UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The HP FlexFabric Switch must obtain its public key certificates from an appropriate certificate policy through an approved service provider.


Overview

Finding ID Version Rule ID IA Controls Severity
V-66293 HFFS-ND-000139 SV-80783r1_rule Medium
Description
For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure cross-certified with the Federal Bridge Certification Authority at medium assurance or higher, this Certification Authority will suffice.
STIG Date
HP FlexFabric Switch NDM Security Technical Implementation Guide 2019-09-27

Details

Check Text ( C-66939r1_chk )
Determine if the HP FlexFabric Switch obtains public key certificates from an appropriate certificate policy through an approved service provider.

[HP] display pki certificate domain HP local

Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3e:7b:9b:bb:00:00:00:00:00:28
Signature Algorithm: sha1WithRSAEncryption
Issuer: DC=local, DC=rae-domain, CN=rae-domain-WIN2008-RAE-CA
Validity
Not Before: Apr 23 18:19:27 2015 GMT
Not After : Apr 22 18:19:27 2016 GMT
Subject: unstructuredAddress=15.252.76.101, C=US, ST=MA, L=Littleton, O=HP, OU=STG, CN=12508
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:e1:13:04:10:94:4a:a9:f7:6b:42:bb:64:13:4a:
eb:10:48:60:61:a5:e7:d6:13:95:2d:69:b0:79:ae:
df:be:e3:a2:5d:7d:be:3b:97:b9:2c:99:05:37:ea:
bf:a9:95:49:e7:08:50:14:68:fc:1d:16:83:f9:ea:
66:cc:8a:8f:f9:9c:28:dc:66:7a:80:0c:53:5e:cc:
a2:ee:4a:c3:4f:fb:6f:81:00:6c:4f:5d:72:e7:34:
dc:4c:06:18:97:7d:da:45:b5:f1:2b:7e:71:c7:62:
b3:59:fe:b9:6d:62:19:43:fd:73:93:fc:f5:ed:5e:
08:db:76:e7:66:26:cb:17:fd:69:a5:f5:b9:7e:e9:
9b:b4:91:30:d1:1a:1b:89:a3:ed:07:99:59:33:1e:
de:4d:96:34:67:8c:b2:20:4d:5f:ec:19:49:33:d6:
14:57:03:a5:90:9c:a7:6a:31:3f:37:c3:29:5b:0a:
db:24:2c:83:7d:e9:cb:c3:70:55:24:36:f5:c5:3f:
f5:4e:f5:87:05:99:2d:4a:59:6f:d9:2e:2d:90:c7:
fa:43:59:86:50:ee:e0:fc:2a:f9:bc:52:8c:39:d0:
05:3f:85:5c:5e:6b:5f:95:31:7b:e7:1e:b7:b5:af:
08:0d:34:8f:a0:07:4a:5a:32:eb:e7:39:5f:0e:9a:
f5:01
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature
X509v3 Subject Alternative Name:
IP Address:15.252.76.101
X509v3 Subject Key Identifier:
A7:B8:9F:0D:07:A9:31:91:ED:90:5C:F6:BF:6C:E0:7D:58:74:AB:08
X509v3 Authority Key Identifier:
keyid:07:8D:A0:CF:CB:47:DB:E3:BE:E9:F6:18:21:F6:19:05:B8:34:26:3E

X509v3 CRL Distribution Points:

Full Name:
URI:ldap:///CN=rae-domain-WIN2008-RAE-CA,CN=WIN2008-RAE,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=rae-domain,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint
Authority Information Access:
CA Issuers - URI:ldap:///CN=rae-domain-WIN2008-RAE-CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=rae-domain,DC=local?cACertificate?base?objectClass=certificationAuthority

1.3.6.1.4.1.311.21.7:
0,.$+.....7.....E...\...
...0.............d...
X509v3 Extended Key Usage:
Code Signing
1.3.6.1.4.1.311.21.10:
0.0
..+.......
Signature Algorithm: sha1WithRSAEncryption
0b:1f:81:59:9d:4b:bf:b7:1c:a9:45:af:9e:2d:ab:0e:d4:a9:
20:3b:f7:25:36:59:72:da:c9:80:3d:66:66:ab:4f:bf:d7:b4:
55:23:96:24:2e:43:2c:20:79:41:d7:ec:23:18:55:49:d7:42:
36:d3:0f:1f:99:50:c7:84:94:0f:6f:b0:b7:e7:6a:e7:e7:e0:
d5:b8:09:f7:3d:1e:9b:6e:9e:7a:d8:39:30:66:60:f5:05:fd:
d9:68:0d:22:73:7e:91:69:8c:a3:99:2f:24:a3:9b:96:a7:37:
1d:a6:42:50:6d:8f:92:bf:90:8f:2b:26:a5:26:5c:59:f1:ef:
12:1f:d3:77:8e:59:58:3c:c1:1c:20:74:31:95:2b:f2:71:69:
39:fd:9b:06:4e:09:08:55:bc:ce:a7:3c:4e:1a:64:ae:0e:1b:
a4:61:89:17:d1:72:31:20:2f:cc:24:97:d1:dd:1c:28:98:84:
00:bc:3c:0e:c4:14:dd:26:6f:20:7d:0d:82:f7:71:d2:00:ec:
1c:10:2e:35:a8:cc:75:0f:76:1b:7f:f2:d4:d9:df:a5:f8:c2:
75:38:4c:7c:7f:42:81:a1:36:23:a8:f3:c1:9e:f2:12:02:6f:
db:3c:38:b5:0b:e4:0b:ea:f9:17:81:b2:6e:2c:34:7c:35:dc:
9f:e8:b9:0d

If the HP FlexFabric Switch does not obtain its public key certificates from an appropriate certificate policy through an approved service provider, this is a finding.
Fix Text (F-72369r1_fix)
Configure the HP FlexFabric Switch to obtain its public key certificates in offline mode from an appropriate certificate policy through an approved service provider.

Configure PKI entity:
[HP] pki entity HP
[HP-pki-entity-HP] common-name HP
[HP-pki-entity-HP] country US
[HP-pki-entity-HP] locality Littleton
[HP-pki-entity-HP] organization-unit STG
[HP-pki-entity-HP] organization HP
[HP-pki-entity-HP] state MA
[HP-pki-entity-HP] ip 15.252.76.101
[HP-pki-entity-HP] quit

Configure PKI domain:
[HP] pki domain HP
[HP-pki-domain-HP] certificate request entity HP
[HP-pki-domain-HP] public-key rsa general name hostkey
[HP-pki-domain-HP] source ip 15.252.76.101
[HP-pki-domain-HP] undo crl check enable
[HP-pki-domain-HP] quit

Submit certificate request on the switch:
[HP] pki request-certificate domain HP pkcs10

Transfer and import downloaded CA and user certificates to the switch:
[HP] pki import domain jitc pem ca filename rae-root-ca.cer
[HP] pki import domain jitc pem local filename HP.cer

Note: Configuration required on the server side is not covered here.