Payment Card Industry Data Security Standard

solaris-PCI-DSS-v.1.0-xccdf.xml

Evaluation Characteristics

Target machinesolarisvm
Benchmark TitlePayment Card Industry Data Security Standard
Benchmark Versionv1.0.0
Benchmark Description solaris-PCI-DSS-v.1.0-xccdf.xml
Profile IDSolaris_PCI-DSS
Started at2016-12-24T16:23:29
Finished at2016-12-24T16:32:28
Performed byccebi

CPE Platforms

    Addresses

      Compliance and Scoring

      The target system did not satisfy the conditions of 50 rules! Please review rule results and consider applying remediation.

      Rule results

      141 passed
      50 failed
      0 other

      Severity of failed rules

      0 other
      1 low
      46 medium
      3 high

      Score

      Scoring systemScoreMaximumPercent
      urn:xccdf:scoring:default60.056084100.000000
      60.06%

      Rule Overview

      TitleSeverityResult
      Verify the OS configuration 5x fail
      The OS version is currentmedium
      pass
      Package integrity is verifiedhigh
      fail
      Package signature checking is globally activatedmedium
      pass
      Booting the system should require a passwordmedium
      fail
      Address Space Layout Randomization (ASLR) is enabledmedium
      pass
      Stacks are non-executablemedium
      fail
      The umask(1) for SMF services is 022medium
      pass
      Service svc:/network/ipfilter is enabledmedium
      fail
      The tcp_wrappers feature is enabledmedium
      fail
      Verify file system information 6x fail
      All local filesystems are ZFSmedium
      pass
      Non-root ZFS filesystems are encryptedmedium
      fail
      swap(1M) is encryptedmedium
      fail
      A size limit is set on tmpfs(7FS)medium
      fail
      World-writable directories have sticky bit setmedium
      pass
      coreadm(1M) configuration is correctmedium
      fail
      Find and list world writable filesmedium
      pass
      Find and list suid and sgid files other than those in standard Oracle Solaris packageshigh
      fail
      Find and list files with no known ownermedium
      fail
      Find and list files with extended attributesmedium
      pass
      Tune kernel and network parameters 7x fail
      Directed broadcasts are not forwardedmedium
      pass
      Source-routed packets are not forwardedmedium
      pass
      TCP reverse source routing is disabledmedium
      pass
      ICMP redirects are disabledmedium
      fail
      Responses to echo requests on multicast addresses are disabledmedium
      fail
      Responses to ICMP broadcast timestamp requests are disabledmedium
      pass
      Responses to ICMP echo requests on broadcast addresses are disabledmedium
      fail
      Responses to ICMP netmask requests are disabledmedium
      pass
      Responses to ICMP timestamp requests are disabledmedium
      pass
      Routing daemons are disabledmedium
      fail
      Strict multihoming is enabledmedium
      fail
      Strong TCP packet sequence numberingmedium
      pass
      The maximum number of half-open TCP connections is at least 4096medium
      fail
      The maximum number of waiting TCP connections is set to at least 1024medium
      fail
      Enable required services 3x fail
      Service svc:/system/coreadm is enabledmedium
      pass
      Service svc:/system/cron is enabledmedium
      pass
      Service svc:/system/cryptosvc is enabledmedium
      pass
      Service svc:/system/dbus is enabledmedium
      pass
      Service svc:/system/filesystem/autofs is enabledmedium
      pass
      Service svc:/system/hal is enabled in global zonemedium
      pass
      Service svc:/system/identity:domain is enabledmedium
      pass
      Service svc:/system/intrd is enabled in global zonemedium
      pass
      Service svc:/system/keymap is enabled in global zonemedium
      pass
      Service svc:/system/name-service/cache is enabledmedium
      pass
      Service svc:/system/name-service/switch is enabledmedium
      pass
      Service svc:/system/ocm is enabledmedium
      pass
      Service svc:/system/picl is enabled in global zonemedium
      pass
      Service svc:/system/power management is enabled in global zonemedium
      pass
      Service svc:/system/scheduler is enabled in global zonemedium
      pass
      Service svc:/system/system-log is enabledmedium
      pass
      Service svc:/system/utmp is enabledmedium
      pass
      Service svc:/system/zones is enabled in global zonemedium
      pass
      Service svc:/system/zones-install is enabledmedium
      pass
      Service svc:/network/inetd is enabledmedium
      pass
      Service svc:/network/ntp is enabled and properly configured as a clientmedium
      fail
      Service svc:/network/rpc/bind is enabledmedium
      pass
      Service svc:/network/rpc/gss is enabled if and only if Kerberos is configuredmedium
      fail
      Service svc:/network/sendmail-client is enabledmedium
      pass
      Service svc:/network/smtp:sendmail is enabledmedium
      fail
      Service svc:/network/smtp:sendmail only listens on loopbackmedium
      pass
      Service svc:/network/ssh is enabledmedium
      pass
      Service svc:/application/stosreg is enabled in global zonemedium
      pass
      Disable services that are not required 8x fail
      The NIS client service is disabled or not installedmedium
      pass
      The NIS server service is disabled or not installedmedium
      pass
      The r-protocols services are disabled in PAMmedium
      pass
      mesg(1) prevents talk(1) and write(1) access to remote terminalsmedium
      fail
      ssh(1) is the only service binding a listener to non-loopback addressesmedium
      fail
      Service svc:/network/dhcp-server is disabled or not installedmedium
      pass
      Service svc:/network/dns/multicast is disabled or not installedmedium
      pass
      Service svc:/network/finger is disabled or not installedmedium
      pass
      Service svc:/network/ftp is disabled or not installedhigh
      pass
      Service svc:/network/http:apache22 is disabled or not installedmedium
      pass
      Service svc:/network/login:rlogin is disabled or not installedhigh
      pass
      Service svc:/network/login:klogin is disabled or not installedmedium
      pass
      Service svc:/network/login:eklogin is disabled or not installedmedium
      pass
      Service svc:/network/nfs/cbd is disabled or not installedlow
      pass
      Service svc:/network/nfs/client is disabled or not installedlow
      pass
      Service svc:/network/nfs/fedfs-client is disabled or not installedmedium
      fail
      Service svc:/network/nfs/mapid is disabled or not installedlow
      fail
      Service svc:/network/nfs/nlockmgr is disabled or not installedlow
      pass
      Service svc:/network/nfs/rquota is disabled or not installedlow
      pass
      Service svc:/network/nfs/server is disabled or not installedlow
      pass
      Service svc:/network/nfs/status is disabled or not installedlow
      pass
      Service svc:/network/comsat is disabled or not installedhigh
      pass
      Service svc:/network/rarp is disabled or not installedmedium
      pass
      Service svc:/network/rexec is disabled or not installedhigh
      pass
      Service svc:/network/slp is disabled or not installedmedium
      pass
      Service svc:/network/stdiscover is disabled or not installedmedium
      pass
      Service svc:/network/stlisten is disabled or not installedmedium
      pass
      Service svc:/network/talk is disabled or not installedhigh
      pass
      Service svc:/network/telnet is disabled or not installedhigh
      pass
      Service svc:/network/uucp is disabled or not installedhigh
      pass
      Service svc:/network/security/kadmin is disabled or not installedmedium
      pass
      Service svc:/network/security/krb5_prop is disabled or not installedmedium
      pass
      Service svc:/network/security/krb5kdc is disabled or not installedmedium
      pass
      Service svc:/network/security/ktkt_warn is disabled or not installedmedium
      pass
      Service svc:/network/shell:default is disabled or not installedmedium
      pass
      Service svc:/network/shell:kshell is disabled or not installedmedium
      pass
      Service svc:/network/chargen:stream is disabled or not installedhigh
      pass
      Service svc:/network/chargen:dgram is disabled or not installedhigh
      pass
      Service svc:/network/daytime:stream is disabled or not installedhigh
      pass
      Service svc:/network/daytime:dgram is disabled or not installedhigh
      pass
      Service svc:/network/discard:stream is disabled or not installedhigh
      pass
      Service svc:/network/discard:dgram is disabled or not installedhigh
      pass
      Service svc:/network/echo:stream is disabled or not installedhigh
      pass
      Service svc:/network/echo:dgram is disabled or not installedhigh
      pass
      Service svc:/network/time:stream is disabled or not installedhigh
      pass
      Service svc:/network/time:dgram is disabled or not installedhigh
      pass
      Service svc:/network/rpc/keyserv is disabled or not installedlow
      pass
      Service svc:/network/rpc/keyserv cannot use the nobody user keymedium
      fail
      Service svc:/network/rpc/meta is disabled or not installedmedium
      pass
      Service svc:/network/rpc/metamed is disabled or not installedmedium
      pass
      Service svc:/network/rpc/metamh is disabled or not installedmedium
      pass
      Service svc:/network/rpc/rex is disabled or not installedmedium
      pass
      Service svc:/network/rpc/rstat is disabled or not installedmedium
      pass
      Service svc:/network/rpc/rusers is disabled or not installedmedium
      pass
      Service svc:/network/rpc/smserver is disabled or not installedmedium
      fail
      Service svc:/network/rpc/spray is disabled or not installedmedium
      pass
      Service svc:/network/rpc/wall is disabled or not installedmedium
      pass
      Service svc:/network/smb/client is disabled or not installedmedium
      pass
      Service svc:/system/avahi-bridge-dsd is disabled or not installedmedium
      pass
      Service svc:/system/filesystem/rmvolmgr is disabled or not installedmedium
      fail
      Service svc:/application/cups/in-lpd is disabled or not installedmedium
      pass
      Service svc:/application/graphical-login/gdm is disabled or not installedmedium
      fail
      Service svc:/application/management/net-snmp is disabled or not installedmedium
      pass
      Service svc:/application/x11/xfs is disabled or not installedmedium
      pass
      Configure access and warning banners 7x fail
      /etc/motd and /etc/issue contain appropriate policy textmedium
      fail
      The ftp(1) banner shows a suitable security messagemedium
      pass
      The gdm(1M) banner shows a suitable security messagemedium
      fail
      The ssh(1) banner shows a suitable security messagemedium
      pass
      The telnet(1) banner shows a suitable security messagemedium
      pass
      Use of the cron(1M) and at(1) daemons is restrictedmedium
      fail
      Name services are set to all local (files) onlymedium
      fail
      Find and list remote consolesmedium
      pass
      Remote serial logins are disabledmedium
      pass
      root access is console-onlymedium
      pass
      ftp(1) is restricted to a specific set of usersmedium
      pass
      Files written in ftp(1) sessions have a suitable umaskmedium
      pass
      The GNOME desktop has suitable screensaver settingsmedium
      pass
      gdm(1M) does not accept logins without passwordshigh
      pass
      ssh(1) requires passwordsmedium
      fail
      ssh(1) does not forward X11medium
      fail
      Consecutive login attempts for ssh(1) are limitedmedium
      fail
      rhost-based authentication in ssh(1) is disabledmedium
      pass
      root login by using ssh(1) is disabledmedium
      pass
      Verify audit configuration 2x fail
      The auditd(1M) daemon is enabledmedium
      pass
      Audit parameters are set to recommended valuesmedium
      fail
      All roles are audited with the "cusa" audit classmedium
      fail
      Verify user configuration 12x fail
      Passwords are hashed with a secure algorithmhigh
      pass
      Password history logs the last ten passwordsmedium
      fail
      Passwords allow repeat charactersmedium
      pass
      Passwords allow whitespacemedium
      pass
      Passwords require at least two alphabetic charactersmedium
      pass
      Passwords require at least three characters difference from the previous passwordmedium
      pass
      Passwords require at least one digitmedium
      fail
      Passwords require at least one lowercase charactermedium
      fail
      Passwords require a minimum of one non-alphabetic charactermedium
      pass
      Passwords require at least one special charactermedium
      fail
      Passwords require at least one uppercase charactermedium
      fail
      Passwords require at least eight charactershigh
      fail
      Passwords cannot be changed for at least three weeksmedium
      fail
      Passwords must be changed at least every 13 weeksmedium
      fail
      DICTIONBDIR is set to /var/passwdmedium
      pass
      DISABLETIME is set for loginsmedium
      pass
      SLEEPTIME following an invalid login attempt is set to 4medium
      pass
      NAMECHECK for passwords is set to YESmedium
      pass
      Logins require passwordshigh
      pass
      Default system accounts are lockedmedium
      pass
      Default system accounts are no-loginmedium
      pass
      Reserved system accounts remain unusedmedium
      fail
      root is a rolemedium
      pass
      root is the only user with UID=0medium
      pass
      The root password is hashed with the SHA-256 algorithmhigh
      pass
      The root PATH variable is correctmedium
      pass
      Role details are unchangedmedium
      fail
      shadow(4) password fields are not emptyhigh
      pass
      All groups specified in /etc/passwd are defined in /etc/groupmedium
      pass
      Find and list duplicate GIDsmedium
      pass
      Find and list duplicate group namesmedium
      pass
      Find and list duplicate UIDsmedium
      pass
      Find and list duplicate usernamesmedium
      pass
      Inactive user accounts will be locked after 35 daysmedium
      fail
      The default user UMASK is 022medium
      pass
      Local users are assigned home directoriesmedium
      pass
      Home directories for all users existmedium
      pass
      User home directories have appropriate permissionsmedium
      fail
      User home directory ownership is correctmedium
      pass
      Find and list .rhosts filesmedium
      pass
      Find and list .forward filesmedium
      pass
      Find and list .netrc filesmedium
      pass
      Permissions on User .netrc Files are correctmedium
      pass
      Permissions on User "." (Hidden) Files are correctmedium
      pass

      Result Details

      The OS version is currentOSC-53005

      The OS version is current

      Rule IDOSC-53005
      Result
      pass
      Time2016-12-24T16:23:32
      Severitymedium
      Identifiers and References
      Description

      Systems should be kept up to date to ensure that the latest security and operational updates are installed. You can run 'pkg update -n' to check the current state of the system against the configured repositories.

      Package integrity is verifiedOSC-54005

      Package integrity is verified

      Rule IDOSC-54005
      Result
      fail
      Time2016-12-24T16:26:23
      Severityhigh
      Identifiers and References
      Description

      Run 'pkg verify' to check that all installed Oracle Solaris software matches the packaging database and that ownership, permissions and content are correct.

