GEN006080 - The Samba Web Administration Tool (SWAT) must be restricted to the local host or require SSL - '/etc/xinetd.d/swat'

Information

SWAT is a tool used to configure Samba. It modifies Samba configuration, which can impact system security, and must be protected from unauthorized access. SWAT authentication may involve the root password, which must be protected by encryption when traversing the network.

Restricting access to the local host allows for the use of SSH TCP forwarding, if configured, or administration by a web browser on the local system.

Solution

Disable SWAT or require SWAT is only accessed via SSH.

Procedure:
If SWAT is not needed for operation of the system remove the SWAT package:
# rpm -qa|grep swat

Remove 'samba-swat' or 'samba3x-swat' depending on which one is installed
# rpm --erase samba-swat
or
# rpm --erase samba3x-swat

If SWAT is required but not at all times disable it when it is not needed.
Modify the /etc/xinetd.d file for 'swat' to contain a 'disable = yes' line.

To access using SSH:
Follow vendor configuration documentation to create an stunnel for SWAT.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V1R14_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7, CAT|II, CCI|CCI-001436, CSCv6|9.1, Rule-ID|SV-64123r1_rule, STIG-ID|GEN006080, Vuln-ID|V-1026

Plugin: Unix

Control ID: 22c4a43c73afc7d998f7c02b9216b2043cd6ec0f1e366921d1be5e25b795b192