STIGQter STIGQter: STIG Summary: IBM AIX 7.x Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

The echo daemon must be disabled on AIX.

DISA Rule

SV-215391r508663_rule

Vulnerability Number

V-215391

Group Title

SRG-OS-000095-GPOS-00049

Rule Version

AIX7-00-003086

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

In "/etc/inetd.conf", comment out the "echo" entries by running commands:
# chsubserver -r inetd -C /etc/inetd.conf -d -v 'echo' -p 'tcp'
# chsubserver -r inetd -C /etc/inetd.conf -d -v 'echo' -p 'udp'

Restart inetd:
# refresh -s inetd

Check Contents

Check the /etc/inetd.conf for TCP and UDP echo service entries using command:
# grep echo /etc/inetd.conf | grep -v \#

If there is any output from the command, this is a finding.

Vulnerability Number

V-215391

Documentable

False

Rule Version

AIX7-00-003086

Severity Override Guidance

Check the /etc/inetd.conf for TCP and UDP echo service entries using command:
# grep echo /etc/inetd.conf | grep -v \#

If there is any output from the command, this is a finding.

Check Content Reference

M

Target Key

4012

Comments