      SCE stdout
      The following packages showed errors
      pkg://solaris/library/python/pycairo-27                                  ERROR
      pkg://solaris/library/python/pygobject-27                                ERROR
      pkg://solaris/library/python/pygtk2-27                                   ERROR
      pkg://solaris/library/python/python-gnome-27                             ERROR
      pkg://solaris/system/device-administration                               ERROR
      pkg://solaris/system/kernel                                              ERROR
      pkg://solaris/system/management/rad/client/rad-python                    ERROR
      Run 'pkg verify' to determine the nature of the errors.
      
      Remediation description:
      'pkg verify' has produced errors. Rerun the command and evaluate the errors. As appropriate, based on errors found, you should run 'pkg fix <package-fmri>' See the pkg(1) man page.
      Remediation script:
      
          # pkg verify
          followed by
          # pkg fix <package-fmri>
            
      Package signature checking is globally activatedOSC-53505

      Package signature checking is globally activated

      Rule IDOSC-53505
      Result
      pass
      Time2016-12-24T16:26:23
      Severitymedium
      Identifiers and References
      Description

      Package signature checking should be globally activated.

      Booting the system should require a passwordOSC-04511

      Booting the system should require a password

      Rule IDOSC-04511
      Result
      fail
      Time2016-12-24T16:26:23
      Severitymedium
      Identifiers and References
      Description

      The GRUB menu, the BIOS, and the eeprom should be password-protected to prevent configuration by unauthorized users. The BIOS protections prevent booting from an external device, such as a USB flash drive.

      SCE stdout
          x86 GRUB password not set in /rpool/boot/grub/grub.cfg
      
      Remediation description:
      On an x86, create passwords for the BIOS and the GRUB menu. On SPARC, protect the eeprom with a password.
      Remediation script:
      
          1. x86 BIOS Fix:
            Consult the hardware vendor's documentation to determine how to start
            the system and access the BIOS controls.
            Access the system's BIOS or system controller. Set an administrator
            password if one has not been set. Disable a user-level password
            if one has been set.
          2. x86 GRUB Fix:
            2a. Get the GRUB hash of your password
              # /usr/lib/grub2/bios/bin/grub-mkpasswd-pbkdf2
              Enter password: xxxxxxxx
              Reenter password: xxxxxxxx
              PBKDF2 hash of your password is <grub.xxxxxxxx.sha512.hash>
            2b. Create the GRUB password file:
              /usr/lib/grub2/bios/etc/grub.d/01_password
      
              The contents of that file is:
                #!/bin/sh
                /usr/bin/cat > /rpool/boot/grub/password.cfg<<EOF
                #
                # GRUB password
                #
                set superusers="root"
                password_pbkdf2 root <grub.xxxxxxxx.sha512.hash>
                EOF
                /usr/bin/chmod 600 /rpool/boot/grub/password.cfg
                /usr/bin/echo 'source /@/boot/grub/password.cfg'
              When GRUB2 runs its "rc" files, it executes grub.d/01_password
              which creates /rpool/boot/grub/passwd.cfg mode 600
            2c. Protect the file:
              # /usr/bin/chmod 700 /usr/lib/grub2/bios/etc/grub.d/01_password
            2d. Move the contents to the password.cfg file:
              # /usr/bin/cat > /usr/lib/grub2/bios/etc/grub.d/01_password <<BAT
              #!/bin/sh
              /usr/bin/cat > /rpool/boot/grub/password.cfg<<EOF
              #
              # GRUB password
              #
              set superusers="root"
              password_pbkdf2 root <grub.pbkdf2.sha512 hash>
              EOF
              /usr/bin/chmod 600 /rpool/boot/grub/password.cfg
              /usr/bin/echo 'source /@/boot/grub/password.cfg'
              BAT
            2e. Set a timeout for the menu:
              # /usr/sbin/bootadm set-menu timeout=30
              If the site has changed the timeout, use the value
              returned by /usr/sbin/bootadm list-menu.
            2f. Verify the result:
              # /usr/bin/grep "password.cfg" /rpool/boot/grub/grub.cfg
              source /@/boot/grub/password.cfg
          3. SPARC eeprom fix: The security mode should be command or full:
            # eeprom security-mode=command
      
            Changing PROM password:
            New password: xxxxxxxx
            Retype new password: xxxxxxxx
            
      Address Space Layout Randomization (ASLR) is enabledOSC-01511

      Address Space Layout Randomization (ASLR) is enabled

      Rule IDOSC-01511
      Result
      pass
      Time2016-12-24T16:26:23
      Severitymedium
      Identifiers and References
      Description

      Oracle Solaris tags many of its userland binaries to enable Address Space Layout Randomization (ASLR). ASLR randomizes the starting address of key parts of an address space. This security defense mechanism can cause Return Oriented Programming (ROP) attacks to fail when they try to exploit software vulnerabilities. See the sxadm(1M) man page.
      Zones inherit this randomized layout for their processes. Because the use of ASLR might not be optimal for all binaries, the use of ASLR is configurable at the zone level and at the binary level.

      Stacks are non-executableOSC-75511

      Stacks are non-executable

      Rule IDOSC-75511
      Result
      fail
      Time2016-12-24T16:26:23
      Severitymedium
      Identifiers and References
      Description

      Programs read and write data on the stack. Typically, they execute from read-only portions of memory that are specifically designated for code. Some attacks that cause buffers on the stack to overflow try to insert new code on the stack and cause the program to execute it. Removing execute permission from the stack memory prevents these attacks from succeeding. Properly written programs function correctly without using executable stacks.

      Remediation description:
      Set noexec parameters in the /etc/system file, then reboot.
      Remediation script:
      
          # pfedit /etc/system
          set noexec_user_stack=1
          set noexec_user_stack_log=1
      
          # reboot
            
      The umask(1) for SMF services is 022OSC-77500

      The umask(1) for SMF services is 022

      Rule IDOSC-77500
      Result
      pass
      Time2016-12-24T16:26:23
      Severitymedium
      Identifiers and References
      Description

      Files that the Service Management Facility (SMF) creates should be created with 644 file permissions.

      Service svc:/network/ipfilter is enabledOSC-27505

      Service svc:/network/ipfilter is enabled

      Rule IDOSC-27505
      Result
      fail
      Time2016-12-24T16:26:23
      Severitymedium
      Identifiers and References
      Description

      IP Filter is a host-based firewall that provides stateful packet filtering and network address translation (NAT). Packet filtering provides basic protection against network-based attacks. IP Filter also includes stateless packet filtering and can create and manage address pools. See the ipf(1M) and ipfilter(5) man pages.

      Remediation description:
      Enable IP Filter.
      Remediation script:
      
          # svcadm svc:/network/ipfilter:default
            
      The tcp_wrappers feature is enabledOSC-88011

      The tcp_wrappers feature is enabled

      Rule IDOSC-88011
      Result
      fail
      Time2016-12-24T16:26:23
      Severitymedium
      Identifiers and References
      Description

      TCP wrappers provides a way of implementing access controls by checking the address of a host that is requesting a particular network service against an ACL. Requests are granted or denied accordingly. TCP wrappers also logs host requests for network services, which is a useful monitoring function. The ssh(1) and sendmail(1M) services are configured to use TCP wrappers. Network services that might be placed under access control include proftpd(8) and rpcbind(1M). See the tcpd(1M) man page.

      Remediation description:
      For most TCP services, see the Network Administration Guide (http://www.oracle.com/pls/topic/lookup?ctx=solaris11&id=NWIPA). For FTP, see the Security Guidelines (http://www.oracle.com/pls/topic/lookup?ctx=solaris11&id=SYSADV7).
      Remediation script:
      
          1) Create an /etc/hosts.deny file containing the one line:
            ALL:ALL
          2) Create an /etc/hosts.allow file containing those connections which you
          want to allow. For detailed instructions, see the hosts_access(4),
          and tcpd(1M) man pages.
            
      All local filesystems are ZFSOSC-16005

      All local filesystems are ZFS

      Rule IDOSC-16005
      Result
      pass
      Time2016-12-24T16:26:23
      Severitymedium
      Identifiers and References
      Description

      ZFS is the default filesystem for Oracle Solaris. On most systems other filesystem types should not be mounted. See the zfs(7FS) man page.

      Non-root ZFS filesystems are encryptedOSC-17000

      Non-root ZFS filesystems are encrypted

      Rule IDOSC-17000
      Result
      fail
      Time2016-12-24T16:26:23
      Severitymedium
      Identifiers and References
      Description

      All ZFS file systems that are not the root file system should be encrypted. Encryption must be applied at filesystem creation. You must remember the encryption passphrase. Store it in a safe place. See the zfs(1M) and zfs_encrypt(1M) man pages.

      SCE stdout
      ZFS encryption not set on the following non-root file systems:
      rpool/export
      rpool/export/home
      rpool/export/home/ccebi
      rpool/zones
      rpool/zones/labzone
      rpool/zones/labzone/rpool
      rpool/zones/labzone/rpool/export
      rpool/zones/labzone/rpool/export/home
      
      Remediation description:
      Back up any data needed from any unencrypted non-root file system. Unmount and destroy those offending file systems. Re-create the file systems with encryption on (default algorithm is aes-128-ccm). Remember the passphrase! Restore data (preserved earlier) to the file systems.
      Remediation script:
      
          # zfs create -o encryption=on  <ZFS-non-root-filesystem>
            
      swap(1M) is encryptedOSC-78000

      swap(1M) is encrypted

      Rule IDOSC-78000
      Result
      fail
      Time2016-12-24T16:26:23
      Severitymedium
      Identifiers and References
      Description

      Swap space, either a ZFS volume or raw device, should be encrypted. Encryption ensures that any sensitive data, such as user passwords, are protected if the system needs to swap those pages out to disk. See the swap(1M) man page.

      Remediation description:
      To edit the vfstab file, you must become an administrator with the solaris.admin.edit/etc/vfstab authorization. The root role has this authorization.
      Specify the encrypted option in vfstab(4) for the swap device entry.
      Remediation script:
      
          # pfedit /etc/vfstab
          ...
          /dev/zvol/dsk/rpool/swap     -       -      swap     - no    encrypted
            
      A size limit is set on tmpfs(7FS)OSC-16500

      A size limit is set on tmpfs(7FS)

      Rule IDOSC-16500
      Result
      fail
      Time2016-12-24T16:26:23
      Severitymedium
      Identifiers and References
      Description

      The size of the tmpfs file system is not limited by default. To avoid a performance impact, you can limit the size of each tmpfs mount. See the mount_tmpfs(1M) and vfstab(4) man pages.

      Remediation description:
      To edit the vfstab file, you must become an administrator with the solaris.admin.edit/etc/vfstab authorization. To reboot the system, you must be assigned the Maintenance and Repair rights profile. The root role has all of these rights.
      Set a limit on the tmpfs file system in the /etc/vfstab file, then reboot the system. For more information, see the Security Guidelines (http://www.oracle.com/pls/topic/lookup?ctx=solaris11&id=SYSADV7).
      Remediation script:
      
          Determine the limit of the tmpfs file system according to the size
          of your disks.
          # pfedit /etc/vfstab
          ...
          swap  -  /tmp  tmpfs  -  yes  size=sz
          # reboot
            
      World-writable directories have sticky bit setOSC-14500

      World-writable directories have sticky bit set

      Rule IDOSC-14500
      Result
      pass
      Time2016-12-24T16:26:40
      Severitymedium
      Identifiers and References
      Description

      The sticky bit on a directory prevents files in a world-writable directory from being deleted or moved by anyone except the owner of the file, or root. This is useful in directories that are common to many users, such as the /tmp directory.

      coreadm(1M) configuration is correctOSC-07500

      coreadm(1M) configuration is correct

      Rule IDOSC-07500
      Result
      fail
      Time2016-12-24T16:26:41
      Severitymedium
      Identifiers and References
      Description

      Core dumps can contain sensitive data. Protections can include file permissions and logging core dump events. See the coreadm(1m) and chmod(1M) man pages.

      SCE stdout
          coreadm(1M) global core file pattern is not correct.
          coreadm(1M) global core dumps is not correct.
          coreadm(1M) per-process core dumps is not correct.
          coreadm(1M) global setid core dumps is not correct.
          coreadm(1M) global core dump logging is not correct.
          Permissions or ownership not correct on /var/cores
      coreadm configuration is not correct
      
      Remediation description:
      Locate the directory and protect the core dumps. Protections include file permissions and logging.
      Remediation script:
      
          Use the coreadm command to view and set the current configuration.
          Configure the core files and protect the core dump directory. 
      
          $ coreadm
          global core file pattern: /var/share/cores/core.%f.%p
          global core file content: default
          init core file pattern: core
          init core file content: default
          global core dumps: enabled
          per-process core dumps: enabled
          global setid core dumps: disabled
          per-process setid core dumps: disabled
          global core dump logging: enabled
      
          To set the correct coreadm(1M) configuration:
          # coreadm -g /var/cores/core_%n_%f_%u_%g_%t_%p \
          -e log -e global -e global-setid \
          -d process -d proc-setid
      
          To check the permissions:
          # ls -ld /var/share/cores
          drwx------   2 root     root           2 Nov  2  2014 cores/
          #
      
          To set the permissions correctly on the directory:
          # chmod 700 /var/share/cores
            
      Find and list world writable filesOSC-13000

      Find and list world writable files

      Rule IDOSC-13000
      Result
      pass
      Time2016-12-24T16:27:33
      Severitymedium
      Identifiers and References
      Description

      World-writable files are unprotected files. Modification and removal of a file should be limited to the owner of the file.

      Find and list suid and sgid files other than those in standard Oracle Solaris packagesOSC-13500

      Find and list suid and sgid files other than those in standard Oracle Solaris packages

      Rule IDOSC-13500
      Result
      fail
      Time2016-12-24T16:30:50
      Severityhigh
      Identifiers and References
      Description

      Programs that set the UID and GID offer entry points for malicious code.

