UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The krb5-workstation package must not be installed on RHEL 8.


Overview

Finding ID Version Rule ID IA Controls Severity
V-230239 RHEL-08-010162 SV-230239r646864_rule Medium
Description
Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied upon to provide confidentiality or integrity, and DoD data may be compromised. RHEL 8 systems utilizing encryption are required to use FIPS-compliant mechanisms for authenticating to cryptographic modules. Currently, Kerberos does not utilize FIPS 140-2 cryptography. FIPS 140-2 is the current standard for validating that mechanisms used to access cryptographic modules utilize authentication that meets DoD requirements. This allows for Security Levels 1, 2, 3, or 4 for use on a general-purpose computing system.
STIG Date
Red Hat Enterprise Linux 8 Security Technical Implementation Guide 2023-03-08

Details

Check Text ( C-32908r646863_chk )
Verify the krb5-workstation package has not been installed on the system with the following commands:

If the system is a server or is utilizing krb5-workstation-1.17-18.el8.x86_64 or newer, this is Not Applicable.

$ sudo yum list installed krb5-workstation

krb5-workstation.x86_64 1.17-9.el8 repository

If the krb5-workstation package is installed and is not documented with the Information System Security Officer (ISSO) as an operational requirement, this is a finding.
Fix Text (F-32883r567464_fix)
Document the krb5-workstation package with the ISSO as an operational requirement or remove it from the system with the following command:

$ sudo yum remove krb5-workstation