vsftp If the
+ "vsftp" ftp server is installed the "ftp" user is necessary
and this is not a finding. # grep ^ftp /etc/passwd If this account exists and no ftp
server is installed which requires it, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-27283">
+ <title>GEN000500-2</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-34582r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000500-2</version>
+ <title>The graphical desktop environment must set the idle timeout to no more
than 15 minutes.</title>
+ <description><VulnDiscussion>If graphical desktop sessions do
not lock the session after 15 minutes of inactivity, requiring re-authentication to resume
operations, the system or individual data could be compromised by an alert intruder who
+ could exploit the oversight. This requirement applies to graphical desktop
environments provided by the system to locally attached displays and input devices as well
as to graphical desktop environments provided to remote systems, including thin
+
clients.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>PESL-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000057</ident>
+ <fixtext fixref="F-33041r1_fix">For the Gnome screen saver, set
idle_delay to 15. Procedure: # gconftool-2 --direct --config-source
xml:readwrite:/etc/gconf/gconf.xml.mandatory --type int --set
/apps/gnome-screensaver/idle_delay 15</fixtext>
+ <fix id="F-33041r1_fix" />
+ <check system="C-37786r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>For the Gnome screen saver, check the idle_delay setting.
Procedure: # gconftool-2 --direct --config-source
xml:readwrite:/etc/gconf/gconf.xml.mandatory --get /apps/gnome-screensaver/idle_delay If
this does not return 15 or less,
+ this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-27284">
+ <title>GEN000500-3</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-34583r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000500-3</version>
+ <title>Graphical desktop environments provided by the system must have
automatic lock enabled.</title>
+ <description><VulnDiscussion>If graphical desktop sessions do
not lock the session after 15 minutes of inactivity, requiring re-authentication to resume
operations, the system or individual data could be compromised by an alert intruder who
+ could exploit the oversight. This requirement applies to graphical desktop
environments provided by the system to locally attached displays and input devices as well
as to graphical desktop environments provided to remote systems, including thin
+
clients.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>PESL-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000057</ident>
+ <fixtext fixref="F-33042r1_fix">For the Gnome screen saver, set the
lock_enabled flag. Procedure: # gconftool-2 --direct --config-source
xml:readwrite:/etc/gconf/gconf.xml.mandatory --type bool --set
/apps/gnome-screensaver/lock_enabled
+ true</fixtext>
+ <fix id="F-33042r1_fix" />
+ <check system="C-37787r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>For the Gnome screen saver, check the lock_enabled flag.
Procedure: # gconftool-2 --direct --config-source
xml:readwrite:/etc/gconf/gconf.xml.mandatory --get /apps/gnome-screensaver/lock_enabled If
this does not return "true", this
+ is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-27285">
+ <title>GEN000600-2</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-34584r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000600-2</version>
+ <title>Global settings defined in system-auth must be applied in the pam.d
definition files.</title>
+ <description><VulnDiscussion>Pam global requirements are
generally defined in the /etc/pam.d/system-auth or /etc/pam.d/system-auth-ac file. In
order for the requirements to be applied the file containing them must be included
directly or
+ indirectly in each program's definition file in /etc/pam.d
+
</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECSC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000192</ident>
+ <fixtext fixref="F-32809r2_fix">In the default distribution of RHEL
"/etc/pam.d/system-auth" is a symlink "/etc/pam.d/system-auth-ac"
which is an autogenerated file. When a site adds password requirements a new
system-auth-local file must be
+ created with only the additional requirements and includes for auth, account,
passwd and session pointing to "/etc/pam.d/system-auth-ac". Then the symlink
"/etc/system-auth" is modified to point to
"/etc/pam.d/system-auth-local". This way any
+ changes made do not get lost when "/etc/pam.d/system-auth-ac" is
regenerated and each program's pam.d definition file need only have "include
system-auth" for auth, account, passwd and session, as needed, in order to assure the
password
+ requirements will be applied to it.</fixtext>
+ <fix id="F-32809r2_fix" />
+ <check system="C-37566r3_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify the system-auth settings are being applied.
Procedure: Verify the additional pam.d requirements are in use. The file
"/etc/pam.d/system-auth-ac" is auto generated by "authconfig". Any
manual changes made to it will be lost
+ next time "authconfig" is run. Check to see if the systems default of
the symlink "/etc/pam.d/system-auth" pointing to
"/etc/pam.d/system-auth-ac" has been changed. # ls -l /etc/pam.d/system-auth If
the symlink points to
+ "/etc/pam.d/system-auth-ac", manual changes cannot be protected. This
is a finding. # grep system-auth-ac /etc/pam.d/system-auth The local system-auth file
pointed to by "/etc/pam.d/system-auth" must contain
"/etc/pam.d/system-auth-ac" for the
+ auth, account, password, and session lines. If it does not then the parameters
maintained by "authconfig" will not be applied, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29236">
+ <title>GEN002720-2</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37612r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002720-2</version>
+ <title>The audit system must be configured to audit failed attempts to access
files and programs.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000192</ident>
+ <fixtext fixref="F-31649r1_fix">Edit the audit.rules file and add
the following line(s) to enable auditing of failed attempts to access files and programs:
either: -a exit,always -F arch=<ARCH> -S open -F success=0 or both: -a
exit,always -F
+ arch=<ARCH> -S open -F exit=-EPERM -a exit,always -F
arch=<ARCH> -S open -F exit=-EACCES Restart the auditd service. # service
auditd restart</fixtext>
+ <fix id="F-31649r1_fix" />
+ <check system="C-36810r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check that auditd is configured to audit failed file access
attempts. There must be an audit rule for each of the access syscalls that logs all failed
accesses (-F success=0) or there must both an "-F exit=-EPERM" and "-F
+ exit=-EACCES" for each access syscall. Procedure: # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep "-S open" |
grep "-F success=0" # cat /etc/audit/audit.rules | grep -e "-a
exit,always" | grep "-S open" | grep "-F exit=-EPERM" #
+ cat /etc/audit/audit.rules | grep -e "-a exit,always" | grep "-S
open" | grep "-F exit=-EACCES" If an "-S open" audit rule with
"-F success" does not exist and no separate rules containing "-F
exit=-EPERM" and "-F exit=-EACCES" for "open" exist,
+ then this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29237">
+ <title>GEN002720-3</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37614r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002720-3</version>
+ <title>The audit system must be configured to audit failed attempts to access
files and programs.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000192</ident>
+ <fixtext fixref="F-31650r1_fix">Edit the audit.rules file and add
the following line(s) to enable auditing of failed attempts to access files and programs:
either: -a exit,always -F arch=<ARCH> -S openat -F success=0 or both: -a
exit,always
+ -F arch=<ARCH> -S openat -F exit=-EPERM -a exit,always -F