      SCE stdout
          WARNING set-id file /opt/VirtualBoxAdditions/VBoxISAExec not found in package contents
          WARNING set-id file /opt/VirtualBoxAdditions/VBoxClient not found in package contents
          WARNING set-id file /opt/VirtualBoxAdditions/vboxmslnk not found in package contents
          WARNING set-id file /opt/VirtualBoxAdditions/VBoxService not found in package contents
          WARNING set-id file /opt/VirtualBoxAdditions/VBoxControl not found in package contents
      
      Remediation description:
      Remove files that have the setuid or setgid bit set, or remove the bit.
      Remediation script:
      
          # rm <setid-file>
      
          or
      
          # chmod -s <setid-file>
            
      Find and list files with no known ownerOSC-14000

      Find and list files with no known owner

      Rule IDOSC-14000
      Result
      fail
      Time2016-12-24T16:31:32
      Severitymedium
      Identifiers and References
      Description

      Files with no owner should be removed. Accounts that are closed should be archived and removed from the system.

      SCE stdout
      The following unowned files have been found on /var:
       7545    2 drwx------   2 65432    staff           3 Jul 14 12:30 /var/tmp/keyring-8MQr3q
       7547    2 drwx------   2 65432    staff           4 Jul 14 12:30 /var/tmp/keyring-txoN45
       7553    2 drwx------   2 65432    staff           4 Jul 14 12:30 /var/tmp/keyring-ppMjK6
       7527   11 drwx------   2 65432    staff          19 Jul 14 12:30 /var/tmp/orbit-jack
      
      Remediation description:
      Remove unowned files. If the files were owned by an account that is closed, archive the files before removing them. See the rm(1) man page.
      Remediation script:
      
          # rm <unowned-files>
            
      Find and list files with extended attributesOSC-15000

      Find and list files with extended attributes

      Rule IDOSC-15000
      Result
      pass
      Time2016-12-24T16:31:47
      Severitymedium
      Identifiers and References
      Description

      Oracle Solaris implements extended attributes as files in an "extended attribute" name space visible only by using extended attribute aware commands. It is possible for attackers or malicious users to hide information in the extended attribute name space. Oracle Solaris currently does not ship any files with extended attributes. See the runat(1) and fsattr(5) man pages.

      Directed broadcasts are not forwardedOSC-79510

      Directed broadcasts are not forwarded

      Rule IDOSC-79510
      Result
      pass
      Time2016-12-24T16:31:47
      Severitymedium
      Identifiers and References
      Description

      By default, Oracle Solaris forwards broadcast packets. To reduce the possibility of broadcast flooding, change the default. Note that you are also disabling broadcast pings.

      Source-routed packets are not forwardedOSC-87010

      Source-routed packets are not forwarded

      Rule IDOSC-87010
      Result
      pass
      Time2016-12-24T16:31:47
      Severitymedium
      Identifiers and References
      Description

      To prevent DOS attacks from spoofed packets, ensure that source-routed packets are not forwarded. The default is not to forward them.

      TCP reverse source routing is disabledOSC-86010

      TCP reverse source routing is disabled

      Rule IDOSC-86010
      Result
      pass
      Time2016-12-24T16:31:47
      Severitymedium
      Identifiers and References
      Description

      The default value prevents packets from bypassing network security measures. Source-routed packets allow the source of the packet to suggest a path different from the path configured on the router. Note - This parameter might be set to 1 for diagnostic purposes. After diagnosis is complete, return the value to 0.

      ICMP redirects are disabledOSC-82010

      ICMP redirects are disabled

      Rule IDOSC-82010
      Result
      fail
      Time2016-12-24T16:31:47
      Severitymedium
      Identifiers and References
      Description

      Routers use ICMP redirect messages to inform hosts of more direct routes to a destination. An illicit ICMP redirect message could result in a man-in-the-middle attack.

      SCE stdout
          The current values of _ignore_redirect for ipv4 are:
      PROTO PROPERTY              PERM CURRENT      PERSISTENT   DEFAULT      POSSIBLE
      ipv4  _ignore_redirect      rw   0            --           0            0,1
      
          The current values of _ignore_redirect for ipv6 are:
      PROTO PROPERTY              PERM CURRENT      PERSISTENT   DEFAULT      POSSIBLE
      ipv6  _ignore_redirect      rw   0            --           0            0,1
      
      Remediation description:
      ICMP redirects are managed using the ipadm command. See the ipadm(1M) man page.
      Remediation script:
      
          To fix
          # ipadm set-prop -p _ignore_redirect=1 ipv4
          and
          # ipadm set-prop -p _ignore_redirect=1 ipv6
            
      Responses to echo requests on multicast addresses are disabledOSC-85510

      Responses to echo requests on multicast addresses are disabled

      Rule IDOSC-85510
      Result
      fail
      Time2016-12-24T16:31:47
      Severitymedium
      Identifiers and References
      Description

      To prevent the dissemination of information about the network topology, disable these responses.

      SCE stdout
         The current values of _respond_to_echo_multicast for ipv4 are:
      PROTO PROPERTY              PERM CURRENT      PERSISTENT   DEFAULT      POSSIBLE
      ipv4  _respond_to_echo_multicast rw 1         --           1            0,1
      
         The current values of _respond_to_echo_multicast for ipv6 are:
      PROTO PROPERTY              PERM CURRENT      PERSISTENT   DEFAULT      POSSIBLE
      ipv6  _respond_to_echo_multicast rw 1         --           1            0,1
      
      Remediation description:
      Responses to echo requests are managed using the ipadm command. See the ipadm(1M) man page.
      Remediation script:
      
          To fix
          # ipadm set-prop -p _respond_to_echo_multicast=0 ipv4
          and
          # ipadm set-prop -p _respond_to_echo_multicast=0 ipv6
            
      Responses to ICMP broadcast timestamp requests are disabledOSC-81510

      Responses to ICMP broadcast timestamp requests are disabled

      Rule IDOSC-81510
      Result
      pass
      Time2016-12-24T16:31:47
      Severitymedium
      Identifiers and References
      Description

      To prevent the dissemination of information about the network topology, disable these responses if they are currently enabled.

      Responses to ICMP echo requests on broadcast addresses are disabledOSC-80510

      Responses to ICMP echo requests on broadcast addresses are disabled

      Rule IDOSC-80510
      Result
      fail
      Time2016-12-24T16:31:47
      Severitymedium
      Identifiers and References
      Description

      To prevent the dissemination of information about the network topology, disable these responses if they are currently enabled.

      SCE stdout
         The current values for _respond_to_echo_broadcast are:
      PROTO PROPERTY              PERM CURRENT      PERSISTENT   DEFAULT      POSSIBLE
      ip    _respond_to_echo_broadcast rw 1         --           1            0,1
      
      Remediation description:
      Responses to ICMP echo requests on broadcast addresses are managed using the ipadm command. See the ipadm(1M) man page.
      Remediation script:
      
          To fix
          # ipadm set-prop -p _respond_to_echo_broadcast=0 ip
            
      Responses to ICMP netmask requests are disabledOSC-81010

      Responses to ICMP netmask requests are disabled

      Rule IDOSC-81010
      Result
      pass
      Time2016-12-24T16:31:47
      Severitymedium
      Identifiers and References
      Description

      To prevent the dissemination of information about the network topology, disable these responses if they are currently enabled.

      Responses to ICMP timestamp requests are disabledOSC-82510

      Responses to ICMP timestamp requests are disabled

      Rule IDOSC-82510
      Result
      pass
      Time2016-12-24T16:31:47
      Severitymedium
      Identifiers and References
      Description

      The default value removes additional CPU demands on systems and prevents the dissemination of information about the network.

      Routing daemons are disabledOSC-86510

      Routing daemons are disabled

      Rule IDOSC-86510
      Result
      fail
      Time2016-12-24T16:31:47
      Severitymedium
      Identifiers and References
      Description

      Systems in a secure datacenter should not need automatic routing reconfiguration.

      Remediation description:
      List all routing services and daemons by running routeadm(1M) command. Stop running any routing configuration daemons by using svcadm to disable the services associated with them. The route(1M) command can be used to establish any static routes needed for the system.
      Remediation script:
      
          # routeadm
          # svcadm disable <routing service FMRI>
            
      Strict multihoming is enabledOSC-87500

      Strict multihoming is enabled

      Rule IDOSC-87500
      Result
      fail
      Time2016-12-24T16:31:48
      Severitymedium
      Identifiers and References
      Description

      For systems that are gateways to other domains, such as a firewall or a VPN node, strict multihoming must be enabled. The hostmodel property controls the send and receive behavior for IP packets on a multihomed system.

      SCE stdout
         The current values of _strict_dst_multihoming for ipv4 are:
      PROTO PROPERTY              PERM CURRENT      PERSISTENT   DEFAULT      POSSIBLE
      ipv4  _strict_dst_multihoming rw 0            --           0            0-1
      
         The current values of _strict_dst_multihoming for ipv6 are:
      PROTO PROPERTY              PERM CURRENT      PERSISTENT   DEFAULT      POSSIBLE
      ipv6  _strict_dst_multihoming rw 0            --           0            0-1
      
      Remediation description:
      Strict multihoming should be set to "1" so that packets don't get accepted on a different interface. The default is "0"
      Remediation script:
      
          To fix
          # ipadm set-prop -p _strict_dst_multihoming=1 ipv4
          and
          # ipadm set-prop -p _strict_dst_multihoming=1 ipv6
            
      Strong TCP packet sequence numberingOSC-83002

      Strong TCP packet sequence numbering

      Rule IDOSC-83002
      Result
      pass
      Time2016-12-24T16:31:48
      Severitymedium
      Identifiers and References
      Description

      Ensure that the TCP initial sequence number generation parameter complies with RFC 6528 (http://www.ietf.org/rfc/rfc6528.txt).

      The maximum number of half-open TCP connections is at least 4096OSC-84000

      The maximum number of half-open TCP connections is at least 4096

      Rule IDOSC-84000
      Result
      fail
      Time2016-12-24T16:31:48
      Severitymedium
      Identifiers and References
      Description

      Setting the maximum half-open TCP connections to 4096 per IP address per port helps to defend against SYN flood denial of service attacks.

      SCE stdout
          The number of allowed half-open TCP connections is set to 1024
      
      Remediation description:
      The maximum number of half-open TCP connections is managed using the ipadm command. See the ipadm(1M) man page.
      Remediation script:
      
          To fix
          # ipadm set-prop -p _conn_req_max_q0=4096 tcp
            
      The maximum number of waiting TCP connections is set to at least 1024OSC-85000

      The maximum number of waiting TCP connections is set to at least 1024

      Rule IDOSC-85000
      Result
      fail
      Time2016-12-24T16:31:48
      Severitymedium
      Identifiers and References
      Description

      Setting the maximun number of queued incoming connections TCP to at least 1024 can help prevent certain Distributed Denial of Service (DDoS) attacks.

      SCE stdout
          The maximum number of concurrent TCP connections is set to 128
      
      Remediation description:
      The maximum number of waiting TCP connections is managed using the ipadm command. See the ipadm(1M) man page.
      Remediation script:
      
          To fix
          # ipadm set-prop -p _conn_req_max_q=1024 tcp
            
      Service svc:/system/coreadm is enabledOSC-07011

      Service svc:/system/coreadm is enabled

      Rule IDOSC-07011
      Result
      pass
      Time2016-12-24T16:31:48
      Severitymedium
      Identifiers and References
      Description

      The coreadm service manages the core files that are produced by processes that terminate abnormally. See the core(4) and coreadm(1M) man pages.

      Service svc:/system/cron is enabledOSC-08011

      Service svc:/system/cron is enabled

      Rule IDOSC-08011
      Result
      pass
      Time2016-12-24T16:31:48
      Severitymedium
      Identifiers and References
      Description

      The cron service manages the cron(1M) command, which runs processes that execute commands at specified dates and times. See the at(1), crontab(1), and cron(1M) man pages.

      Service svc:/system/cryptosvc is enabledOSC-09011

      Service svc:/system/cryptosvc is enabled

      Rule IDOSC-09011
      Result
      pass
      Time2016-12-24T16:31:48
      Severitymedium
      Identifiers and References
      Description

      The cryptosvc service manages the use of cryptographic mechanisms from the Cryptographic Framework feature of Oracle Solaris. See the cryptoadm(1M) man page.

      Service svc:/system/dbus is enabledOSC-10011

      Service svc:/system/dbus is enabled

      Rule IDOSC-10011
      Result
      pass
      Time2016-12-24T16:31:48
      Severitymedium
      Identifiers and References
      Description

      The dbus service manages the D-Bus message bus daemon. Programs use the message bus daemon to exchange messages with one another. For example, the Hardware Abstraction Layer (HAL) uses dbus. See the dbus-daemon(1) and hal(5) man pages.

      Service svc:/system/filesystem/autofs is enabledOSC-03511

      Service svc:/system/filesystem/autofs is enabled

      Rule IDOSC-03511
      Result
      pass
      Time2016-12-24T16:31:48
      Severitymedium
      Identifiers and References
      Description

      The autofs service manages the mount points for the automount(1M) daemon.

      Service svc:/system/hal is enabled in global zoneOSC-21511

      Service svc:/system/hal is enabled in global zone

      Rule IDOSC-21511
      Result
      pass
      Time2016-12-24T16:31:48
      Severitymedium
      Identifiers and References
      Description

      The Hardware Abstraction Layer (HAL) service manages dynamic hardware configuration changes. See the hal(5) man page. This service only runs in the global zone.

      Service svc:/system/identity:domain is enabledOSC-22011

      Service svc:/system/identity:domain is enabled

      Rule IDOSC-22011
      Result
      pass
      Time2016-12-24T16:31:48
      Severitymedium
      Identifiers and References
      Description

      The identity:domain service instance manages system identity. See the domainname(1M) man page.

      Service svc:/system/intrd is enabled in global zoneOSC-27011

      Service svc:/system/intrd is enabled in global zone

      Rule IDOSC-27011
      Result
      pass
      Time2016-12-24T16:31:48
      Severitymedium
      Identifiers and References
      Description

      The interrupt balancer (intrd) service monitors the assignments between interrupts and CPUs to ensure optimal performance. See the intrd(1M) man page. This service only runs in the global zone.

      Service svc:/system/keymap is enabled in global zoneOSC-28511

      Service svc:/system/keymap is enabled in global zone

      Rule IDOSC-28511
      Result
      pass
      Time2016-12-24T16:31:49
      Severitymedium
      Identifiers and References
      Description

      The keymap service manages the default configuration of the keyboard. See the kbd(1) man page. This service only runs in the global zone.

