STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Red Hat Enterprise Linux 10 Security Technical Implementation Guide

V-280999

CAT II (Medium)

RHEL 10 must be configured to prevent unrestricted mail relaying.

Rule ID

SV-280999r1165352_rule

STIG

Red Hat Enterprise Linux 10 Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000381

Discussion

If unrestricted mail relaying is permitted, unauthorized senders could use this host as a mail relay to send spam or for other unauthorized activity.

Check Content

Note: If postfix is not installed, this is not applicable.

Verify RHEL 10 is configured to prevent unrestricted mail relaying with the following command:

$ postconf -n smtpd_client_restrictions
smtpd_client_restrictions = permit_mynetworks,reject

If the "smtpd_client_restrictions" parameter contains any entries other than "permit_mynetworks" and "reject", and the additional entries have not been documented with the information system security officer, this is a finding.

Fix Text

Configure RHEL 10 so that the postfix configuration file restricts client connections to the local network with the following command:

$ sudo postconf -e 'smtpd_client_restrictions = permit_mynetworks,reject'