RHEL 10 must disable the chrony daemon from acting as a server.

STIG ID: RHEL-10-200542  |  SRG: SRG-OS-000096-GPOS-00050 |  Severity: medium (CAT II)  |  CCI: CCI-000382,CCI-000381 |  Vulnerability Id: V-280960

Vulnerability Discussion

Minimizing the exposure of the server functionality of the chrony daemon diminishes the attack surface.

Satisfies: SRG-OS-000096-GPOS-00050, SRG-OS-000095-GPOS-00049

Check

Verify RHEL 10 disables the chrony daemon from acting as a server with the following command:

$ sudo grep -w port /etc/chrony.conf
port 0

If the "port" option is not set to "0", is commented out, or is missing, this is a finding.

Fix

Configure RHEL 10 to disable the chrony daemon from acting as a server by adding/modifying the following line in the "/etc/chrony.conf" file:

port 0

Restart the chronyd service with the following command for the changes to take effect:

$ sudo systemctl restart chronyd