Information
This action listed prevents keyserv from using default keys for the nobody user, effectively stopping the nobody user from accessing information via Secure RPC.
Rationale:
If login by the user nobody is allowed for secure RPC, there is an increased risk of system compromise. If keyserv holds a private key for the nobody user, it will be used by key_encryptsession to compute a magic phrase which can be easily recovered by a malicious user.
Solution
Perform the following to implement the recommended state:
# cd /etc/default
# cp keyserv keyserv.orig
# awk '/ENABLE_NOBODY_KEYS=/ { $1 = 'ENABLE_NOBODY_KEYS=NO' } { print }' keyserv > keyserv.CIS
# mv keyserv.CIS keyserv