Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-38625 | RHEL-06-000252 | SV-50426r2_rule | Medium |
Description |
---|
The LDAP server will use unencrypted connections by default. If the LDAP daemon is not configured to use” ldaps:///”, all communications between the client and the server will not be encrypted. The LDAP server should be configured to use “ldaps:///” over the default “ldap:///”. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 6 Security Technical Implementation Guide | 2016-06-05 |
Check Text ( C-46184r2_chk ) |
---|
If the system does not use LDAP for authentication or account information, this is not applicable. To ensure LDAP is configured to use TLS for all transactions, run the following command: # ps –ef | grep “slapd” If the LDAP daemon is not using “ldaps:///”, this is a finding. If the LDAP daemon is using “ldap:///”, this is a finding. Verify that the LDAP client cannot connect using an unencrypted method. # openssl s_client –connect [HOST]:389 If the following line is not returned, this is a finding: Socket: Connection refused. Note: The default port for unencrypted LDAP connections is 389. |
Fix Text (F-43574r2_fix) |
---|
Configure the LDAP server to enforce TLS use. |