SOL-11.1-050140 - The system must implement TCP Wrappers - '/etc/hosts.deny'

Information

TCP Wrappers is a host-based access control system that allows administrators to control who has access to various network services based on the IP address of the remote end of the connection. TCP Wrappers also provides logging information via syslog about both successful and unsuccessful connections.

TCP Wrappers provides granular control over what services can be accessed over the network. Its logs show attempted access to services from non-authorized systems, which can help identify unauthorized access attempts.

Solution

The root role is required.

Configure allowed and denied hosts per organizational policy.

1. Create and customize the policy in /etc/hosts.allow:

# echo 'ALL: [net]/[mask] , [net]/[mask], ...' > /etc/hosts.allow

where each [net>/[mask> combination (for example, the Class C address block '192.168.1.0/255.255.255.0') can represent one network block in use by the organization that requires access to this system.

2. Create a default deny policy in /etc/hosts.deny: # echo 'ALL: ALL' >/etc/hosts.deny

3. Enable TCP Wrappers for all services started by inetd:

# inetadm -M tcp_wrappers=TRUE

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_x86_V2R4_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, CAT|III, CCI|CCI-000366, CSCv6|3.1, Rule-ID|SV-216144r603268_rule, STIG-ID|SOL-11.1-050140, STIG-Legacy|SV-61093, STIG-Legacy|V-48221, Vuln-ID|V-216144

Plugin: Unix

Control ID: f183366d318bf4304e46538c2d93f2238fa0577e4f674694386c54ba3b5565de