      Service svc:/system/name-service/cache is enabledOSC-35511

      Service svc:/system/name-service/cache is enabled

      Rule IDOSC-35511
      Result
      pass
      Time2016-12-24T16:31:49
      Severitymedium
      Identifiers and References
      Description

      The name-service/cache service manages the caching of name service information. See the nscd(1M) man page.

      Service svc:/system/name-service/switch is enabledOSC-36011

      Service svc:/system/name-service/switch is enabled

      Rule IDOSC-36011
      Result
      pass
      Time2016-12-24T16:31:49
      Severitymedium
      Identifiers and References
      Description

      The name-service/switch service manages the databases that contain information about hosts, users, and groups. See the nsswitch.conf(4) man page.

      Service svc:/system/ocm is enabledOSC-43011

      Service svc:/system/ocm is enabled

      Rule IDOSC-43011
      Result
      pass
      Time2016-12-24T16:31:49
      Severitymedium
      Identifiers and References
      Description

      The Oracle Configuration Manager (ocm) service collects configuration information and uploads it to the Oracle repository. See the configCCR(1M) man page.

      Service svc:/system/picl is enabled in global zoneOSC-52511

      Service svc:/system/picl is enabled in global zone

      Rule IDOSC-52511
      Result
      pass
      Time2016-12-24T16:31:49
      Severitymedium
      Identifiers and References
      Description

      The platform information and control (picl) service manages the publishing of platform configuration information that can respond to client requests for information about the configuration. See the picld(1M) and prtcpicl(1M) man pages. This service only runs in the global zone.

      Service svc:/system/power management is enabled in global zoneOSC-54511

      Service svc:/system/power management is enabled in global zone

      Rule IDOSC-54511
      Result
      pass
      Time2016-12-24T16:31:49
      Severitymedium
      Identifiers and References
      Description

      The system/power service manages the power management configuration of an Oracle Solaris system. See the poweradm(1M) man page. This service only runs in the global zone.

      Service svc:/system/scheduler is enabled in global zoneOSC-67011

      Service svc:/system/scheduler is enabled in global zone

      Rule IDOSC-67011
      Result
      pass
      Time2016-12-24T16:31:49
      Severitymedium
      Identifiers and References
      Description

      The system/scheduler service manages the process scheduler. See the dispadmin(1M) man page. This service only runs in the global zone.

      Service svc:/system/system-log is enabledOSC-78511

      Service svc:/system/system-log is enabled

      Rule IDOSC-78511
      Result
      pass
      Time2016-12-24T16:31:49
      Severitymedium
      Identifiers and References
      Description

      The system-log service reads and forwards system messages to the appropriate log files or users. See the syslogd(1M) and rsyslogd(1M) man pages.

      Service svc:/system/utmp is enabledOSC-95011

      Service svc:/system/utmp is enabled

      Rule IDOSC-95011
      Result
      pass
      Time2016-12-24T16:31:49
      Severitymedium
      Identifiers and References
      Description

      The utmp service manages a table of processes, detects when a process has terminated, and updates the table. See the utmpd(1M) man page.

      Service svc:/system/zones is enabled in global zoneOSC-97511

      Service svc:/system/zones is enabled in global zone

      Rule IDOSC-97511
      Result
      pass
      Time2016-12-24T16:31:49
      Severitymedium
      Identifiers and References
      Description

      The zones service manages the autoboot and graceful shutdown of zones. See the zones(5) and zonecfg(1M) man pages. This service only runs in the global zone.

      Service svc:/system/zones-install is enabledOSC-98011

      Service svc:/system/zones-install is enabled

      Rule IDOSC-98011
      Result
      pass
      Time2016-12-24T16:31:49
      Severitymedium
      Identifiers and References
      Description

      The zones-install service manages the auto-installation of zones.

      Service svc:/network/inetd is enabledOSC-26511

      Service svc:/network/inetd is enabled

      Rule IDOSC-26511
      Result
      pass
      Time2016-12-24T16:31:49
      Severitymedium
      Identifiers and References
      Description

      The inetd service manages the restarting of inet services. See the inetd(1M) man page.

      Service svc:/network/ntp is enabled and properly configured as a clientOSC-42011

      Service svc:/network/ntp is enabled and properly configured as a client

      Rule IDOSC-42011
      Result
      fail
      Time2016-12-24T16:31:49
      Severitymedium
      Identifiers and References
      Description

      The Network Time Protocol daemon should be enabled and properly configured as a client. The /etc/inet/ntp.conf file must include at least one server definition. The file should also contain the line "restrict default ignore" to prevent the client from also acting as a server.

      Remediation description:
      The ntp service should be installed on all systems where security and compliance is desired. If it is not installed on your system, install it using 'pkg install service/network/ntp'. Then configure the service properly as a client and enable the service.
      Remediation script:
      
          If needed
          # pkg install service/network/ntp
          then
          # vi /etc/inet/ntp.conf
          ...
          server <server IP address> iburst
          restrict default ignore
          ...
          # svcadm enable ntp
            
      Service svc:/network/rpc/bind is enabledOSC-62011

      Service svc:/network/rpc/bind is enabled

      Rule IDOSC-62011
      Result
      pass
      Time2016-12-24T16:31:49
      Severitymedium
      Identifiers and References
      Description

      The rpc/bind service manages the conversion of RPC program numbers to universal addresses. See the rpcbind(1M) man page.

      Service svc:/network/rpc/gss is enabled if and only if Kerberos is configuredOSC-63005

      Service svc:/network/rpc/gss is enabled if and only if Kerberos is configured

      Rule IDOSC-63005
      Result
      fail
      Time2016-12-24T16:31:49
      Severitymedium
      Identifiers and References
      Description

      The generic security service (gss) service manages the generation and validation of Generic Security Service Application Program Interface (GSS-API) security tokens. The gssd(1M) daemon operates between the kernel rpc and the GSS-API. Kerberos uses this service.

      Remediation description:
      Disable the rpc/gss service if Kerberos is not configured and not in use.
      Remediation script:
      
          # svcadm enable rpc/gss
            
      Service svc:/network/sendmail-client is enabledOSC-68011

      Service svc:/network/sendmail-client is enabled

      Rule IDOSC-68011
      Result
      pass
      Time2016-12-24T16:31:50
      Severitymedium
      Identifiers and References
      Description

      The sendmail-client service manages email on a client. The sendmail-client service needs to be running to ensure delivery of mail to local accounts such as root. See the sendmail(1M) man page.

      Service svc:/network/smtp:sendmail is enabledOSC-67511

      Service svc:/network/smtp:sendmail is enabled

      Rule IDOSC-67511
      Result
      fail
      Time2016-12-24T16:31:50
      Severitymedium
      Identifiers and References
      Description

      The sendmail service should be running. Otherwise, important system mail to root will not be delivered. If receipt of remote mail is not required, sendmail should be in local_only mode. See check OSC-68505-sendmail-local-only to verify that sendmail is running in local_only mode. See the sendmail(1M) man page.

      Remediation description:
      Enable the smtp:sendmail service.
      Remediation script:
      
          # svcadm enable smtp:sendmail
            
      Service svc:/network/smtp:sendmail only listens on loopbackOSC-68505

      Service svc:/network/smtp:sendmail only listens on loopback

      Rule IDOSC-68505
      Result
      pass
      Time2016-12-24T16:31:50
      Severitymedium
      Identifiers and References
      Description

      Check that sendmail listens in local_only mode. This is also called listens on loopback. See the sendmail(1M) and svccfg(1M) man pages

      Service svc:/network/ssh is enabledOSC-72011

      Service svc:/network/ssh is enabled

      Rule IDOSC-72011
      Result
      pass
      Time2016-12-24T16:31:50
      Severitymedium
      Identifiers and References
      Description

      The ssh service manages the Secure Shell (ssh) daemon, which provides secure encrypted communications between two untrusted hosts over an insecure network. By default, ssh is the only network service that can send and receive network packets on a newly-installed Oracle Solaris system. See the sshd(1M) man page.

      Service svc:/application/stosreg is enabled in global zoneOSC-77011

      Service svc:/application/stosreg is enabled in global zone

      Rule IDOSC-77011
      Result
      pass
      Time2016-12-24T16:31:50
      Severitymedium
      Identifiers and References
      Description

      The service tag OS registry inserter (stosreg) service manages the service tag registry. See the stclient(1M) man page. This service only runs in the global zone.

      The NIS client service is disabled or not installedOSC-40510

      The NIS client service is disabled or not installed

      Rule IDOSC-40510
      Result
      pass
      Time2016-12-24T16:31:50
      Severitymedium
      Identifiers and References
      Description

      By default, NIS client software is not installed. NIS is an RPC-based naming service that does not conform to current security requirements, so can be less secure than the LDAP naming service. See the nis(5) and ypbind(1M) man pages.

      The NIS server service is disabled or not installedOSC-41010

      The NIS server service is disabled or not installed

      Rule IDOSC-41010
      Result
      pass
      Time2016-12-24T16:31:50
      Severitymedium
      Identifiers and References
      Description

      By default, NIS server software is not installed. NIS is an RPC-based naming service that does not conform to current security requirements, that can be less secure than the LDAP naming service. See the nis(5) and ypserv(1M) man pages.

      The r-protocols services are disabled in PAMOSC-55010

      The r-protocols services are disabled in PAM

      Rule IDOSC-55010
      Result
      pass
      Time2016-12-24T16:31:50
      Severitymedium
      Identifiers and References
      Description

      By default, legacy services such as the r-protocols, rlogin(1) and rsh(1), are not installed. Their services, however, are defined in /etc/pam.d. See the pam.d(4) man page.

      mesg(1) prevents talk(1) and write(1) access to remote terminalsOSC-34510

      mesg(1) prevents talk(1) and write(1) access to remote terminals

      Rule IDOSC-34510
      Result
      fail
      Time2016-12-24T16:31:50
      Severitymedium
      Identifiers and References
      Description

      This program controls whether users can send messages by using write(1), talk(1) or other utilities to a terminal device. See the mesg(1) man page.

      Remediation description:
      Deny permission to remote users to send messages to the terminal.
      Remediation script:
      
          # mesg -n
            
      ssh(1) is the only service binding a listener to non-loopback addressesOSC-73505

      ssh(1) is the only service binding a listener to non-loopback addresses

      Rule IDOSC-73505
      Result
      fail
      Time2016-12-24T16:31:50
      Severitymedium
      Identifiers and References
      Description

      By default, ssh(1) is the only network service that can send and receive network packets on a newly-installed Oracle Solaris system. See the sshd(1M) man page.

      SCE stdout
      The following ports are open:
      *.54312 gnome-session
      
      Remediation description:
      Disable any unneeded services listening on the network.
      Remediation script:
      
          # svcadm disable <FMRI for unneeded service>
            
      Service svc:/network/dhcp-server is disabled or not installedOSC-10510

      Service svc:/network/dhcp-server is disabled or not installed

      Rule IDOSC-10510
      Result
      pass
      Time2016-12-24T16:31:50
      Severitymedium
      Identifiers and References
      Description

      By default, the dhcp-server service is not installed. If you are not using this system as a DHCP server, you should not install or enable the service.

      Service svc:/network/dns/multicast is disabled or not installedOSC-80010

      Service svc:/network/dns/multicast is disabled or not installed

      Rule IDOSC-80010
      Result
      pass
      Time2016-12-24T16:31:51
      Severitymedium
      Identifiers and References
      Description

      Multicast DNS (mDNS) implements DNS in a small network where no conventional DNS server has been installed. DNS Service Discovery (DNS-SD) extends multicast DNS to also provide simple service discovery (network browsing). This service is disabled by default, because while it can ease finding hosts and servers, it can also provide information about the network to malicious users. See the named(1M) and mdnsd(1M) man pages.

      Service svc:/network/finger is disabled or not installedOSC-15510

      Service svc:/network/finger is disabled or not installed

      Rule IDOSC-15510
      Result
      pass
      Time2016-12-24T16:31:51
      Severitymedium
      Identifiers and References
      Description

      This legacy service enables users to display information about local and remote users. By default, this service is not installed as part of solaris-small-server. It is however installed as part of solaris-large-server. This service is almost never needed and either should be removed or at least, disabled. See the fingerd(1M) and finger(1) man pages.

      Service svc:/network/ftp is disabled or not installedOSC-17510

      Service svc:/network/ftp is disabled or not installed

      Rule IDOSC-17510
      Result
      pass
      Time2016-12-24T16:31:51
      Severityhigh
      Identifiers and References
      Description

      The FTP service provides unencrypted file transfer service and uses plain text authentication. The secure copy program (scp(1)) program should be used instead of FTP as it provides encrypted authentication and file transfer.

      Service svc:/network/http:apache22 is disabled or not installedOSC-01010

      Service svc:/network/http:apache22 is disabled or not installed

      Rule IDOSC-01010
      Result
      pass
      Time2016-12-24T16:31:51
      Severitymedium
      Identifiers and References
      Description

      This program provides Apache web server services by using the Apache hypertext transfer protocol (http). See the httpd(8) man page.

      Service svc:/network/login:rlogin is disabled or not installedOSC-58010

      Service svc:/network/login:rlogin is disabled or not installed

      Rule IDOSC-58010
      Result
      pass
      Time2016-12-24T16:31:51
      Severityhigh
      Identifiers and References
      Description

      This legacy service enables users to log in remotely. By default, this service is not installed as part of solaris-small-server. See the rlogind(1M) and rlogin(1) man pages.

      Service svc:/network/login:klogin is disabled or not installedOSC-30010

      Service svc:/network/login:klogin is disabled or not installed

      Rule IDOSC-30010
      Result
      pass
      Time2016-12-24T16:31:51
      Severitymedium
      Identifiers and References
      Description

      This service enables users to log in remotely with Kerberos authentication. By default, this service is not installed. See the rlogind(1M) and rlogin(1) man pages.

      Service svc:/network/login:eklogin is disabled or not installedOSC-12010

      Service svc:/network/login:eklogin is disabled or not installed

      Rule IDOSC-12010
      Result
      pass
      Time2016-12-24T16:31:51
      Severitymedium
      Identifiers and References
      Description

      This service enables users to log in remotely with Kerberos authentication over an encrypted line. By default, this service is not installed. See the rlogind(1M) and rlogin(1) man pages.