arch=<ARCH> -S openat -F exit=-EACCES Restart the auditd service. # service
auditd restart</fixtext>
+ <fix id="F-31650r1_fix" />
+ <check system="C-36812r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify auditd is configured to audit failed file access
attempts. There must be an audit rule for each of the access syscalls logging all failed
accesses (-F success=0) or there must both an "-F exit=-EPERM" and "-F
exit=-EACCES"
+ for each access syscall. Procedure: # cat /etc/audit/audit.rules | grep -e
"-a exit,always" | grep "-S openat" | grep "-F success=0" #
cat /etc/audit/audit.rules | grep -e "-a exit,always" | grep "-S
openat" | grep "-F exit=-EPERM" # cat
+ /etc/audit/audit.rules | grep -e "-a exit,always" | grep "-S
openat" | grep "-F exit=-EACCES" If an "-S openat" audit rule
with "-F success" does not exist and no separate rules containing "-F
exit=-EPERM" and "-F exit=-EACCES" for "openat"
+ exist, then this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29238">
+ <title>GEN002720-4</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37654r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002720-4</version>
+ <title>The audit system must be configured to audit failed attempts to access
files and programs.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000192</ident>
+ <fixtext fixref="F-31681r1_fix">Edit the audit.rules file and add
the following line(s) to enable auditing of failed attempts to access files and programs:
either: -a exit,always -F arch=<ARCH> -S truncate -F success=0 or both: -a
exit,always
+ -F arch=<ARCH> -S truncate -F exit=-EPERM -a exit,always -F
arch=<ARCH> -S truncate -F exit=-EACCES Restart the auditd service. #
service auditd restart</fixtext>
+ <fix id="F-31681r1_fix" />
+ <check system="C-36844r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify auditd is configured to audit failed file access
attempts. There must be an audit rule for each of the access syscalls logging all failed
accesses (-F success=0) or there must both an "-F exit=-EPERM" and "-F
exit=-EACCES"
+ for each access syscall. Procedure: # cat /etc/audit/audit.rules | grep -e
"-a exit,always" | grep "-S truncate" | grep "-F success=0"
# cat /etc/audit/audit.rules | grep -e "-a exit,always" | grep "-S
truncate" | grep "-F exit=-EPERM" # cat
+ /etc/audit/audit.rules | grep -e "-a exit,always" | grep "-S
truncate" | grep "-F exit=-EACCES" If an "-S truncate" audit rule
with "-F success" does not exist and no separate rules containing "-F
exit=-EPERM" and "-F exit=-EACCES" for "truncate"
+ exist, then this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29239">
+ <title>GEN002720-5</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37655r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002720-5</version>
+ <title>The audit system must be configured to audit failed attempts to access
files and programs.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000192</ident>
+ <fixtext fixref="F-31682r1_fix">Edit the audit.rules file and add
the following line(s) to enable auditing of failed attempts to access files and programs:
either: -a exit,always -F arch=<ARCH> -S ftruncate -F success=0 or both: -a
+ exit,always -F arch=<ARCH> -S ftruncate -F exit=-EPERM -a exit,always
-F arch=<ARCH> -S ftruncate -F exit=-EACCES Restart the auditd service. #
service auditd restart</fixtext>
+ <fix id="F-31682r1_fix" />
+ <check system="C-36845r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Verify auditd is configured to audit failed file access
attempts. There must be an audit rule for each of the access syscalls logging all failed
accesses (-F success=0) or there must both an "-F exit=-EPERM" and "-F
exit=-EACCES"
+ for each access syscall. Procedure: # cat /etc/audit/audit.rules | grep -e
"-a exit,always" | grep "-S ftruncate" | grep "-F success=0"
# cat /etc/audit/audit.rules | grep -e "-a exit,always" | grep "-S
ftruncate" | grep "-F exit=-EPERM" # cat
+ /etc/audit/audit.rules | grep -e "-a exit,always" | grep "-S
ftruncate" | grep "-F exit=-EACCES" If an "-S ftruncate" audit
rule with "-F success" does not exist and no separate rules containing "-F
exit=-EPERM" and "-F exit=-EACCES" for
+ "ftruncate" exist, then this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29240">
+ <title>GEN002740-2</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37656r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002740-2</version>
+ <title>The audit system must be configured to audit file
deletions.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-31683r1_fix">Edit the audit.rules file and add
the following line to enable auditing of deletions: -a exit,always -S rmdir Restart the
auditd service. # service auditd restart</fixtext>
+ <fix id="F-31683r1_fix" />
+ <check system="C-36846r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system audit configuration to determine if file
and directory deletions are audited. # cat /etc/audit/audit.rules | grep -e "-a
exit,always" | grep -i "rmdir" If no results are returned, or the results
do not contain "-S
+ rmdir", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29241">
+ <title>GEN002760-2</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37657r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002760-2</version>
+ <title>The audit system must be configured to audit all administrative,
privileged, and security actions.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000347</ident>
+ <fixtext fixref="F-31684r1_fix">The "-F
arch=<ARCH>"restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>"restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Add the following lines to the audit.rules
file to enable auditing of administrative, privileged, and security actions: -w
/etc/audit.rules -w /etc/audit/audit.rules Restart the auditd service. # service
+ auditd restart</fixtext>
+ <fix id="F-31684r1_fix" />
+ <check system="C-36847r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the auditing configuration of the system. Procedure: #
cat /etc/audit/audit.rules | grep -i "audit.rules" If no results are returned,
or the line does not start with "-w", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29242">
+ <title>GEN002760-3</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37658r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002760-3</version>
+ <title>The audit system must be configured to audit all administrative,
privileged, and security actions.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000347</ident>
+ <fixtext fixref="F-31685r1_fix">The "-F
arch=<ARCH>"restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>"restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Add the following lines to the audit.rules
file to enable auditing of administrative, privileged, and security actions: -a
exit,always -F arch=<ARCH> -S adjtime Restart the auditd service. # service
+ auditd restart</fixtext>
+ <fix id="F-31685r1_fix" />
+ <check system="C-36848r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the auditing configuration of the system. Procedure: #
cat /etc/audit/audit.rules | grep -e "-a exit,always" | grep -i
"adjtime" If the result does not contain "-S adjtime", this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29243">
+ <title>GEN002760-4</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37659r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002760-4</version>
+ <title>The audit system must be configured to audit all administrative,
privileged, and security actions.</title>
+ <description><VulnDiscussion> If the system is not configured
to audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000347</ident>
+ <fixtext fixref="F-31686r1_fix">The "-F
arch=<ARCH>"restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>"restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Add the following lines to the audit.rules
file to enable auditing of administrative, privileged, and security actions: -a
