UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The krb5-server package must not be installed on RHEL 8.


Overview

Finding ID Version Rule ID IA Controls Severity
V-237640 RHEL-08-010163 SV-237640r646890_rule Medium
Description
Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied upon to provide confidentiality or integrity, and DoD data may be compromised. RHEL 8 systems utilizing encryption are required to use FIPS-compliant mechanisms for authenticating to cryptographic modules. Currently, Kerberos does not utilize FIPS 140-2 cryptography. FIPS 140-2 is the current standard for validating that mechanisms used to access cryptographic modules utilize authentication that meets DoD requirements. This allows for Security Levels 1, 2, 3, or 4 for use on a general-purpose computing system.
STIG Date
Red Hat Enterprise Linux 8 Security Technical Implementation Guide 2023-06-02

Details

Check Text ( C-40859r646888_chk )
Verify the krb5-server package has not been installed on the system with the following commands:

If the system is a workstation or is utilizing krb5-server-1.17-18.el8.x86_64 or newer, this is Not Applicable

$ sudo yum list installed krb5-server

krb5-server.x86_64 1.17-9.el8 repository

If the krb5-server package is installed and is not documented with the Information System Security Officer (ISSO) as an operational requirement, this is a finding.
Fix Text (F-40822r646889_fix)
Document the krb5-server package with the ISSO as an operational requirement or remove it from the system with the following command:

$ sudo yum remove krb5-server