      Service svc:/network/nfs/cbd is disabled or not installedOSC-37010

      Service svc:/network/nfs/cbd is disabled or not installed

      Rule IDOSC-37010
      Result
      pass
      Time2016-12-24T16:31:51
      Severitylow
      Identifiers and References
      Description

      This service manages communication endpoints for the NFS Version 4 protocol. The nfs4cbd(1M) daemon runs on the NFS Version 4 client and creates a listener port for callbacks.

      Service svc:/network/nfs/client is disabled or not installedOSC-37510

      Service svc:/network/nfs/client is disabled or not installed

      Rule IDOSC-37510
      Result
      pass
      Time2016-12-24T16:31:51
      Severitylow
      Identifiers and References
      Description

      The NFS client service is needed only if the system is mounting files from an NFS server. If the system is not mounting files, the service can be disabled or its package unistalled. See the mount_nfs(1M) man page.

      Service svc:/network/nfs/fedfs-client is disabled or not installedOSC-12510

      Service svc:/network/nfs/fedfs-client is disabled or not installed

      Rule IDOSC-12510
      Result
      fail
      Time2016-12-24T16:31:51
      Severitymedium
      Identifiers and References
      Description

      The Federated Filesystem (FedFS) client service manages defaults and connection information for LDAP servers that store FedFS information. See the nsdbparams(1M) and fedfs(5) man pages.

      Remediation description:
      If you are either not using FedFS for DNS SRV records or LDAP-based referrals, disable the service.
      Remediation script:
      
          # svcadm disable svc:/network/nfs/fedfs-client
            
      Service svc:/network/nfs/mapid is disabled or not installedOSC-38010

      Service svc:/network/nfs/mapid is disabled or not installed

      Rule IDOSC-38010
      Result
      fail
      Time2016-12-24T16:31:51
      Severitylow
      Identifiers and References
      Description

      The NFS user and group ID mapping daemon service maps to and from NFS version 4 owner and owner_group identification attributes and local UID and GID numbers used by both the NFS version 4 client and server. See the nfsmapid(1M) man page.

      Remediation description:
      Disable the service if you are not using NFSv4.
      Remediation script:
      
          # svcadm disable svc:/network/nfs/mapid
            
      Service svc:/network/nfs/nlockmgr is disabled or not installedOSC-38510

      Service svc:/network/nfs/nlockmgr is disabled or not installed

      Rule IDOSC-38510
      Result
      pass
      Time2016-12-24T16:31:51
      Severitylow
      Identifiers and References
      Description

      The NFS lock manager supports record locking operations on NFS files in NFSv2 and NFSv3. See the lockd(1M) and sharectl(1M) man pages.

      Service svc:/network/nfs/rquota is disabled or not installedOSC-39010

      Service svc:/network/nfs/rquota is disabled or not installed

      Rule IDOSC-39010
      Result
      pass
      Time2016-12-24T16:31:51
      Severitylow
      Identifiers and References
      Description

      The remote quota server returns quotas for a user of a local file system which is mounted over NFS. The results are used by quota(1M) to display user quotas for remote file systems. The rquotad(1M) daemon is normally invoked by inetd(1M).

      Service svc:/network/nfs/server is disabled or not installedOSC-39510

      Service svc:/network/nfs/server is disabled or not installed

      Rule IDOSC-39510
      Result
      pass
      Time2016-12-24T16:31:51
      Severitylow
      Identifiers and References
      Description

      The NFS server service handles client file system requests over NFS versions 2, 3, and 4. If this system is not an NFS server, this service should be disabled. See the nfsd(1M) man page.

      Service svc:/network/nfs/status is disabled or not installedOSC-40010

      Service svc:/network/nfs/status is disabled or not installed

      Rule IDOSC-40010
      Result
      pass
      Time2016-12-24T16:31:51
      Severitylow
      Identifiers and References
      Description

      The NFS status monitor service interacts with lockd(1M) to provide the crash and recovery functions for the locking services on NFS.

      Service svc:/network/comsat is disabled or not installedOSC-06510

      Service svc:/network/comsat is disabled or not installed

      Rule IDOSC-06510
      Result
      pass
      Time2016-12-24T16:31:51
      Severityhigh
      Identifiers and References
      Description

      This legacy service process listens for reports of incoming mail and notifies interested users. By default, this service is not installed as part of solaris-small-server. See the comsat(1M) man page.

      Service svc:/network/rarp is disabled or not installedOSC-55510

      Service svc:/network/rarp is disabled or not installed

      Rule IDOSC-55510
      Result
      pass
      Time2016-12-24T16:31:51
      Severitymedium
      Identifiers and References
      Description

      This legacy service responds to DARPA reverse address resolution protocol (RARP) requests. Historically, RARP was used by machines at boot time to discover their Internet Protocol (IP) address. By default, this service is not installed. See the rarpd(1M) and rarp(7P) man pages.

      Service svc:/network/rexec is disabled or not installedOSC-57510

      Service svc:/network/rexec is disabled or not installed

      Rule IDOSC-57510
      Result
      pass
      Time2016-12-24T16:31:51
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides remote execution facilities with authentication based on user names and passwords. See the in.rexecd(1M) and rexec(3C) man pages.

      Service svc:/network/slp is disabled or not installedOSC-70010

      Service svc:/network/slp is disabled or not installed

      Rule IDOSC-70010
      Result
      pass
      Time2016-12-24T16:31:51
      Severitymedium
      Identifiers and References
      Description

      This legacy service provides common server functionality for the Service Location Protocol (SLP) versions 1 and 2, as defined by IETF in RFC 2165 and RFC 2608. SLP discovers and selects network services. By default, this service is not enabled. See the slpd(1M), slp.conf(4), and slp(7P) man pages.

      Service svc:/network/stdiscover is disabled or not installedOSC-76010

      Service svc:/network/stdiscover is disabled or not installed

      Rule IDOSC-76010
      Result
      pass
      Time2016-12-24T16:31:51
      Severitymedium
      Identifiers and References
      Description

      This legacy program is used to locate the service tag listener. For more information, see the in.stdiscover(1M) man page.

      Service svc:/network/stlisten is disabled or not installedOSC-76510

      Service svc:/network/stlisten is disabled or not installed

      Rule IDOSC-76510
      Result
      pass
      Time2016-12-24T16:31:51
      Severitymedium
      Identifiers and References
      Description

      This legacy program is used to listen for discovery probes. See the in.stlisten(1M) man page.

      Service svc:/network/talk is disabled or not installedOSC-79010

      Service svc:/network/talk is disabled or not installed

      Rule IDOSC-79010
      Result
      pass
      Time2016-12-24T16:31:51
      Severityhigh
      Identifiers and References
      Description

      This legacy program enables two-way, screen-oriented communication. For more information, see the talk(1) and mesg(1) man pages.

      Service svc:/network/telnet is disabled or not installedOSC-88510

      Service svc:/network/telnet is disabled or not installed

      Rule IDOSC-88510
      Result
      pass
      Time2016-12-24T16:31:51
      Severityhigh
      Identifiers and References
      Description

      This legacy service supports the DARPA standard TELNET virtual terminal protocol to connect to a remote system over the TELNET port. By default, this service is not installed. See the telnetd(1M) and telnet(1) man pages.

      Service svc:/network/uucp is disabled or not installedOSC-95510

      Service svc:/network/uucp is disabled or not installed

      Rule IDOSC-95510
      Result
      pass
      Time2016-12-24T16:31:52
      Severityhigh
      Identifiers and References
      Description

      This legacy service, UNIX to UNIX copy, provides a user interface for requesting file copy operations, typically used when constant connectivity is not possible. By default, this service is not installed. See the uucpd(1M) and uucp(1C) man pages.

      Service svc:/network/security/kadmin is disabled or not installedOSC-28010

      Service svc:/network/security/kadmin is disabled or not installed

      Rule IDOSC-28010
      Result
      pass
      Time2016-12-24T16:31:52
      Severitymedium
      Identifiers and References
      Description

      The Kerberos administration daemon service runs on the master key distribution center (KDC), which stores the principal and policy databases. This service should not be run on a system that is not a KDC. See the kadmind(1M) man page.

      Service svc:/network/security/krb5_prop is disabled or not installedOSC-30510

      Service svc:/network/security/krb5_prop is disabled or not installed

      Rule IDOSC-30510
      Result
      pass
      Time2016-12-24T16:31:52
      Severitymedium
      Identifiers and References
      Description

      The Kerberos propagation daemon runs on slave KDC servers to update the database from the master KDC. See the kpropd(1M) man page.

      Service svc:/network/security/krb5kdc is disabled or not installedOSC-31010

      Service svc:/network/security/krb5kdc is disabled or not installed

      Rule IDOSC-31010
      Result
      pass
      Time2016-12-24T16:31:52
      Severitymedium
      Identifiers and References
      Description

      The Kerberos key distribution center service manages Kerberos tickets on the master and slave KDCs. See the krb5kdc(1M) man page.

      Service svc:/network/security/ktkt_warn is disabled or not installedOSC-32010

      Service svc:/network/security/ktkt_warn is disabled or not installed

      Rule IDOSC-32010
      Result
      pass
      Time2016-12-24T16:31:52
      Severitymedium
      Identifiers and References
      Description

      The Kerberos V5 warning messages daemon on Kerberos clients can warn users when their Kerberos tickets are about to expire and can renew the tickets before they expire. By default, this service is disabled. If the system is Kerberos client, then this service should be enabled. See the ktkt_warnd(1M) man page.

      Service svc:/network/shell:default is disabled or not installedOSC-69510

      Service svc:/network/shell:default is disabled or not installed

      Rule IDOSC-69510
      Result
      pass
      Time2016-12-24T16:31:52
      Severitymedium
      Identifiers and References
      Description

      The remote shell daemon provides remote execution facilities with authentication based on Kerberos V5 or privileged port numbers. The Secure Shell service, svc:/network/ssh, is the best choice for remote execution. See the rshd(1M) and sshd(1M) man pages.

      Service svc:/network/shell:kshell is disabled or not installedOSC-31510

      Service svc:/network/shell:kshell is disabled or not installed

      Rule IDOSC-31510
      Result
      pass
      Time2016-12-24T16:31:52
      Severitymedium
      Identifiers and References
      Description

      The remote shell daemon provides remote execution facilities with authentication based on Kerberos V5 or privileged port numbers. The Secure Shell service, svc:/network/ssh, is the best choice for remote execution. See the rshd(1M) and sshd(1M) man pages.

      Service svc:/network/chargen:stream is disabled or not installedOSC-06020

      Service svc:/network/chargen:stream is disabled or not installed

      Rule IDOSC-06020
      Result
      pass
      Time2016-12-24T16:31:52
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Character Generator Protocol (RFC 864) for TCP. See the in.chargend(1M) man page.

      Service svc:/network/chargen:dgram is disabled or not installedOSC-06010

      Service svc:/network/chargen:dgram is disabled or not installed

      Rule IDOSC-06010
      Result
      pass
      Time2016-12-24T16:31:52
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Character Generator Protocol (RFC 864) for UDP. See the in.chargend(1M) man page.

      Service svc:/network/daytime:stream is disabled or not installedOSC-09520

      Service svc:/network/daytime:stream is disabled or not installed

      Rule IDOSC-09520
      Result
      pass
      Time2016-12-24T16:31:52
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Daytime Protocol (RFC 867) for TCP. See the in.daytimed(1M) man page.

      Service svc:/network/daytime:dgram is disabled or not installedOSC-09510

      Service svc:/network/daytime:dgram is disabled or not installed

      Rule IDOSC-09510
      Result
      pass
      Time2016-12-24T16:31:52
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Daytime Protocol (RFC 867) for UDP. See the in.daytimed(1M) man page.

      Service svc:/network/discard:stream is disabled or not installedOSC-11020

      Service svc:/network/discard:stream is disabled or not installed

      Rule IDOSC-11020
      Result
      pass
      Time2016-12-24T16:31:52
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Discard Protocol (RFC 863) for TCP. See the in.discardd(1M) man page.

      Service svc:/network/discard:dgram is disabled or not installedOSC-11010

      Service svc:/network/discard:dgram is disabled or not installed

      Rule IDOSC-11010
      Result
      pass
      Time2016-12-24T16:31:52
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Discard Protocol (RFC 863) for UDP. See the in.discardd(1M) man page.

      Service svc:/network/echo:stream is disabled or not installedOSC-11520

      Service svc:/network/echo:stream is disabled or not installed

      Rule IDOSC-11520
      Result
      pass
      Time2016-12-24T16:31:52
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Echo Protocol (RFC 862) for TCP. See the in.echod(1M) man page.

      Service svc:/network/echo:dgram is disabled or not installedOSC-11510

      Service svc:/network/echo:dgram is disabled or not installed

      Rule IDOSC-11510
      Result
      pass
      Time2016-12-24T16:31:52
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Echo Protocol (RFC 862) for UDP. See the in.echod(1M) man page.

      Service svc:/network/time:stream is disabled or not installedOSC-89520

      Service svc:/network/time:stream is disabled or not installed

      Rule IDOSC-89520
      Result
      pass
      Time2016-12-24T16:31:52
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Time Protocol (RFC 868) for TCP. See the in.timed(1M) man page.

      Service svc:/network/time:dgram is disabled or not installedOSC-89510

      Service svc:/network/time:dgram is disabled or not installed

      Rule IDOSC-89510
      Result
      pass
      Time2016-12-24T16:31:52
      Severityhigh
      Identifiers and References
      Description

      This legacy service provides the server side of the Time Protocol (RFC 868) for UDP. See the in.timed(1M) man page.

      Service svc:/network/rpc/keyserv is disabled or not installedOSC-29010

      Service svc:/network/rpc/keyserv is disabled or not installed

      Rule IDOSC-29010
      Result
      pass
      Time2016-12-24T16:31:52
      Severitylow
      Identifiers and References
      Description

      keyserv is a daemon that is used for storing the private encryption keys of each user logged into the system. These encryption keys are used for accessing secure network services such as secure NFS. For more information, see the keyserv(1M) man page.

      Service svc:/network/rpc/keyserv cannot use the nobody user keyOSC-29510

      Service svc:/network/rpc/keyserv cannot use the nobody user key

      Rule IDOSC-29510
      Result
      fail
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      The value of ENABLE_NOBODY_KEYS is YES by default. See the keyserv(1M) man page.

      Remediation description:
      Edit the /etc/default/keyserv file to change the value of ENABLE_NOBODY_KEYS to NO.
      Remediation script:
      
          # pfedit /etc/default/keyserv
          ...
          ENABLE_NOBODY_KEYS=NO
            
      Service svc:/network/rpc/meta is disabled or not installedOSC-64010

      Service svc:/network/rpc/meta is disabled or not installed

      Rule IDOSC-64010
      Result
      pass
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      This legacy service uses an rpc(4) daemon to manage local copies of metadevice diskset information. By default, this service is not installed. See the rpc.metad(1M) man page.

      Service svc:/network/rpc/metamed is disabled or not installedOSC-64510

      Service svc:/network/rpc/metamed is disabled or not installed

      Rule IDOSC-64510
      Result
      pass
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      This legacy service manages mediator information for 2-string high availability configurations. See the rpc.metamedd(1M) man page.

      Service svc:/network/rpc/metamh is disabled or not installedOSC-65010

      Service svc:/network/rpc/metamh is disabled or not installed

      Rule IDOSC-65010
      Result
      pass
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      This legacy service uses an rpc(4) daemon to manage multi-hosted disks. By default, this service is not installed. See the rpc.metamhd(1M) man page.

      Service svc:/network/rpc/rex is disabled or not installedOSC-57010

      Service svc:/network/rpc/rex is disabled or not installed

      Rule IDOSC-57010
      Result
      pass
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      This program is the Oracle Solaris RPC server for remote program execution. If this service is enabled, the daemon is started by inetd(1M) whenever a remote execution request is made. See the rpc.rexd(1M) man page.

      Service svc:/network/rpc/rstat is disabled or not installedOSC-66010

      Service svc:/network/rpc/rstat is disabled or not installed

      Rule IDOSC-66010
      Result
      pass
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      This legacy service displays performance data from a remote system. By default, this service is not installed. See the rstatd(1M) and rstat(3RPC) man pages.

      Service svc:/network/rpc/rusers is disabled or not installedOSC-66510

      Service svc:/network/rpc/rusers is disabled or not installed

      Rule IDOSC-66510
      Result
      pass
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      This legacy service displays information about users on a remote system. By default, this service is not installed. See the rusersd(1M) and rusers(1) man pages.

      Service svc:/network/rpc/smserver is disabled or not installedOSC-65510

      Service svc:/network/rpc/smserver is disabled or not installed

      Rule IDOSC-65510
      Result
      fail
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      This program is used to access removable media devices. See the rpc.smserverd(1M) man page.

      Remediation description:
      Disable the smserver service.
      Remediation script:
      
          # svcadm disable rpc/smserver:default
            
      Service svc:/network/rpc/spray is disabled or not installedOSC-71510

      Service svc:/network/rpc/spray is disabled or not installed

      Rule IDOSC-71510
      Result
      pass
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      This program is a server that records the packets sent by spray(1M). See the rpc.sprayd(1M) man page.

      Service svc:/network/rpc/wall is disabled or not installedOSC-96510

      Service svc:/network/rpc/wall is disabled or not installed

      Rule IDOSC-96510
      Result
      pass
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      This program broadcasts messages to all logged-in users. See the rpc.rwalld(1M) and wall(1M) man pages.

      Service svc:/network/smb/client is disabled or not installedOSC-70510

      Service svc:/network/smb/client is disabled or not installed

      Rule IDOSC-70510
      Result
      pass
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      The SMB/CIFS client allows an Oracle Solaris system to natively mount file systems by means of SMB shares from SMB enabled servers such as a Windows system. See the mount_smbfs(1M) man page.

      Service svc:/system/avahi-bridge-dsd is disabled or not installedOSC-04010

      Service svc:/system/avahi-bridge-dsd is disabled or not installed

      Rule IDOSC-04010
      Result
      pass
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      This program provides an object-oriented interface to DBUS-enabled applications. See the avahi-daemon-bridge-dsd(1) man page.

      Service svc:/system/filesystem/rmvolmgr is disabled or not installedOSC-58510

      Service svc:/system/filesystem/rmvolmgr is disabled or not installed

      Rule IDOSC-58510
      Result
      fail
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      The removable volume manager is a HAL-aware volume manager that can automatically mount and unmount removable media and hot-pluggable storage. Users might import malicious programs, or transfer sensitive data off the system. See the rmvolmgr(1M) man page. This service only runs in the global zone.

      Remediation description:
      Disable the remote volume manager service.
      Remediation script:
      
          # svcadm disable svc:/system/filesystem/rmvolmgr
            
      Service svc:/application/cups/in-lpd is disabled or not installedOSC-34010

      Service svc:/application/cups/in-lpd is disabled or not installed

      Rule IDOSC-34010
      Result
      pass
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      This service supports the CUPS Line Printer Daemon (LPD) for legacy client systems that use the LPD protocol. By default, this service is not installed. See the cups-lpd(8) man page.

      Service svc:/application/graphical-login/gdm is disabled or not installedOSC-19510

      Service svc:/application/graphical-login/gdm is disabled or not installed

      Rule IDOSC-19510
      Result
      fail
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      The GNOME Display Manager manages the displays on a system, including the console display, attached displays, XDMCP displays, and virtual terminals. If a windowing display is not needed, this service should be disabled. See the gdm(1M) man page.

      Remediation description:
      Disable this service if a windows login is not needed on this system.
      Remediation script:
      
          # svcadm disable svc:/application/graphical-login/gdm
            
      Service svc:/application/management/net-snmp is disabled or not installedOSC-71010

      Service svc:/application/management/net-snmp is disabled or not installed

      Rule IDOSC-71010
      Result
      pass
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      The Simple Network Management Protocol (SNMP) is a widely used protocol for monitoring the health and welfare of network equipment. The net-snmp SNMP daemon processes requests from SNMP management software. See the snmpd(8) and snmp_config(5) man pages.

      Service svc:/application/x11/xfs is disabled or not installedOSC-97010

      Service svc:/application/x11/xfs is disabled or not installed

      Rule IDOSC-97010
      Result
      pass
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      This program provides fonts to X Window System display servers. The server is usually run by inetd(1M). See the xfs(1) and fsadmin(1) man pages.

      /etc/motd and /etc/issue contain appropriate policy textOSC-35000

      /etc/motd and /etc/issue contain appropriate policy text

      Rule IDOSC-35000
      Result
      fail
      Time2016-12-24T16:31:53
      Severitymedium
      Identifiers and References
      Description

      The /etc/issue and /etc/motd (message of the day) files are designed to hold system and security information. The contents of the /etc/issue file are displayed prior to the login prompt on the console, or in a window if the file is called from the GNOME Display Manager (gdm). Several applications call this file, such as Secure Shell and FTP. The /etc/motd contents are displayed after login. By default, the /etc/motd file exists while the /etc/issue file does not. See the issue(4), gdm(1M), and sshd_config(4) man pages.

      Remediation description:
      Edit the /etc/motd file and create and edit the /etc/issue file to add the security policy text that your legal department supplies. An administrator with the Administrator Message Edit rights profile can edit these files.
      Remediation script:
      
          # pfedit /etc/issue
          <legally-approved-text>
          # chown root:root /etc/issue
          # chmod 644 /etc/issue
      
          # pfedit /etc/motd
          <legally-approved-text>
            
      The ftp(1) banner shows a suitable security messageOSC-18000

      The ftp(1) banner shows a suitable security message

      Rule IDOSC-18000
      Result
      pass
      Time2016-12-24T16:31:54
      Severitymedium
      Identifiers and References
      Description

      The banner informs users who are attempting to access the system that the system is monitored. Note that the pkg:/service/network/ftp package must be installed for ftp to work.

      The gdm(1M) banner shows a suitable security messageOSC-20500

      The gdm(1M) banner shows a suitable security message

      Rule IDOSC-20500
      Result
      fail
      Time2016-12-24T16:31:54
      Severitymedium
      Identifiers and References
      Description

      The banner informs users who are attempting to access the system that the system is monitored. The banner uses the /etc/issue file. See the issue(4) and gdm(1M) man pages.

      Remediation description:
      Modify the /etc/gdm/Init/Default file to display a dialog box with the contents of the /etc/issue file. zenity(1) displays simple GNOME dialogs.
      Remediation script:
      
          # pfedit /etc/gdm/Init/Default
          /usr/bin/zenity --text-info --width=800 --height=300 \
          --title="Security Message" --filename=/etc/issue
            
      The ssh(1) banner shows a suitable security messageOSC-75000

      The ssh(1) banner shows a suitable security message

      Rule IDOSC-75000
      Result
      pass
      Time2016-12-24T16:31:54
      Severitymedium
      Identifiers and References
      Description

      By default, the ssh(1) banner displays the contents of the /etc/issue file. See the issue(4) and sshd_config(4) man pages.

      The telnet(1) banner shows a suitable security messageOSC-89000

      The telnet(1) banner shows a suitable security message

      Rule IDOSC-89000
      Result
      pass
      Time2016-12-24T16:31:54
      Severitymedium
      Identifiers and References
      Description

      The telnetd(1M) DARPA TELNET protocol server is a legacy service that does not conform to current security requirements. By default, this service is not installed, and systems use the ssh(1M) protocol to communicate.

      Use of the cron(1M) and at(1) daemons is restrictedOSC-08505

      Use of the cron(1M) and at(1) daemons is restricted

      Rule IDOSC-08505
      Result
      fail
      Time2016-12-24T16:31:55
      Severitymedium
      Identifiers and References
      Description

      The cron(1M) and at(1) daemons execute commands at specified dates and times. Only qualified accounts should be allowed to run commands at arbitrary times on the system.

      SCE stdout
          /etc/cron.d/cron.allow does not exist and should exist with one entry for root.
          /etc/cron.d/at.allow does not exist and should exist and be empty.
      cat: cannot open /etc/cron.d/cron.allow: No such file or directory
          WARNING cron(1M) access is not restricted to root-only
      
      Remediation description:
      In order to restrict cron(1M) and at(1) properly, the file /etc/cron.d/cron.allow should exist and have only one entry for root. In addition, the file /etc/cron.d/at.allow should exist and be empty.
      Remediation script:
      
          # pfedit /etc/cron.d/cron.allow
          root
            
      Name services are set to all local (files) onlyOSC-36500

      Name services are set to all local (files) only

      Rule IDOSC-36500
      Result
      fail
      Time2016-12-24T16:31:55
      Severitymedium
      Identifiers and References
      Description

      The operating system uses a number of databases of information about hosts, ipnodes, users (passwd(4), shadow(4), and user_attr(4)), and groups. Data for these can come from a variety of sources: hostnames and host addresses, for example, can be found in /etc/hosts, NIS, LDAP, DNS, or Multicast DNS. Systems in restricted environments may be more secure if only local files entries are used for these entries. See the nsswitch.conf(4) man page for more information

      Remediation description:
      If the system does not need to use remote name services, make sure that the name service is set to local files only. See the nsswitch.conf(4) man page.
      Remediation script:
      
          For example:
          # svccfg -s name-service/switch setprop config/default = astring: "files" 
          # svccfg -s name-service/switch setprop config/host = astring: "files" 
          # svccfg -s name-service/switch setprop config/password = astring: "files" 
          # svccfg -s name-service/switch setprop config/group = astring: "files" 
          # svccfg -s name-service/switch:default refresh
            
      Find and list remote consolesOSC-56505

      Find and list remote consoles

      Rule IDOSC-56505
      Result
      pass
      Time2016-12-24T16:31:55
      Severitymedium
      Identifiers and References
      Description

      Remote consoles can be a source of unauthorized access. A system console should be kept physically secure and no unauthorized consoles should be defined. The "consadm -p" command displays alternate consoles across reboots. If none are defined, the command displays no output. See the consadm(1M) man page.

      SCE stdout
      consadm: must be root to run this program
      
      Remote serial logins are disabledOSC-69010

      Remote serial logins are disabled

      Rule IDOSC-69010
      Result
      pass
      Time2016-12-24T16:31:55
      Severitymedium
      Identifiers and References
      Description

      Serial logins can be a source of unauthorized access. Login services should not be enabled for serial ports that are not required to support the purpose of the system.

      root access is console-onlyOSC-59510

      root access is console-only

      Rule IDOSC-59510
      Result
      pass
      Time2016-12-24T16:31:55
      Severitymedium
      Identifiers and References
      Description

      The root account should not be able to log in remotely, and its actions should be monitored. See the login(1) man page.

      ftp(1) is restricted to a specific set of usersOSC-19000

      ftp(1) is restricted to a specific set of users

      Rule IDOSC-19000
      Result
      pass
      Time2016-12-24T16:31:55
      Severitymedium
      Identifiers and References
      Description

      FTP file transfers should not be available to all users, and must require qualified users to supply their names and password. In general, system users should not be allowed to use FTP. This check verifies that system accounts are included in the /etc/ftpd/ftpusers file so that they are not allowed to use FTP. See the ftp(1) man page.

      Files written in ftp(1) sessions have a suitable umaskOSC-18500

      Files written in ftp(1) sessions have a suitable umask

      Rule IDOSC-18500
      Result
      pass
      Time2016-12-24T16:31:55
      Severitymedium
      Identifiers and References
      Description

      The FTP server does not necessarily use the user's system file creation mask. Setting the FTP umask ensures that files transmitted over FTP use a strong file creation umask. See the umask(1) and proftpd(8) man pages.

      The GNOME desktop has suitable screensaver settingsOSC-21000

      The GNOME desktop has suitable screensaver settings

      Rule IDOSC-21000
      Result
      pass
      Time2016-12-24T16:31:55
      Severitymedium
      Identifiers and References
      Description

      The timeout parameter for the xscreensaver application specifies the amount of time that the keyboard and mouse can be inactive before a password-protected screensaver appears. See the xscreensaver(1) man page.

      gdm(1M) does not accept logins without passwordsOSC-20010

      gdm(1M) does not accept logins without passwords

      Rule IDOSC-20010
      Result
      pass
      Time2016-12-24T16:31:56
      Severityhigh
      Identifiers and References
      Description

      Automatic logins are a known security risk for other than public kiosks. By default, GNOME automatic login is disallowed, so users must supply a password. Automatic and Timed login is controlled by the entries in /etc/gdm/custom.conf See the gdm(1M) man page.

      ssh(1) requires passwordsOSC-73010

      ssh(1) requires passwords

      Rule IDOSC-73010
      Result
      fail
      Time2016-12-24T16:31:56
      Severitymedium
      Identifiers and References
      Description

      Logins without a password put the system at risk. In the default remote login service, Secure Shell, the PermitEmptyPasswords parameter in the /etc/ssh/sshd_config file should remain set to no. See the sshd_config(4) man page.