exit,always -F arch=<ARCH> -S settimeofday Restart the auditd service. #
service
+ auditd restart</fixtext>
+ <fix id="F-31686r1_fix" />
+ <check system="C-36849r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the auditing configuration of the system. Procedure: #
cat /etc/audit/audit.rules | grep -e "-a exit,always" | grep -i
"settimeofday" If the result does not contain "-S settimeofday", this
is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29244">
+ <title>GEN002760-5</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37660r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002760-5</version>
+ <title>The audit system must be configured to audit all administrative,
privileged, and security actions.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000347</ident>
+ <fixtext fixref="F-32213r1_fix">The "-F
arch=<ARCH>"restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>"restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Add the following lines to the audit.rules
file to enable auditing of administrative, privileged, and security actions: -a
exit,always -F arch=<ARCH> -S stime Restart the auditd service. # service
auditd
+ restart</fixtext>
+ <fix id="F-32213r1_fix" />
+ <check system="C-36949r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the auditing configuration of the system. Procedure: #
cat /etc/audit/audit.rules | grep -e "-a exit,always" | grep -i
"stime" If the result does not contain "-S stime", this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29245">
+ <title>GEN002760-6</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37661r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002760-6</version>
+ <title>The audit system must be configured to audit all administrative,
privileged, and security actions.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000347</ident>
+ <fixtext fixref="F-31687r1_fix">The "-F
arch=<ARCH>"restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>"restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Add the following lines to the audit.rules
file to enable auditing of administrative, privileged, and security actions: -a
exit,always -F arch=<ARCH> -S clock_settime Restart the auditd service. #
+ service auditd restart</fixtext>
+ <fix id="F-31687r1_fix" />
+ <check system="C-36850r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the auditing configuration of the system. Procedure: #
cat /etc/audit/audit.rules | grep -e "-a exit,always" | grep -i
"clock_settime" If the result does not contain "-S clock_settime",
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29246">
+ <title>GEN002760-7</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37662r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002760-7</version>
+ <title>The audit system must be configured to audit all administrative,
privileged, and security actions.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000347</ident>
+ <fixtext fixref="F-31688r1_fix">The "-F
arch=<ARCH>"restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>"restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Add the following lines to the audit.rules
file to enable auditing of administrative, privileged, and security actions: -a
exit,always -F arch=<ARCH> -S sethostname Restart the auditd service. #
service
+ auditd restart</fixtext>
+ <fix id="F-31688r1_fix" />
+ <check system="C-36851r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the auditing configuration of the system. Procedure: #
cat /etc/audit/audit.rules | grep -e "-a exit,always" | grep -i
"sethostname" If the result does not contain "-S sethostname", this is
a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29247">
+ <title>GEN002760-8</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37663r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002760-8</version>
+ <title>The audit system must be configured to audit all administrative,
privileged, and security actions.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000347</ident>
+ <fixtext fixref="F-31689r1_fix">The "-F
arch=<ARCH>"restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>"restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Add the following lines to the audit.rules
file to enable auditing of administrative, privileged, and security actions: -a
exit,always -F arch=<ARCH> -S setdomainname Restart the auditd service. #
+ service auditd restart</fixtext>
+ <fix id="F-31689r1_fix" />
+ <check system="C-36852r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the auditing configuration of the system. Procedure: #
cat /etc/audit/audit.rules | grep -e "-a exit,always" | grep -i
"setdomain" If the result does not contain "-S setdomain", this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29248">
+ <title>GEN002760-9</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37664r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002760-9</version>
+ <title>The audit system must be configured to audit all administrative,
privileged, and security actions.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000347</ident>
+ <fixtext fixref="F-31690r1_fix">The "-F
arch=<ARCH>"restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>"restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: A Real Time Operating System (RTOS) provides
specialized system scheduling which causes an inordinate number of messages to be produced
when the sched_setparam and set_setscheduler are audited. This not only
+ may degrade the system speed to an unusable level but obscures any forensic
information which may otherwise have been useful. Unless the operating system is a Red Hat
5 based RTOS (including MRG and AS5300) the following should also be present in
+ /etc/audit/audit.rules -a exit,always -F arch=<ARCH> -S
sched_setparam Restart the auditd service. # service auditd restart</fixtext>
+ <fix id="F-31690r1_fix" />
+ <check system="C-36853r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the auditing configuration of the system. Procedure: #
cat /etc/audit/audit.rules | grep -e "-a exit,always" | grep -i
"sched_setparam" If the result does not contain "-S sched_setparam",
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29249">
+ <title>GEN002760-10</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37665r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002760-10</version>
+ <title>The audit system must be configured to audit all administrative,
privileged, and security actions.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000347</ident>
+ <fixtext fixref="F-31691r1_fix">The "-F
arch=<ARCH>"restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>"restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: A Real Time Operating System (RTOS) provides
specialized system scheduling which causes an inordinate number of messages to be produced
when the sched_setparam and set_setscheduler are audited. This not only
+ may degrade the system speed to an unusable level but obscures any forensic
information which may otherwise have been useful. Unless the operating system is a Red Hat
5 based RTOS (including MRG and AS5300) the following should also be present in
+ /etc/audit/audit.rules -a exit,always -F arch=<ARCH> -S
sched_setscheduler Restart the auditd service. # service auditd restart</fixtext>
+ <fix id="F-31691r1_fix" />
+ <check system="C-36854r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the auditing configuration of the system. Procedure: #
cat /etc/audit/audit.rules | grep -e "-a exit,always" | grep -i
"sched_setscheduler" If the result does not contain "-S
sched_setscheduler", this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29250">
+ <title>GEN002820-2</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37666r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002820-2</version>
+ <title>The audit system must be configured to audit all discretionary access
control permission modifications.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-31692r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Edit the audit.rules file and add the
