STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

V-24386

CAT I (High)

The telnet daemon must not be running.

Rule ID

SV-45809r1_rule

STIG

SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

Version

V1R12

CCIs

CCI-000197

Discussion

The telnet daemon provides a typically unencrypted remote access service which does not provide for the confidentiality and integrity of user passwords or the remote session. If a privileged user were to log on using this service, the privileged user password could be compromised.

Check Content

# chkconfig --list | grep telnet
If an entry is returned and any run level is “on” telnet is running.

If the telnet daemon is running, this is a finding.

Fix Text

Identify the telnet service running and disable it.

Procedure
# insserv –r telnetd

If telnet is running as an xinetd service,  edit the /etc/xinetd.d file and set “disable = yes” and then restart the xinetd service:
# rcxinetd restart


disable the telnet server:
chkconfig telnet off

verify the telnet daemon is no longer running:

# ps -ef |grep telnet