Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22556 | GEN008000 | SV-37631r1_rule | DCNR-1 | Medium |
Description |
---|
LDAP can be used to provide user authentication and account information, which are vital to system security. Communication between an LDAP server and a host using LDAP requires authentication. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2013-07-03 |
Check Text ( C-36829r1_chk ) |
---|
Verify the source of the LDAP certificates Check if the system is using NSS LDAP. # grep -v '^#' /etc/nsswitch.conf | grep ldap If no lines are returned, this vulnerability is not applicable. Verify with the SA that the system is connected to the GIG. If the system part of a stand alone network which is not connected to the GIG this vulnerability is not applicable. Verify a certificate is used for client authentication to the server. # grep -i '^tls_cert' /etc/ldap.conf If no line is found, this is a finding. List the certificate issuer. # openssl x509 -text -in If the certificate is not issued by DoD PKI or a DoD-approved external PKI, this is a finding. |
Fix Text (F-31668r1_fix) |
---|
Edit "/etc/ldap.conf" and add or edit the 'tls_cert' setting to reference a file containing a client certificate issued by DoD PKI or a DoD-approved external PKI. |