following lines to enable auditing of discretionary access control permissions
modifications. -a exit,always -F arch=<ARCH> -S fchmod Restart the auditd
service. #
+ service auditd restart</fixtext>
+ <fix id="F-31692r1_fix" />
+ <check system="C-36855r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system's audit configuration. Procedure: # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep -i "fchmod"
If "-S fchmod" is not in the result, this is a finding</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29251">
+ <title>GEN002820-3</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37667r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002820-3</version>
+ <title>The audit system must be configured to audit all discretionary access
control permission modifications.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-31695r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Edit the audit.rules file and add the
following lines to enable auditing of discretionary access control permissions
modifications. -a exit,always -F arch=<ARCH> -S fchmodat Restart the auditd
service. #
+ service auditd restart</fixtext>
+ <fix id="F-31695r1_fix" />
+ <check system="C-36856r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system's audit configuration. Procedure: # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep -i "fchmodat"
If "-S fchmodat" is not in the result, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29252">
+ <title>GEN002820-4</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37668r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002820-4</version>
+ <title>The audit system must be configured to audit all discretionary access
control permission modifications.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-31710r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Edit the audit.rules file and add the
following lines to enable auditing of discretionary access control permissions
modifications. -a exit,always -F arch=<ARCH> -S chown Additionally, the
following rule
+ is required in systems supporting the 32-bit syscall table (such as i686 and
x86_64): -a exit,always -F arch=<ARCH> -S chown32 Restart the auditd
service. # service auditd restart</fixtext>
+ <fix id="F-31710r1_fix" />
+ <check system="C-36857r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system's audit configuration. Procedure: # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep -i "chown" If
"-S chown" is not in the result, this is a finding. Additionally, the following
rule is required in
+ systems supporting the 32-bit syscall table (such as i686 and x86_64): # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep -i "chown32"
If "-S chown32" is not in the result, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29253">
+ <title>GEN002820-5</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37669r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002820-5</version>
+ <title>The audit system must be configured to audit all discretionary access
control permission modifications.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-31729r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Edit the audit.rules file and add the
following lines to enable auditing of discretionary access control permissions
modifications. -a exit,always -F arch=<ARCH> -S fchown Additionally, the
following
+ rule is required in systems supporting the 32-bit syscall table (such as i686 and
x86_64): -a exit,always -F arch=<ARCH> -S fchown32 Restart the auditd
service. # service auditd restart</fixtext>
+ <fix id="F-31729r1_fix" />
+ <check system="C-36859r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system's audit configuration. Procedure: # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep -i "fchown"
If "-S fchown" is not in the result, this is a finding. Additionally, the
following rule is required in
+ systems supporting the 32-bit syscall table (such as i686 and x86_64): # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep -i "fchown32"
If "-S fchown32" is not in the result, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29255">
+ <title>GEN002820-6</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37671r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002820-6</version>
+ <title>The audit system must be configured to audit all discretionary access
control permission modifications.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-31781r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Edit the audit.rules file and add the
following lines to enable auditing of discretionary access control permissions
modifications. -a exit,always -F arch=<ARCH> -S fchownat Restart the auditd
service. #
+ service auditd restart</fixtext>
+ <fix id="F-31781r1_fix" />
+ <check system="C-36861r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system's audit configuration. Procedure: # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep -i "fchownat"
If "-S fchownat" is not in the result, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29257">
+ <title>GEN002820-7</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37673r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002820-7</version>
+ <title>The audit system must be configured to audit all discretionary access
control permission modifications.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-31805r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Edit the audit.rules file and add the
following lines to enable auditing of discretionary access control permissions
modifications. -a exit,always -F arch=<ARCH> -S lchown Additionally, the
following
+ rule is required in systems supporting the 32-bit syscall table (such as i686 and
x86_64): -a exit,always -F arch=<ARCH> -S lchown32 Restart the auditd
service. # service auditd restart</fixtext>
+ <fix id="F-31805r1_fix" />
+ <check system="C-36863r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system's audit configuration. Procedure: # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep -i "lchown"
If "-S lchown" is not in the result, this is a finding. Additionally, the
following rule is required in
+ systems supporting the 32-bit syscall table (such as i686 and x86_64): # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep -i "lchown32"
If "-S lchown32" is not in the result, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29259">
+ <title>GEN002820-8</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37677r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002820-8</version>
+ <title>The audit system must be configured to audit all discretionary access
control permission modifications.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-31825r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Edit the audit.rules file and add the
following lines to enable auditing of discretionary access control permissions
modifications. -a exit,always -F arch=<ARCH> -S setxattr Restart the auditd
service. #
+ service auditd restart</fixtext>
+ <fix id="F-31825r1_fix" />
+ <check system="C-36868r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system's audit configuration. Procedure: # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep -i "setxattr"
If "-S setxattr" is not in the result, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29261">
+ <title>GEN002820-9</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37681r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002820-9</version>
+ <title>The audit system must be configured to audit all discretionary access
control permission modifications.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-31843r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Edit the audit.rules file and add the
following lines to enable auditing of discretionary access control permissions
modifications. -a exit,always -F arch=<ARCH> -S lsetxattr Restart the auditd
service.
