UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The setting enabling users to configure the check publisher certificates for revocation must be locked.


Overview

Finding ID Version Rule ID IA Controls Severity
V-32831 JRE0030-UX SV-43617r2_rule DCBP-1 Medium
Description
A certificate revocation list is a directory which contains a list of certificates that have been revoked for various reasons. Certificates may be revoked due to improper issuance, compromise of the certificate, and failure to adhere to policy. Therefore, any certificate found on a CRL should not be trusted. Permitting execution of an applet published with a revoked certificate may result in spoofing, malware, system modification, invasion of privacy, and denial of service. Ensuring users cannot change settings contributes to a more consistent security profile. NOTE: The 'JRE' directory in the file path may reflect the specific JRE release installed.
STIG Date
Java Runtime Environment (JRE) version 6 STIG for Unix 2013-07-25

Details

Check Text ( C-41480r11_chk )
If the system is on the SIPRNET, this requirement is NA.

Navigate to the system 'deployment.properties' file for Java, the default location is
/usr/java/jre/lib/deployment.properties.

If the 'deployment.security.validation.crl.locked' key is not present within the file, this is a finding.
Fix Text (F-37120r8_fix)
Lock the 'Check certificates for revocation Certificate Revocation Lists (CRL)' option.

Navigate to the system 'deployment.properties' file for Java, the default location is
/usr/java/jre/lib/deployment.properties.

Edit the file and add the 'deployment.security.validation.crl.locked' key.