AIX7-00-003049 - The AIX DHCP client must be disabled.

Information

The dhcpcd daemon receives address and configuration information from the DHCP server. DHCP relies on trusting the local network. If the local network is not trusted, then it should not be used.

To prevent remote attacks this daemon should not be enabled unless there is no alternative.

Satisfies: SRG-OS-000095-GPOS-00049, SRG-OS-000480-GPOS-00227

Solution

Disable the system's DHCP client.

In '/etc/rc.tcpip', comment out the 'dhcpcd' entry by running command:

# chrctcp -d dhcpcd

Reboot the system to ensure the DHCP client has been disabled fully.

Configure a static IP for the system, if network connectivity is required.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_IBM_AIX_7-x_V3R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., 800-53|CM-7a., CAT|II, CCI|CCI-000366, CCI|CCI-000381, Rule-ID|SV-215355r958478_rule, STIG-ID|AIX7-00-003049, STIG-Legacy|SV-101433, STIG-Legacy|V-91335, Vuln-ID|V-215355

Plugin: Unix

Control ID: 0449a3c894efa63965d6c2b5c7746e877ccadfd92b1109c316597df572eea415