+ # service auditd restart</fixtext>
+ <fix id="F-31843r1_fix" />
+ <check system="C-36870r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system's audit configuration. Procedure: # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep -i
"lsetxattr" If "-S lsetxattr" is not in the result, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29272">
+ <title>GEN002820-10</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37716r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002820-10</version>
+ <title>The audit system must be configured to audit all discretionary access
control permission modifications.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-32185r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Edit the audit.rules file and add the
following lines to enable auditing of discretionary access control permissions
modifications. -a exit,always -F arch=<ARCH> -S fsetxattr Restart the auditd
service.
+ # service auditd restart</fixtext>
+ <fix id="F-32185r1_fix" />
+ <check system="C-36919r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system's audit configuration. Procedure: # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep -i
"fsetxattr" If "-S fsetxattr" is not in the result, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29274">
+ <title>GEN002820-11</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37718r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002820-11</version>
+ <title>The audit system must be configured to audit all discretionary access
control permission modifications.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-32186r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Edit the audit.rules file and add the
following lines to enable auditing of discretionary access control permissions
modifications. -a exit,always -F arch=<ARCH> -S removexattr Restart the
auditd
+ service. # service auditd restart</fixtext>
+ <fix id="F-32186r1_fix" />
+ <check system="C-36920r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system's audit configuration. Procedure: # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep -i
"removexattr" If "-S removexattr" is not in the result, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29275">
+ <title>GEN002820-12</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37719r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002820-12</version>
+ <title>The audit system must be configured to audit all discretionary access
control permission modifications.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-32187r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Edit the audit.rules file and add the
following lines to enable auditing of discretionary access control permissions
modifications. -a exit,always -F arch=<ARCH> -S lremovexattr Restart the
auditd
+ service. # service auditd restart</fixtext>
+ <fix id="F-32187r1_fix" />
+ <check system="C-36921r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system's audit configuration. Procedure: # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep -i
"lremovexattr" If "-S lremovexattr" is not in the result, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29279">
+ <title>GEN002820-13</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37726r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002820-13</version>
+ <title>The audit system must be configured to audit all discretionary access
control permission modifications.</title>
+ <description><VulnDiscussion>If the system is not configured to
audit certain activities and write them to an audit log, it is more difficult to detect
and track system compromises and damages incurred during a system
+
compromise.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-32188r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Edit the audit.rules file and add the
following lines to enable auditing of discretionary access control permissions
modifications. -a exit,always -F arch=<ARCH> -S fremovexattr Restart the
auditd
+ service. # service auditd restart</fixtext>
+ <fix id="F-32188r1_fix" />
+ <check system="C-36922r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system's audit configuration. Procedure: # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep -i
"fremovexattr" If "-S fremovexattr" is not in the result, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29281">
+ <title>GEN002825-2</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37728r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002825-2</version>
+ <title>The audit system must be configured to audit the loading and unloading
of dynamic kernel modules - delete_module.</title>
+ <description><VulnDiscussion>Actions concerning dynamic kernel
modules must be recorded as they are substantial events. Dynamic kernel modules can
increase the attack surface of a system. A malicious kernel module can be used to
substantially
+ alter the functioning of a system, often with the purpose of hiding a compromise
from the
+
SA.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-32192r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Configure auditing of the delete_module
syscalls. Add the following to the "etc/audit/audit.rules" or
"etc/audit.rules" file: -a exit,always -S delete_module Restart the auditd
service. # service auditd
+ restart</fixtext>
+ <fix id="F-32192r1_fix" />
+ <check system="C-36927r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if the delete_module syscall is audited. # cat
/etc/audit/audit.rules | grep -e "-a exit,always" | grep -i
"delete_module" If the result does not contain "-S delete_module",
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29284">
+ <title>GEN002825-3</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37734r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002825-3</version>
+ <title>The audit system must be configured to audit the loading and unloading
of dynamic kernel modules - /sbin/insmod.</title>
+ <description><VulnDiscussion>Actions concerning dynamic kernel
modules must be recorded as they are substantial events. Dynamic kernel modules can
increase the attack surface of a system. A malicious kernel module can be used to
substantially
+ alter the functioning of a system, often with the purpose of hiding a compromise
from the
+
SA.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-32197r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Configure auditing of the /sbin/insmod,
files. Add the following to the "etc/audit/audit.rules" or
"etc/audit.rules" file: -w /sbin/insmod -p x Restart the auditd service. #
service auditd restart</fixtext>
+ <fix id="F-32197r1_fix" />
+ <check system="C-36932r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if /sbin/insmod is audited. # cat
/etc/audit/audit.rules | grep "/sbin/insmod" If the result does not start with
"-w" and contain "-p x", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29286">
+ <title>GEN002825-4</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37738r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002825-4</version>
+ <title>The audit system must be configured to audit the loading and unloading
