SOL-11.1-050180 - The operating system must employ strong identification and authentication techniques in the establishment of non-local maintenance and diagnostic sessions - filters

Information

Non-local maintenance and diagnostic communications often contain sensitive information and must be protected. The security of these remote accesses can be ensured by sending non-local maintenance and diagnostic communications through encrypted channels enforced via firewall configurations.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

The root role is required.
For Solaris 11, 11.1, 11.2, and 11.3 that use IP Filter configure and enable the IP Filters policy.

# pfedit /etc/ipf/ipf.conf.

Add these lines to the file:

# Allow SSH (note you cannot restrict to SSHv2 here. This can
# only be done in /etc/ssh/sshd_config.)
pass in log quick proto tcp from any to any port = 22 keep state
# Do not allow all outbound traffic, keep state, and log
block out log all keep state keep frags
# Block and log everything else that comes in
block in log all
block in log from any to 255.255.255.255
block in log from any to 127.0.0.1/32

Enable ipfilter.

# svcadm enable ipfilter

Notify ipfilter to use the new configuration file.

# ipf -Fa -f /etc/ipf/ipf.conf

For Solaris 11.3 or newer that use Packet Filter configure and enable the Packet Filter's policy.
# pfedit /etc/firewall/pf.conf.
Add these lines to the file:
# Allow SSH (note you cannot restrict to SSHv2 here. This can
# only be done in /etc/ssh/sshd_config.)
pass in log quick on any proto tcp to port ssh
# Block and log all traffic on all interfaces in either direction from
# anywhere to anywhere
block log all
Enable Packet Filter.
# svcadm enable firewall:default

Note: This is an extremely strict firewall policy disabling all network traffic except incoming SSH (port 22) connections. Operational requirements may dictate the addition of other protocols such as DNS, NTP, HTTP, and HTTPS to be allowed.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_SPARC_V2R2_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(12), CAT|II, CCI|CCI-000877, Rule-ID|SV-216385r603267_rule, STIG-ID|SOL-11.1-050180, STIG-Legacy|SV-61111, STIG-Legacy|V-48239, Vuln-ID|V-216385

Plugin: Unix

Control ID: 9a656ab5e69ddea295dd7d6e6e85ad9f3ec4f6707a65bbee6865deefe5234f8a