Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22555 | GEN007980 | SV-41038r1_rule | DCNR-1 | Medium |
Description |
---|
LDAP can be used to provide user authentication and account information, which are vital to system security. Communication between an LDAP server and a host using LDAP requires protection. |
STIG | Date |
---|---|
Solaris 10 X86 Security Technical Implementation Guide | 2013-07-02 |
Check Text ( C-39658r1_chk ) |
---|
Check if the system is using NSS LDAP. # grep -v '^#' /etc/nsswitch.conf | grep ldap If no lines are returned, this vulnerability is not applicable. Verify TLS is used for client authentications to the server # grep "NS_LDAP_AUTH=" /var/ldap/ldap_client_file If any of the authentication methods used do not begin with "tls:", this is a finding. Retrieve the list of LDAP servers. # grep "NS_LDAP_SERVERS=" /var/ldap/client_file Use the certutil to verify the cipher(s) used for every server. # certutil -L -n < host nickname > -d /var/ldap If any of the TLS connections do not use FIPS 140-2 approved cryptographic algorithms, this is a finding. |
Fix Text (F-34803r1_fix) |
---|
Configure all LDAP authentications and connections to be encrypted using TLS and FIPS 140-2 approved cryptographic algorithms. |