of dynamic kernel modules -/sbin/modprobe.</title>
+ <description><VulnDiscussion>Actions concerning dynamic kernel
modules must be recorded as they are substantial events. Dynamic kernel modules can
increase the attack surface of a system. A malicious kernel module can be used to
substantially
+ alter the functioning of a system, often with the purpose of hiding a compromise
from the
+
SA.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-32199r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: -w /sbin/modprobe -p x Restart the auditd
service. # service auditd restart</fixtext>
+ <fix id="F-32199r1_fix" />
+ <check system="C-36935r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if the /sbin/modprobe file is audited. # cat
/etc/audit/audit.rules | grep "/sbin/modprobe" If the result does not start with
"-w" and contain "-p x", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29288">
+ <title>GEN002825-5</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37741r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002825-5</version>
+ <title>The audit system must be configured to audit the loading and unloading
of dynamic kernel modules - /sbin/rmmod</title>
+ <description><VulnDiscussion>Actions concerning dynamic kernel
modules must be recorded as they are substantial events. Dynamic kernel modules can
increase the attack surface of a system. A malicious kernel module can be used to
substantially
+ alter the functioning of a system, often with the purpose of hiding a compromise
from the
+
SA.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000126</ident>
+ <fixtext fixref="F-32203r1_fix">The "-F
arch=<ARCH>" restriction is required on dual-architecture systems (such
as x86_64). On dual-architecture systems, two separate rules must exist - one for each
architecture supported. Use the generic
+ architectures "b32" and "b64" for specifying these rules. On
single architecture systems, the "-F arch=<ARCH>" restriction may
be omitted, but if present must match either the architecture of the system or its
corresponding generic
+ architecture. The architecture of the system may be determined by running
"uname -m". See the auditctl(8) manpage for additional details. Any restrictions
(such as with "-F") beyond those provided in the example rules are not in strict
compliance
+ with this requirement, and are a finding unless justified and documented
appropriately. The use of audit keys consistent with the provided example is encouraged to
provide for uniform audit logs, however omitting the audit key or using an alternate
+ audit key is not a finding. Procedure: Configure auditing of the /sbin/rmmod file.
Add the following to the "etc/audit/audit.rules" or "etc/audit.rules"
file: -w /sbin/rmmod -p x Restart the auditd service. # service auditd
restart</fixtext>
+ <fix id="F-32203r1_fix" />
+ <check system="C-36939r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if the /sbin/rmmod file is audited. # cat
/etc/audit/audit.rules | grep "/sbin/rmmod" If the result does not start with
"-w" and contain "-p x", this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29289">
+ <title>GEN003080-2</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37745r1_rule" severity="medium"
weight="10.0">
+ <version>GEN003080-2</version>
+ <title>Files in cron script directories must have mode 0700 or less
permissive.</title>
+ <description><VulnDiscussion>To protect the integrity of
scheduled system jobs and prevent malicious modification to these jobs, crontab files must
be
+
secured.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>ECLP-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000225</ident>
+ <fixtext fixref="F-32208r1_fix">Change the mode of the cron
scripts. # chmod 0700 /etc/cron.daily/* /etc/cron.hourly/* /etc/cron.monthly/*
/etc/cron.weekly/*</fixtext>
+ <fix id="F-32208r1_fix" />
+ <check system="C-36943r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the mode of scripts in cron job directories. # ls -lL
/etc/cron.daily/ # ls -lL /etc/cron.hourly/ # ls -lL /etc/cron.monthly/ # ls -lL
/etc/cron.weekly/ If any cron script has a mode more permissive than 0700, this is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-29376">
+ <title>GEN000290-1</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-38177r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000290-1</version>
+ <title>The system must not have the unnecessary "games"
account.</title>
+ <description><VulnDiscussion>Accounts that provide no
operational purpose provide additional opportunities for system compromise. Unnecessary
accounts include user accounts for individuals not requiring access to the system and
application
+ accounts for applications not installed on the
+
system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls>IAAC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000012</ident>
+ <fixtext fixref="F-32805r2_fix">Remove the "games"
account. Procedure: # userdel games</fixtext>
+ <fix id="F-32805r2_fix" />
+ <check system="C-37561r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the system for the unnecessary "games"
accounts. Procedure: # grep ^games /etc/passwd If this account exists, it is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-760">
+ <title>GEN000280</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37419r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000280</version>
+ <title>Direct logins must not be permitted to shared, default, application,
or utility accounts.</title>
+ <description><VulnDiscussion>Shared accounts (accounts where
two or more people log in with the same user identification) do not provide identification
and authentication. There is no way to provide for non-repudiation or individual
+
accountability.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>true</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>Information
+ Assurance
Officer</Responsibility><Responsibility>System
Administrator</Responsibility><IAControls>ECSC-1,
IAIA-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000770</ident>
+ <fixtext fixref="F-31348r2_fix">Use the switch user (su) command
from a named account login to access shared accounts. Document requirements and procedures
for users/administrators to log into their own accounts first and then switch user (su)
to
+ the account to be shared.</fixtext>
+ <fix id="F-31348r2_fix" />
+ <check system="C-36102r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Use the last command to check for multiple accesses to an
account from different workstations/IP addresses. # last -R If users log directly onto
accounts, rather than using the switch user (su) command from their own named account
+ to access them, this is a finding (such as logging directly on to oracle). Verify
with the SA or the IAO on documentation for users/administrators to log into their own
accounts first and then switch user (su) to the account to be shared has been
+ maintained including requirements and procedures. If no such documentation
exists, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-762">
+ <title>GEN000320</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27068r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000320</version>