      Remediation description:
      Ensure that PermitEmptyPasswords value in the /etc/ssh/sshd_config file has not been changed. The default value is no. If you reset the value, restart the ssh service.
      Remediation script:
      
          # cd /etc/ssh
          # grep PermitEmpty sshd_config
          ...
          PermitEmptyPasswords no
      
          # svcadm restart svc:/network/ssh
            
      ssh(1) does not forward X11OSC-74510

      ssh(1) does not forward X11

      Rule IDOSC-74510
      Result
      fail
      Time2016-12-24T16:31:56
      Severitymedium
      Identifiers and References
      Description

      The X11Forwarding parameter in the /etc/ssh/sshd_config file specifies whether users can forward an X Window session through an encrypted tunnel. This parameter allows the remote user to display windows remotely over Secure Shell. See the sshd_config(1M) and X(5) man pages.

      Remediation description:
      By default, X11Forwarding is set to yes. X11Forwarding could permit a malicious user to secretly open an X11 connection to a different client and perform unobtrusive activities such as keystroke monitoring. If the remote window display is not required, disable or restrict it, then restart the ssh service.
      Remediation script:
      
          # pfedit /etc/ssh/sshd_config
          ...
          X11Forwarding no
      
          # svcadm restart svc:/network/ssh
            
      Consecutive login attempts for ssh(1) are limitedOSC-72511

      Consecutive login attempts for ssh(1) are limited

      Rule IDOSC-72511
      Result
      fail
      Time2016-12-24T16:31:56
      Severitymedium
      Identifiers and References
      Description

      By default, the MaxAuthTries parameter in the /etc/ssh/sshd_config file is set to 6. This parameter specifies the maximum number of authentication attempts that the server permits before ending the connection. By restricting the number of failed authentication attempts, Secure Shell lessens the effectiveness of brute-force login attempts. It is important to note that setting MaxAuthTries to 6 actually provides only 3 failed login attempts because of the way SSH counts failures. See the sshd_config(4) man page.

      Remediation description:
      Set the MaxAuthTries parameter in the /etc/ssh/sshd_config file to the value that site security requires, then restart the ssh service.
      Remediation script:
      
          # pfedit /etc/ssh/sshd_config
          MaxAuthTries 6
      
          # svcadm restart svc:/network/ssh
            
      rhost-based authentication in ssh(1) is disabledOSC-74010

      rhost-based authentication in ssh(1) is disabled

      Rule IDOSC-74010
      Result
      pass
      Time2016-12-24T16:31:56
      Severitymedium
      Identifiers and References
      Description

      rhost-based authentication in Secure Shell allows users to remotely log in without supplying a password. The IgnoreRhosts parameter specifies whether .rhosts and .shosts files can be used rather than a password. See the sshd_config(4) and hosts.equiv(4) man pages.

      root login by using ssh(1) is disabledOSC-61510

      root login by using ssh(1) is disabled

      Rule IDOSC-61510
      Result
      pass
      Time2016-12-24T16:31:56
      Severitymedium
      Identifiers and References
      Description

      By default, remote root logins are not permitted because root is a role and roles cannot log in. If root has been changed to a user, the default value of the PermitRootLogin parameter in the /etc/ssh/sshd_config file prevents root from remotely logging in. See the sshd_config(4) man page.

      The auditd(1M) daemon is enabledOSC-02511

      The auditd(1M) daemon is enabled

      Rule IDOSC-02511
      Result
      pass
      Time2016-12-24T16:31:56
      Severitymedium
      Identifiers and References
      Description

      Auditing is a service, svc:/system/auditd, that is enabled by default and should not be disabled. See the audit(1M) man page.

      Audit parameters are set to recommended valuesOSC-02001

      Audit parameters are set to recommended values

      Rule IDOSC-02001
      Result
      fail
      Time2016-12-24T16:31:56
      Severitymedium
      Identifiers and References
      Description

      At minimum, events in the lo class are audited and audit policy is set to argv,cnt. Add audit classes and policy per your site's security requirements. See the auditconfig(1M) man page.

      SCE stdout
      auditon(2) failed.
      error: Not owner(1)
      auditon(2) failed.
      error: Not owner(1)
      error: insufficient privileges for action
      Could not get plugin configuration.
      audit is not auditing
      audit policy does not include "argv" and should
      audit flags not set correctly
      audit naflags not set correctly
      audit_binfile policies not set correctly
      root audit flags not set correctly
      
      Remediation description:
      An administrator with the Audit Configuration rights profile can get and set audit parameters.
      Remediation script:
      
          # auditconfig -setpolicy argv,cnt
          # auditconfig -getpolicy
          configured audit policies = argv,cnt
          active audit policies = argv,cnt
      
          # auditconfig -setflags lo
          user default audit flags = lo(0x1000,0x1000)
            
      All roles are audited with the "cusa" audit classOSC-03000

      All roles are audited with the "cusa" audit class

      Rule IDOSC-03000
      Result
      fail
      Time2016-12-24T16:31:56
      Severitymedium
      Identifiers and References
      Description

      The cusa audit class contains events that cover administrative actions that could affect the system's security posture. See the audit_class(4), audit_event(4), rolemod(1M), and userattr(1) man pages.

      SCE stdout
          User root is a role and not using the cusa audit class
      
      Remediation description:
      Check that all roles are being audited with the cusa audit class. By default, only the root role can set audit flags for individual accounts.
      Remediation script:
      
          # logins -r
          ...list of roles ...
          For each role, check the assigned audit flags:
          # userattr audit_flags <rolename>
      
          If no output, set the cusa audit flag and verify:
          # rolemod -K audit_flags=cusa:no <rolename>>
          # userattr audit_flags <rolename>>
          cusa:no
            
      Passwords are hashed with a secure algorithmOSC-44000

      Passwords are hashed with a secure algorithm

      Rule IDOSC-44000
      Result
      pass
      Time2016-12-24T16:31:57
      Severityhigh
      Identifiers and References
      Description

      The hash used is determined by values of CRYPT_ALGORITHMS_ALLOW and CRYPT_DEFAULT set in /etc/security/policy.conf file. The value for SHA-256 is "5", and the value for SHA-512 is "6". To confirm properly set, the second field in the /etc/shadow file indicates the algorithm that was used to create the password hash. If the algorithm is set to SHA-256, the entry begins with "$5$" If the algorithm is set to SHA-512, the entry begins with "$6$" See the crypt.conf(4) and policy.conf(4) man pages.

      Password history logs the last ten passwordsOSC-44510

      Password history logs the last ten passwords

      Rule IDOSC-44510
      Result
      fail
      Time2016-12-24T16:31:57
      Severitymedium
      Identifiers and References
      Description

      HISTORY in the /etc/default/passwd file prevents users from using similar passwords within the HISTORY value. If MINWEEKS is set to 3 and HISTORY is set to 10, passwords are checked for reuse for ten months. See the passwd(1) man page.

      Remediation description:
      In the /etc/default/passwd file, set the HISTORY variable to 10.
      Remediation script:
      
          # pfedit /etc/default/passwd
          ...
          # Compliance to the PCI-DSS benchmark is 10
          #HISTORY=0
          HISTORY=10
          ...
            
      Passwords allow repeat charactersOSC-45000

      Passwords allow repeat characters

      Rule IDOSC-45000
      Result
      pass
      Time2016-12-24T16:31:57
      Severitymedium
      Identifiers and References
      Description

      MAXREPEATS in the `/etc/default/passwd file allows users to repeat characters in passwords. The default is 0, which permits repeated characters. Any other value indicates how many characters can be repeated. See the passwd(1) man page.

      Passwords allow whitespaceOSC-52000

      Passwords allow whitespace

      Rule IDOSC-52000
      Result
      pass
      Time2016-12-24T16:31:57
      Severitymedium
      Identifiers and References
      Description

      WHITESPACE in the /etc/default/login file indicates whether passwords can include the space character. The space character provides some protection against dictionary-based password attacks. The default is YES. See the passwd(1) man page.

      Passwords require at least two alphabetic charactersOSC-46502

      Passwords require at least two alphabetic characters

      Rule IDOSC-46502
      Result
      pass
      Time2016-12-24T16:31:57
      Severitymedium
      Identifiers and References
      Description

      MINALPHA in the /etc/default/passwd file indicates the minimum number of alphabetic characters that passwords must contain. Alphabetic characters provide more values than numeric or special characters, so allow for more variation. The default value is 2. See the passwd(1) man page.

      Passwords require at least three characters difference from the previous passwordOSC-47003

      Passwords require at least three characters difference from the previous password

      Rule IDOSC-47003
      Result
      pass
      Time2016-12-24T16:31:57
      Severitymedium
      Identifiers and References
      Description

      MINDIFF in the /etc/default/passwd file indicates the minimum difference a password must have from the previous password. The default is 3. See the passwd(1) man page.

      Passwords require at least one digitOSC-47501

      Passwords require at least one digit

      Rule IDOSC-47501
      Result
      fail
      Time2016-12-24T16:31:57
      Severitymedium
      Identifiers and References
      Description

      MINDIGIT in the /etc/default/passwd file indicates the minimum number of digits that a password must contain. Digits provide some protection against dictionary-based password attacks. The default is 0. A value of at least 1 is recommended. See the passwd(1) man page.

      Remediation description:
      In the /etc/default/passwd file, set the MINDIGIT variable to 1.
      Remediation script:
      
          # pfedit /etc/default/passwd
          ...
          # Compliance to the PCI-DSS benchmark is 1
          #MINDIGIT=0
          MINDIGIT=1
          ...
            
      Passwords require at least one lowercase characterOSC-48001

      Passwords require at least one lowercase character

      Rule IDOSC-48001
      Result
      fail
      Time2016-12-24T16:31:57
      Severitymedium
      Identifiers and References
      Description

      MINLOWER in the /etc/default/passwd file indicates the minimum number of lowercase letters that a password must contain. This provides some protection against dictionary-based password attacks. The default is 0. A value of at least 1 is recommended. See the passwd(1) man page.

      Remediation description:
      In the /etc/default/passwd file, set the MINLOWER variable to 1.
      Remediation script:
      
          # pfedit /etc/default/passwd
          ...
          # Compliance to the PCI-DSS benchmark is 1
          #MINLOWER=0
          MINLOWER=1
          ...
            
      Passwords require a minimum of one non-alphabetic characterOSC-48501

      Passwords require a minimum of one non-alphabetic character

      Rule IDOSC-48501
      Result
      pass
      Time2016-12-24T16:31:57
      Severitymedium
      Identifiers and References
      Description

      MINNONALPHA in the /etc/default/passwd file indicates the minimum number of non-alphabetic characters that a password must contain. Non-alphabetic characters provide some protection against dictionary-based password attacks. The default is 0. A value of at least 1 is recommended. See the passwd(1) man page.

      Passwords require at least one special characterOSC-49001

      Passwords require at least one special character

      Rule IDOSC-49001
      Result
      fail
      Time2016-12-24T16:31:57
      Severitymedium
      Identifiers and References
      Description

      MINSPECIAL in the /etc/default/passwd file indicates the minimum number of special characters that a password must contain. Special characters provide some protection against dictionary-based password attacks. The default is 0. A value of at least 1 is recommended. See the passwd(1) man page.

      Remediation description:
      In the /etc/default/passwd file, set the MINSPECIAL variable to 1.
      Remediation script:
      
          # pfedit /etc/default/passwd
          ...
          # Compliance to the PCI-DSS benchmark is 1
          #MINSPECIAL=0
          MINSPECIAL=1
          ...
            
      Passwords require at least one uppercase characterOSC-49501

      Passwords require at least one uppercase character

      Rule IDOSC-49501
      Result
      fail
      Time2016-12-24T16:31:58
      Severitymedium
      Identifiers and References
      Description

      MINUPPER in the /etc/default/passwd file indicates the minimum number of uppercase letters that a password must contain. Uppercase letters provide some protection against dictionary-based password attacks. The default is 0. A value of at least 1 is recommended. See the passwd(1) man page.

      Remediation description:
      In the /etc/default/passwd file, set the MINUPPER variable to 1.
      Remediation script:
      
          # pfedit /etc/default/passwd
          ...
          # Compliance to the PCI-DSS benchmark is 1
          #MINUPPER=0
          MINUPPER=1
          ...
            
      Passwords require at least eight charactersOSC-46008

      Passwords require at least eight characters

      Rule IDOSC-46008
      Result
      fail
      Time2016-12-24T16:31:59
      Severityhigh
      Identifiers and References
      Description

      PASSLENGTH in the /etc/default/login file indicates the minimum number of characters that a password must contain. A longer password length plus a strong password hashing algorithm provide some protection against password attacks. The default for Oracle Solaris 12 is 8. See the passwd(1) man page.

      Remediation description:
      In the /etc/default/login file, set the PASSLENGTH variable to 8.
      Remediation script:
      
          # pfedit /etc/default/passwd
          ...
          # Compliance to the PCI-DSS benchmark is 8
          #PASSLENGTH=6
          PASSLENGTH=8
          ...
            
      Passwords cannot be changed for at least three weeksOSC-50003

      Passwords cannot be changed for at least three weeks

      Rule IDOSC-50003
      Result
      fail
      Time2016-12-24T16:31:59
      Severitymedium
      Identifiers and References
      Description

      MINWEEKS in the /etc/default/passwd file indicates the minimum number of weeks before a password can be changed. This value prevents users from reusing a password quickly. The default is unspecified. See the passwd(1) man page.

      Remediation description:
      In the /etc/default/passwd file, set the MINWEEKS variable to 3.
      Remediation script:
      
          # pfedit /etc/default/passwd
          ...
          # Compliance to the PCI-DSS benchmark is 3
          #MINWEEKS=
          MINWEEKS=3
          ...
            
