UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system time synchronization method must use cryptographic algorithms to verify the authenticity and integrity of the time data.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22293 GEN000246-RH SV-44775r1_rule ECSC-1 Medium
Description
A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit records with other systems. If an illicit time source is used for synchronization, the integrity of system logs and the security of the system could be compromised.
STIG Date
SUSE Linux Enterprise Server v11 for System z 2013-04-26

Details

Check Text ( C-42281r1_chk )
Check the root crontab (crontab -l) and the global crontabs in /etc/crontab, /etc/cron.d/*, or scripts in the /etc/cron.daily directory for the presence of an "ntpd -qg" job. If the "ntpd -qg" command is not invoked with the '-a' parameter, this is a finding.

Check the NTP daemon configuration.
# grep ^server /etc/ntp.conf | grep -v '( key | autokey )'
If "server" lines are present without "key" or "autokey" options, this is a finding.
Fix Text (F-38226r1_fix)
If using "ntpd -qg", add the '-a' option with a key to the cron job running "ntpd -qg".

If using the NTP daemon, add the "key" or "autokey" options, as appropriate, to each "server" line in /etc/ntp.conf for each NTP server not configured for authentication.