+ <title>All accounts must be assigned unique User Identification Numbers
(UIDs).</title>
+ <description><VulnDiscussion>Accounts sharing a UID have full
access to each others' files. This has the same effect as sharing a login. There is no
way to assure identification, authentication, and accountability because the system sees
them
+ as the same user. If the duplicate UID is 0, this gives potential intruders another
privileged account to
+
attack.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>IAIA-1,
IAIA-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000764</ident>
+ <fixtext fixref="F-31350r1_fix">Edit user accounts to provide
unique UIDs for each account.</fixtext>
+ <fix id="F-31350r1_fix" />
+ <check system="C-36104r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Perform the following to ensure there are no duplicate UIDs:
# cut -d: -f3 /etc/passwd | uniq -d If any duplicate UIDs are found, this is a
finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-766">
+ <title>GEN000460</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37203r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000460</version>
+ <title>The system must disable accounts after three consecutive unsuccessful
login attempts.</title>
+ <description><VulnDiscussion>Disabling accounts after a limited
number of unsuccessful login attempts improves protection against password guessing
+
attacks.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECLO-1,
ECLO-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000044</ident>
+ <fixtext fixref="F-31153r1_fix">By default link
/etc/pam.d/system-auth points to /etc/pam.d/system-auth-ac which is the file maintained by
the authconfig utility. In order to add pam options other than those available via the
utility create
+ /etc/pam.d/system-auth-local with the options and including system-auth-ac. In
order to set the account lockout to three failed attempts the content should be similar
to: auth required pam_access.so auth required pam_tally2.so deny=3 auth include
+ system-auth-ac account required pam_tally2.so account include system-auth-ac
password include system-auth-ac session include system-auth-ac Once system-auth-local is
written reset the /etc/pam.d/system-auth to point to system-auth-local. This is
+ necessary because authconfig writes directly to system-auth-ac so any changes made
by hand will be lost if authconfig is run.</fixtext>
+ <fix id="F-31153r1_fix" />
+ <check system="C-35895r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the pam_tally configuration. # more
/etc/pam.d/system-auth Confirm the following line is configured, before any "auth
sufficient" lines: auth required pam_tally2.so deny=3 If no such line is found, this
is a
+ finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-768">
+ <title>GEN000480</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37213r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000480</version>
+ <title>The delay between login prompts following a failed login attempt must
be at least 4 seconds.</title>
+ <description><VulnDiscussion>Enforcing a delay between
successive failed login attempts increases protection against automated password guessing
+
attacks.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECLO-1,
ECLO-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000043</ident>
+ <fixtext fixref="F-31161r1_fix">Add the pam_faildelay module and
set the FAIL_DELAY variable. Procedure: Edit /etc/login.defs and set the value of the
FAIL_DELAY variable to 4 or more. The default link /etc/pam.d/system-auth points to
+ /etc/pam.d/system-auth-ac which is the file maintained by the authconfig utility.
In order to add pam options other than those available via the utility create or modify
/etc/pam.d/system-auth-local with the options and including system-auth-ac.
+ For example: auth required pam_access.so auth optional pam_faildelay.so
delay=4000000 auth include system-auth-ac account include system-auth-ac password include
system-auth-ac session include system-auth-ac Once system-auth-local is written ensure
+ the /etc/pam.d/system-auth points to system-auth-local. This is necessary because
authconfig writes directly to system-auth-ac so any manual changes made will be lost if
authconfig is run.</fixtext>
+ <fix id="F-31161r1_fix" />
+ <check system="C-35903r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check the value of the FAIL_DELAY variable and the ability
to use it. Procedure: # grep FAIL_DELAY /etc/login.defs If the value does not exist, or is
less than 4, this is a finding. Check for the use of pam_faildelay. # grep
+ pam_faildelay /etc/pam.d/system-auth* If pam_faildelay.so module is not present,
this is a finding. If pam_faildelay is present only in /etc/pam.d/system-auth-ac: ensure
that /etc/pam.d/system-auth includes /etc/pam.d/system-auth-ac. #grep
+ system-auth-ac /etc/pam.d/system-auth This should return: auth include
system-auth-ac account include system-auth-ac password include system-auth-ac session
include system-auth-ac /etc/pam.d/system-auth-ac should only be included by
+ /etc/pam.d/system-auth. All other pam files should include
/etc/pam.d/system-auth. If pam_faildelay is not defined in /etc/pam.d/system-auth either
directly or through inclusion of system-auth-ac, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-778">
+ <title>GEN000980</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37374r1_rule" severity="medium"
weight="10.0">
+ <version>GEN000980</version>
+ <title>The system must prevent the root account from directly logging in
except from the system console.</title>
+ <description><VulnDiscussion>Limiting the root account direct
logins to only system consoles protects the root account from direct unauthorized access
from a non-console
+
device.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECPA-1,
ECSD-2</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000770</ident>
+ <fixtext fixref="F-31305r1_fix">Create if needed and set the
contents of /etc/securetty to a "console" or "tty" device. # echo
console > /etc/securetty or # echo tty1 > /etc/securetty</fixtext>
+ <fix id="F-31305r1_fix" />
+ <check system="C-36060r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Check /etc/securetty # more /etc/securetty If the file does
not exist, or contains more than "console" or a single "tty" device
this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-810">
+ <title>GEN002640</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-37903r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002640</version>
+ <title>Default system accounts must be disabled or removed.</title>
+ <description><VulnDiscussion>Vendor accounts and software may
contain backdoors allowing unauthorized access to the system. These backdoors are common
knowledge and present a threat to system security if the account is not
+
disabled.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+
Administrator</Responsibility><IAControls>IAAC-1</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000178</ident>
+ <fixtext fixref="F-32397r1_fix">Lock the default system account(s).
