GEN005140 - Any active TFTP daemon must be authorized and approved in the system accreditation package.

Information

TFTP is a file transfer protocol often used by embedded systems to obtain configuration data or software. The service is unencrypted and does not require authentication of requests. Data available using this service may be subject to unauthorized access or interception.

Solution

Document or Disable the TFTP daemon.

If the TFTP daemon is necessary on the system, document and justify its usage for approval from the IAO.

If the TFTP daemon is not necessary on the system, turn it off.

# chkconfig tftp off
# service xinetd restart

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-6, 800-53|SC-4, CAT|I, CCI|CCI-000225, CCI|CCI-001090, Rule-ID|SV-218569r603259_rule, STIG-ID|GEN005140, STIG-Legacy|SV-63167, STIG-Legacy|V-4695, Vuln-ID|V-218569

Plugin: Unix

Control ID: af90514988059b30b0ac1d82b8d9b54c9e9deae1e2e6dc0a53224a750f5f6a62