UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Ubuntu operating system must implement certificate status checking for multifactor authentication.


Overview

Finding ID Version Rule ID IA Controls Severity
V-219320 UBTU-18-010434 SV-219320r853388_rule Medium
Description
The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use of the CAC to support identity management and personal authentication for systems covered under Homeland Security Presidential Directive (HSPD) 12, as well as making the CAC a primary component of layered protection for national security systems.
STIG Date
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide 2023-11-21

Details

Check Text ( C-21045r305288_chk )
Verify the Ubuntu operating system implements certificate status checking for multifactor authentication.

Check that certificate status checking for multifactor authentication is implemented with the following command:

# sudo grep use_pkcs11_module /etc/pam_pkcs11/pam_pkcs11.conf | awk '/pkcs11_module opensc {/,/}/' /etc/pam_pkcs11/pam_pkcs11.conf | grep cert_policy | grep ocsp_on

cert_policy = ca,signature,ocsp_on;

If "cert_policy" is not set to "ocsp_on", or the line is commented out, this is a finding.
Fix Text (F-21044r305289_fix)
Configure the Ubuntu operating system to certificate status checking for multifactor authentication.

Modify all of the cert_policy lines in "/etc/pam_pkcs11/pam_pkcs11.conf" to include ocsp_on.