# passwd -l <user></fixtext>
+ <fix id="F-32397r1_fix" />
+ <check system="C-37129r2_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if default system accounts (such as those for sys,
bin, uucp, nuucp, daemon, smtp) have been disabled. # cat /etc/shadow If an account's
password field (which is the second field in the /etc/shadow file) is "*",
"*LK*",
+ or is prefixed with a '!', the account is locked or disabled. If there
are any unlocked default system accounts this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+ <Group id="V-811">
+ <title>GEN002660</title>
+
<description><GroupDescription></GroupDescription></description>
+ <Rule id="SV-27270r1_rule" severity="medium"
weight="10.0">
+ <version>GEN002660</version>
+ <title>Auditing must be implemented.</title>
+ <description><VulnDiscussion>Without auditing, individual
system accesses cannot be tracked and malicious activity cannot be detected and traced
back to an individual
+
account.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System
+ Administrator</Responsibility><IAControls>ECAR-1,
ECAR-2, ECAR-3</IAControls></description>
+ <reference>
+ <dc:title>VMS Target Red Hat 5</dc:title>
+ <dc:publisher>DISA FSO</dc:publisher>
+ <dc:type>VMS Target</dc:type>
+ <dc:subject>Red Hat 5</dc:subject>
+ <dc:identifier>2154</dc:identifier>
+ </reference>
+ <ident
system="http://iase.disa.mil/cci">CCI-000169</ident>
+ <fixtext fixref="F-24516r1_fix">Start the auditd service and set it
to start on boot. # service auditd start ; chkconfig auditd on</fixtext>
+ <fix id="F-24516r1_fix" />
+ <check system="C-28350r1_chk">
+ <check-content-ref name="M"
href="VMS_XCCDF_Benchmark_RHEL_5_STIG.xml" />
+ <check-content>Determine if auditing is enabled. # ps -ef |grep auditd If
the auditd process is not found, this is a finding.</check-content>
+ </check>
+ </Rule>
+ </Group>
+</Benchmark>
diff --git a/rhel6/src/transforms/xccdf2table-stig.xslt
b/rhel6/src/transforms/xccdf2table-stig.xslt
new file mode 100644
index 0000000..068abb7
--- /dev/null
+++ b/rhel6/src/transforms/xccdf2table-stig.xslt
@@ -0,0 +1,118 @@
+<?xml version="1.0" encoding="utf-8"
standalone="yes"?>
+<xsl:stylesheet version="1.0"
xmlns:xsl="http://www.w3.org/1999/XSL/Transform"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:cdf="http://checklists.nist.gov/xccdf/1.1"
xmlns:xhtml="http://www.w3.org/1999/xhtml">
+
+<!-- this style sheet expects parameter $ref, which is the abbreviation of the ref to
be shown -->
+
+<!-- optionally, the style sheet can receive parameter $delim, will result in
splitting of references onto
+ separate rows of output -->
+
+<xsl:param name="delim"/>
+
+<xsl:include href="constants.xslt"/>
+
+ <xsl:template match="/">
+ <html>
+ <head>
+ <title>Rules In <xsl:value-of select="/cdf:Benchmark/cdf:title"
/> with Notes for Transition to RHEL 6 Consensus</title>
+ </head>
+ <body>
+ <br/>
+ <br/>
+ <div style="text-align: center; font-size: x-large;
font-weight:bold">
+ Rules In <i><xsl:value-of select="/cdf:Benchmark/cdf:title"
/></i> with Notes for Transition to RHEL 6 Consensus
+ </div>
+ <br/>
+ <br/>
+ <xsl:apply-templates select="cdf:Benchmark"/>
+ </body>
+ </html>
+ </xsl:template>
+
+
+ <xsl:template match="cdf:Benchmark">
+ <style type="text/css">
+ table
+ {
+ border-collapse:collapse;
+ }
+ table,th, td
+ {
+ border: 1px solid black;
+ vertical-align: top;
+ padding: 3px;
+ }
+ thead
+ {
+ display: table-header-group;
+ font-weight: bold;
+ }
+ </style>
+ <table>
+ <thead>
+ <td>V-ID</td>
+ <td>GEN-ID</td>
+ <td>Title</td>
+ <td>Description</td>
+ <td>Fixtext</td>
+ <td>Notes</td>
+ </thead>
+
+ <xsl:apply-templates select=".//cdf:Group" />
+ </table>
+ </xsl:template>
+
+
+ <xsl:template name="rule-output">
+ <xsl:param name="vulnid"/>
+ <tr>
+ <td><xsl:value-of select="@id"/></td>
+ <!--<td> <xsl:value-of select="cdf:ident"
/></td>-->
+ <td> <xsl:value-of select="cdf:title" /></td>
+ <td> <xsl:value-of select="cdf:Rule/cdf:title" /></td>
+ <td> <xsl:call-template
name="extract-vulndiscussion"><xsl:with-param name="desc"
select="cdf:Rule/cdf:description"/></xsl:call-template> </td>
+ <td> <xsl:apply-templates select="cdf:Rule/cdf:fixtext"/>
</td>
+ <td> </td>
+ </tr>
+ </xsl:template>
+
+
+ <xsl:template match="cdf:Group">
+ <xsl:call-template name="rule-output"
select="cdf:Rule">
+ <xsl:with-param name="vulnid" select="@id" />
+ </xsl:call-template>
+ </xsl:template>
+
+
+ <!-- return only the text between the "VulnDiscussion" (non-XCCDF) tags
-->
+ <!-- this should be removed as soon as SRGs include only a description instead of
odd tags -->
+ <xsl:template name="extract-vulndiscussion">
+ <xsl:param name="desc"/>
+ <xsl:variable name="desc_info"
select="substring-before($desc,
'</VulnDiscussion>')"/>
+ <xsl:value-of select="substring-after($desc_info,
'<VulnDiscussion>')"/>
+ </xsl:template>
+
+
+
+
+ <!-- getting rid of XHTML namespace -->
+ <xsl:template match="xhtml:*">
+ <xsl:element name="{local-name()}">
+ <xsl:apply-templates select="node()|@*"/>
+ </xsl:element>
+ </xsl:template>
+
+ <xsl:template match="@*|node()">
+ <xsl:copy>
+ <xsl:apply-templates select="@*|node()"/>
+ </xsl:copy>
+ </xsl:template>
+
+ <xsl:template match="cdf:description">
+ <xsl:apply-templates select="@*|node()" />
+ </xsl:template>
+
+ <xsl:template match="cdf:rationale">
+ <xsl:apply-templates select="@*|node()" />
+ </xsl:template>
+
+</xsl:stylesheet>
--
1.7.1