Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22565 | GEN008180 | SV-40760r1_rule | ECLP-1 | Medium |
Description |
---|
LDAP can be used to provide user authentication and account information, which are vital to system security. The LDAP client configuration must be protected from unauthorized modification. |
STIG | Date |
---|---|
Solaris 10 SPARC Security Technical Implementation Guide | 2020-02-26 |
Check Text ( C-39503r2_chk ) |
---|
Check if the system is using NSS LDAP. # grep -v '^#' /etc/nsswitch.conf | grep ldap If no lines are returned, this vulnerability is not applicable. Verify the mode of the certificate database files. # ls -lL /var/ldap/cert8.db /var/ldap/key3.db /var/ldap/secmod.db If the mode of any of the files is more permissive than 0644, this is a finding. |
Fix Text (F-34620r2_fix) |
---|
Change the mode of the certificate database files. # chmod 0644 /var/ldap/cert8.db /var/ldap/key3.db /var/ldap/secmod.db NOTE: Some SAs may prefer to set the permissions to 0600. This is acceptable. |