      Passwords must be changed at least every 13 weeksOSC-45513

      Passwords must be changed at least every 13 weeks

      Rule IDOSC-45513
      Result
      fail
      Time2016-12-24T16:31:59
      Severitymedium
      Identifiers and References
      Description

      MAXWEEKS in the /etc/default/passwd file indicates the maximum number of weeks that a password can be used. This value is a balance between users remembering a new password and malicious users attacking long-term passwords. The default is unspecified. See the passwd(1) man page.

      Remediation description:
      In the /etc/default/passwd file, set the MAXWEEKS variable to 13.
      Remediation script:
      
          # pfedit /etc/default/passwd
          ...
          # Compliance to the PCI-DSS benchmark is 13
          #MAXWEEKS=
          MAXWEEKS=13
          ...
            
      DICTIONBDIR is set to /var/passwdOSC-43500

      DICTIONBDIR is set to /var/passwd

      Rule IDOSC-43500
      Result
      pass
      Time2016-12-24T16:31:59
      Severitymedium
      Identifiers and References
      Description

      DICTIONBDIR in the /etc/default/passwd file points to the /var/passwd dictionary by default. A password dictionary can strengthen users' password selection by preventing the use of common words or letter combinations. The passwd command performs dictionary lookups in the dictionary that DICTIONBDIR indicates. See the passwd(1) man page.

      DISABLETIME is set for loginsOSC-32500

      DISABLETIME is set for logins

      Rule IDOSC-32500
      Result
      pass
      Time2016-12-24T16:31:59
      Severitymedium
      Identifiers and References
      Description

      DISABLETIME in the /etc/default/login file is set to 20 by default. Any value greater than zero indicates the seconds before a login prompt appears after RETRIES failed login attempts. This delay can mitigate rapid-fire, brute force attacks on passwords. See the login(1) man page.

      SLEEPTIME following an invalid login attempt is set to 4OSC-33500

      SLEEPTIME following an invalid login attempt is set to 4

      Rule IDOSC-33500
      Result
      pass
      Time2016-12-24T16:31:59
      Severitymedium
      Identifiers and References
      Description

      SLEEPTIME in the /etc/default/login file is set to 4 by default. This number indicates the number of seconds that elapse before the "login incorrect" message appears after an incorrect password is typed. The maximum number is 5. This delay can mitigate rapid-fire, brute force attacks on passwords. See the login(1) man page.

      NAMECHECK for passwords is set to YESOSC-50500

      NAMECHECK for passwords is set to YES

      Rule IDOSC-50500
      Result
      pass
      Time2016-12-24T16:31:59
      Severitymedium
      Identifiers and References
      Description

      NAMECHECK in the /etc/default/passwd file indicates whether login names are checked in the files naming service. The default, YES, prevents malicious users from using a login name that is not in a local file. See the passwd(1) man page.

      Logins require passwordsOSC-33000

      Logins require passwords

      Rule IDOSC-33000
      Result
      pass
      Time2016-12-24T16:31:59
      Severityhigh
      Identifiers and References
      Description

      PASSREQ in the /etc/default/login file indicates whether logins require passwords. Passwords are required for defense against computer attacks. The default is YES. See the login(1) man page.

      Default system accounts are lockedOSC-26005

      Default system accounts are locked

      Rule IDOSC-26005
      Result
      pass
      Time2016-12-24T16:32:00
      Severitymedium
      Identifiers and References
      Description

      Oracle Solaris is installed with correctly configured system accounts. These accounts should not be modified.

      Default system accounts are no-loginOSC-51505

      Default system accounts are no-login

      Rule IDOSC-51505
      Result
      pass
      Time2016-12-24T16:32:00
      Severitymedium
      Identifiers and References
      Description

      Oracle Solaris is installed with correctly configured system accounts. These accounts should not be modified.

      Reserved system accounts remain unusedOSC-25505

      Reserved system accounts remain unused

      Rule IDOSC-25505
      Result
      fail
      Time2016-12-24T16:32:00
      Severitymedium
      Identifiers and References
      Description

      Accounts whose ID is 100 or less are system accounts. These accounts should not be replaced or reconfigured.

      SCE stdout
      Invalid User with Reserved UID: ocm
      
      Remediation description:
      Users should not be assigned UIDs less than 100 and existing system accounts should not be renamed or renumbered. Undo any changes that have made involving these accounts. See the usermod(1M) man page.
      Remediation script:
      
          # usermod <options> <username>
            
      root is a roleOSC-59000

      root is a role

      Rule IDOSC-59000
      Result
      pass
      Time2016-12-24T16:32:00
      Severitymedium
      Identifiers and References
      Description

      By default, root is a role. Roles cannot log in directly. Rather, a user logs in and then assumes the root role, thus providing an audit trail of who is operating as root. See the roles(1), user_attr(4), and usermod(1M) man pages.

      root is the only user with UID=0OSC-61001

      root is the only user with UID=0

      Rule IDOSC-61001
      Result
      pass
      Time2016-12-24T16:32:01
      Severitymedium
      Identifiers and References
      Description

      The UID of 0 has superuser privileges. Only root should have those privileges.

      The root password is hashed with the SHA-256 algorithmOSC-60000

      The root password is hashed with the SHA-256 algorithm

      Rule IDOSC-60000
      Result
      pass
      Time2016-12-24T16:32:01
      Severityhigh
      Identifiers and References
      Description

      The second field in the /etc/shadow file indicates the algorithm that was used to create the password hash. If the entry begins with "$5$", then password is hashed with SHA-256 algorithm. If the entry begins with "$6$", then password is hashed with SHA-512 algorithm. See the crypt.conf(4) and policy.conf(4) man pages.

      The root PATH variable is correctOSC-60505

      The root PATH variable is correct

      Rule IDOSC-60505
      Result
      pass
      Time2016-12-24T16:32:02
      Severitymedium
      Identifiers and References
      Description

      The root PATH variable should not include the current directory (.), or any paths not related to administration.

      Role details are unchangedOSC-56000

      Role details are unchanged

      Rule IDOSC-56000
      Result
      fail
      Time2016-12-24T16:32:24
      Severitymedium
      Identifiers and References
      Description

      Oracle Solaris ships with Role Based Access Control (RBAC). This feature enables administrators to delegate specific, limited, additional privileges and authorizations to individual users to administer parts of the system without giving them access to the root account. The provided rights databases should not be changed directly. To add rights to roles, use the roleadd and rolemod commands. These commands add entries to the /etc/user_attr file. See the profiles(1), auths(1), roles(1), rbac(5), roleadd(1M), rolemod(1M), and user_attr(4) man pages.

      SCE stdout
      pkg: The image cannot be modified as it is currently in use by another package client.
          /etc/user_attr.d/core-os has been changed and should not have been
      pkg: The image cannot be modified as it is currently in use by another package client.
          /etc/user_attr.d/desktop-time-slider has been changed and should not have been
      pkg: The image cannot be modified as it is currently in use by another package client.
          /etc/user_attr.d/ikev2-daemon has been changed and should not have been
      pkg: The image cannot be modified as it is currently in use by another package client.
          /etc/user_attr.d/package:pkg has been changed and should not have been
      pkg: The image cannot be modified as it is currently in use by another package client.
          /etc/user_attr.d/system%2Finstall%2Fauto-install has been changed and should not have been
      pkg: The image cannot be modified as it is currently in use by another package client.
          /etc/user_attr.d/system:management:ocm has been changed and should not have been
      
      Remediation description:
      The files in /etc/user_attr.d/ should not be changed; changes and additions should be made using the roleadd(1M), rolemod(1M), profiles(1), auths(1), and usermod(1M) commands.
      Remediation script:
      
          # pkg revert /etc/user_attr.d/<changed file>
      
          Then
      
          # roleadd <role>
          # rolemod <role>
            
      shadow(4) password fields are not emptyOSC-51005

      shadow(4) password fields are not empty

      Rule IDOSC-51005
      Result
      pass
      Time2016-12-24T16:32:24
      Severityhigh
      Identifiers and References
      Description

      The second field in the /etc/shadow file contains passwords. When creating roles, you can easily forget to assign a password. See the shadow(4) and passwd(1) man pages.

      All groups specified in /etc/passwd are defined in /etc/groupOSC-24505

      All groups specified in /etc/passwd are defined in /etc/group

      Rule IDOSC-24505
      Result
      pass
      Time2016-12-24T16:32:24
      Severitymedium
      Identifiers and References
      Description

      Users are assigned to at least one group and can be assigned to secondary groups. All groups must be defined in the /etc/group file.

      Find and list duplicate GIDsOSC-22500

      Find and list duplicate GIDs

      Rule IDOSC-22500
      Result
      pass
      Time2016-12-24T16:32:24
      Severitymedium
      Identifiers and References
      Description

      Groups, like users, are unique. Duplicate group IDs must be removed.

      Find and list duplicate group namesOSC-23000

      Find and list duplicate group names

      Rule IDOSC-23000
      Result
      pass
      Time2016-12-24T16:32:24
      Severitymedium
      Identifiers and References
      Description

      Groups, like users, are unique. Duplicate group names must be removed.

      Find and list duplicate UIDsOSC-23500

      Find and list duplicate UIDs

      Rule IDOSC-23500
      Result
      pass
      Time2016-12-24T16:32:24
      Severitymedium
      Identifiers and References
      Description

      Users are identified by IDs, which must be unique. Duplicate user IDs must be removed.

      Find and list duplicate usernamesOSC-24000

      Find and list duplicate usernames

      Rule IDOSC-24000
      Result
      pass
      Time2016-12-24T16:32:24
      Severitymedium
      Identifiers and References
      Description

      Users log in by name, which must be unique. Duplicate user names must be removed.

      Inactive user accounts will be locked after 35 daysOSC-25000

      Inactive user accounts will be locked after 35 days

      Rule IDOSC-25000
      Result
      fail
      Time2016-12-24T16:32:25
      Severitymedium
      Identifiers and References
      Description

      Inactive user accounts can provide a back door into the system. User accounts should be locked after a period of inactivity.

      SCE stdout
      Inactive account lockout period is set to 0
      
      Remediation description:
      Inactive user accounts can be locked in a number of ways. MAXWEEKS can be set in the /etc/default/passwd file; alternatively, defaults can be set using useradd. See the useradd(1M), passwd(1), and passwd(4) man pages.
      Remediation script:
      
          To manually lock an account
          # passwd -l <username>
      
          To set the default inactive time, change the value of MAXWEEKS in the /etc/default/passwd file.
          # pfedit /etc/default/passwd
          ...
          MAXWEEKS=5
      
          or
          set the default with useradd
          # useradd -D -f 35
            
      The default user UMASK is 022OSC-94000

      The default user UMASK is 022

      Rule IDOSC-94000
      Result
      pass
      Time2016-12-24T16:32:25
      Severitymedium
      Identifiers and References
      Description

      UMASK in the /etc/default/login file indicates the permissions on user files at creation. This value should not allow group or world write. The default value is 022, which allows group and world to read files owned by a user. See the login(1) man page.

      Local users are assigned home directoriesOSC-94501

      Local users are assigned home directories

      Rule IDOSC-94501
      Result
      pass
      Time2016-12-24T16:32:27
      Severitymedium
      Identifiers and References
      Description

      Users need a place to store and create files. A home directory enables a user to place configuration files, such as the .profile file, and ongoing work in a directory that is owned by the user.

      Home directories for all users existOSC-93505

      Home directories for all users exist

      Rule IDOSC-93505
      Result
      pass
      Time2016-12-24T16:32:27
      Severitymedium
      Identifiers and References
      Description

      Users need a place to store and create files. A home directory enables a user to place configuration files, such as the .profile file, and ongoing work in a directory that is owned by the user.

      User home directories have appropriate permissionsOSC-93005

      User home directories have appropriate permissions

      Rule IDOSC-93005
      Result
      fail
      Time2016-12-24T16:32:27
      Severitymedium
      Identifiers and References
      Description

      Home directories must be writable and searchable by their owners. Typically, other users do not have rights to modify those files or add files to the user's home directory.

      SCE stdout
      /usr/bin/find: cannot read dir /root: Permission denied
      drwxr-xr-x  28 ccebi    staff         40 Dec 24 15:10 /export/home/ccebi
      
      Remediation description:
      User home directories should have permissions of 750 to prevent other users from having inappropriate access to their files.
      Remediation script:
      
          # chmod 750 <user-home-dir>
            
      User home directory ownership is correctOSC-92505

      User home directory ownership is correct

      Rule IDOSC-92505
      Result
      pass
      Time2016-12-24T16:32:28
      Severitymedium
      Identifiers and References
      Description

      The user must own the user's home directory.

      Find and list .rhosts filesOSC-91505

      Find and list .rhosts files

      Rule IDOSC-91505
      Result
      pass
      Time2016-12-24T16:32:28
      Severitymedium
      Identifiers and References
      Description

      .rhosts files can provide easy access to remote hosts by bypassing the password requirement. These files should be removed.

      Find and list .forward filesOSC-90000

      Find and list .forward files

      Rule IDOSC-90000
      Result
      pass
      Time2016-12-24T16:32:28
      Severitymedium
      Identifiers and References
      Description

      .forward files can provide easy transport of information outside the firewall or outside the user's home directory.

      Find and list .netrc filesOSC-90500

      Find and list .netrc files

      Rule IDOSC-90500
      Result
      pass
      Time2016-12-24T16:32:28
      Severitymedium
      Identifiers and References
      Description

      The .netrc file contains data for logging in to a remote host over the network for file transfers by FTP.

      Permissions on User .netrc Files are correctOSC-91005

      Permissions on User .netrc Files are correct

      Rule IDOSC-91005
      Result
      pass
      Time2016-12-24T16:32:28
      Severitymedium
      Identifiers and References
      Description

      The .netrc file contains login credentials to remote systems for file transfers by FTP. The permissions should be set to disallow read access by group and others. See the chmod(1) man page.

      Permissions on User "." (Hidden) Files are correctOSC-92005

      Permissions on User "." (Hidden) Files are correct

      Rule IDOSC-92005
      Result
      pass
      Time2016-12-24T16:32:28
      Severitymedium
      Identifiers and References
      Description

      Hidden files in a user's home directory should be owned by the user. Directories should allow read-write-execute (rwx) permissions to the user only. Files should allow read-write (rw) permissions to the user only.

      SCE stdout
      find: stat() error /root/.[A-Za-z0-9]*: Permission denied