SOL-11.1-040320 - The nobody access for RPC encryption key storage service must be disabled.

Information

If login by the user 'nobody' is allowed for secure RPC, there is an increased risk of system compromise. If keyserv holds a private key for the 'nobody' user, it will be used by key_encryptsession to compute a magic phrase which can be easily recovered by a malicious user.

Solution

Determine if the rpc-authdes package is installed:

# pkg list solaris/legacy/security/rpc-authdes

If the output of this command is:

pkg list: no packages matching 'solaris/legacy/security/rpc-authdes' installed

no further action is required.

The root role is required.

Modify the /etc/default/keyserv file.

# pfedit /etc/default/keyserv

Locate the line:

#ENABLE_NOBODY_KEYS=YES

Change it to:

ENABLE_NOBODY_KEYS=NO

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_SPARC_V2R4_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|CM-6, 800-53|SC-12, CAT|II, CCI|CCI-000366, CSCv6|3.1, Rule-ID|SV-216350r603267_rule, STIG-ID|SOL-11.1-040320, STIG-Legacy|SV-60961, STIG-Legacy|V-48089, Vuln-ID|V-216350

Plugin: Unix

Control ID: 0f1f5d1b48219d799c28c4c3590b634f669c2a0ff2af4beb99d2195c7b46cf5b