GEN004680 - The SMTP service must not have the VRFY feature active.

Information

The VRFY (Verify) command allows an attacker to determine if an account exists on a system, providing significant assistance to a brute-force attack on user accounts. VRFY may provide additional information about users on the system, such as the full names of account owners.

Solution

If Sendmail is running, add the line Opnovrfy to the Sendmail configuration file, usually located in /etc/sendmail.cf. For other mail servers, contact the vendor for information on how to disable the verify command. Newer versions of Sendmail are available at http://www.sendmail.org or from ftp://ftp.cs.berkeley.edu/ucb/sendmail.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_x86_V2R4_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-227849r603266_rule, STIG-ID|GEN004680, STIG-Legacy|SV-4693, STIG-Legacy|V-4693, Vuln-ID|V-227849

Plugin: Unix

Control ID: 6c0527bda5858553d787812dda64123b7a03adfd102e623ee0c962deac7c9817