Skip to content

IBM AIX 7.x Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The talk daemon must be disabled on AIX.

    <VulnDiscussion>This talk service is used to establish an interactive two-way communication link between two UNIX users. Unless required the ...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The ntalk daemon must be disabled on AIX.

    &lt;VulnDiscussion&gt;This service establishes a two-way communication link between two users, either locally or remotely. Unless required the ntal...
    Rule High Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The sprayd daemon must be disabled on AIX.

    &lt;VulnDiscussion&gt;The sprayd service is used as a tool to generate UDP packets for testing and diagnosing network problems. The service must be...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The finger daemon must be disabled on AIX.

    &lt;VulnDiscussion&gt;The fingerd daemon provides the server function for the finger command. This allows users to view real-time pertinent user lo...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The instsrv daemon must be disabled on AIX.

    &lt;VulnDiscussion&gt;The instsrv service is part of the Network Installation Tools, used for servicing servers running AIX 3.2. This service shoul...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The echo daemon must be disabled on AIX.

    &lt;VulnDiscussion&gt;The echo service can be used in Denial of Service or SMURF attacks. It can also be used by someone else to get through a fire...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • AIX must provide xlock command in the CDE environment to let users retain their sessions lock until users are reauthenticated.

    &lt;VulnDiscussion&gt;All systems are vulnerable if terminals are left logged in and unattended. Leaving system terminals unsecure poses a potentia...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must contain no .forward files.

    &lt;VulnDiscussion&gt;The .forward file allows users to automatically forward mail to another system. Use of .forward files could allow the unautho...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The sendmail server must have the debug feature disabled on AIX systems.

    &lt;VulnDiscussion&gt;Debug mode is a feature present in older versions of Sendmail which, if not disabled, may allow an attacker to gain access to...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must turn off TCP forwarding for the SSH daemon.

    &lt;VulnDiscussion&gt;SSH TCP connection forwarding provides a mechanism to establish TCP connections proxied by the SSH server. This function can ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • The AIX SSH daemon must be configured to disable empty passwords.

    &lt;VulnDiscussion&gt;When password authentication is allowed, PermitEmptyPasswords specifies whether the server allows login to accounts with empt...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • The AIX SSH daemon must be configured to disable user .rhosts files.

    &lt;VulnDiscussion&gt;Trust .rhost file means a compromise on one host can allow an attacker to move trivially to other hosts.&lt;/VulnDiscussion&g...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • The AIX SSH daemon must be configured to not use host-based authentication.

    &lt;VulnDiscussion&gt;SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts.&lt;/VulnDiscuss...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • The AIX SSH daemon must not allow RhostsRSAAuthentication.

    &lt;VulnDiscussion&gt;If SSH permits rhosts RSA authentication, a user may be able to log in based on the keys of the host originating the request ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00232

    <GroupDescription></GroupDescription>
    Group
  • If AIX SSH daemon is required, the SSH daemon must only listen on the approved listening IP addresses.

    &lt;VulnDiscussion&gt;The SSH daemon should only listen on the approved listening IP addresses. Otherwise the SSH service could be subject to unaut...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX system must require authentication upon booting into single-user and maintenance modes.

    &lt;VulnDiscussion&gt;This prevents attackers with physical access from trivially bypassing security on the machine and gaining root access. Such a...
    Rule Medium Severity
  • SRG-OS-000281-GPOS-00111

    <GroupDescription></GroupDescription>
    Group
  • The control script lists of preloaded libraries must contain only absolute paths on AIX systems.

    &lt;VulnDiscussion&gt;The library preload list environment variable contains a list of libraries for the dynamic linker to load before loading the ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.

    &lt;VulnDiscussion&gt;Setting the most restrictive default permissions ensures that when new accounts are created they do not have unnecessary acce...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the AIX system.

    &lt;VulnDiscussion&gt;Trust files are convenient, but when used in conjunction with the remote login services, they can allow unauthenticated acces...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • AIX run control scripts executable search paths must contain only absolute paths.

    &lt;VulnDiscussion&gt;The executable search path (typically the PATH environment variable) contains a list of directories for the shell to search t...
    Rule Medium Severity
  • SRG-OS-000074-GPOS-00042

    <GroupDescription></GroupDescription>
    Group
  • The AIX rsh daemon must be disabled.

    &lt;VulnDiscussion&gt;The rsh daemon permits username and passwords to be passed over the network in clear text.&lt;/VulnDiscussion&gt;&lt;FalsePos...
    Rule High Severity
  • SRG-OS-000074-GPOS-00042

    <GroupDescription></GroupDescription>
    Group
  • The AIX rlogind service must be disabled.

    &lt;VulnDiscussion&gt;The rlogin daemon permits username and passwords to be passed over the network in clear text.&lt;/VulnDiscussion&gt;&lt;False...
    Rule High Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The AIX qdaemon must be disabled if local or remote printing is not required.

    &lt;VulnDiscussion&gt;The qdaemon program is the printing scheduling daemon that manages the submission of print jobs to the piobe service. To pre...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • If AIX system does not act as a remote print server for other servers, the lpd daemon must be disabled.

    &lt;VulnDiscussion&gt;The lpd daemon accepts remote print jobs from other systems. To prevent remote attacks this daemon should not be enabled unl...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • If AIX system does not support either local or remote printing, the piobe service must be disabled.

    &lt;VulnDiscussion&gt;The piobe daemon is the I/O back end for the printing process, handling the job scheduling and spooling. To prevent remote a...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules