STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215415

CAT II (Medium)

SMTP service must not have the EXPN or VRFY features active on AIX systems.

Rule ID

SV-215415r991589_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-000366

Discussion

The SMTP EXPN function allows an attacker to determine if an account exists on a system, providing significant assistance to a brute force attack on user accounts. EXPN may also provide additional information concerning users on the system, such as the full names of account owners. The VRFY (Verify) command allows an attacker to determine if an account exists on a system, providing significant assistance to a brute force attack on user accounts. VRFY may provide additional information about users on the system, such as the full names of account owners.

Check Content

Check the "PrivacyOptions" parameter in "/etc/mail/sendmail.cf":
# grep -v "^#" /etc/mail/sendmail.cf |grep -i privacyoptions 

The above command should yield the following output:
O PrivacyOptions=goaway

The "O PrivacyOptions" should have the "goaway" option (covering both noexpn and novrfy). 

If the "O PrivacyOptions" value does not contain "goaway", this is a finding.

Fix Text

Edit the "sendmail.cf" file and add or edit the following line: 
O PrivacyOptions=goaway 

Restart the "Sendmail" service:
# startsrc -s sendmail -a "-bd -q30m"