UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

If the system is using LDAP for authentication or account information, the LDAP TLS connection must require the server provides a certificate and this certificate has a valid trust path to a trusted CA.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22557 GEN008020 SV-26943r1_rule DCNR-1 Medium
Description
The NSS LDAP service provides user mappings which are a vital component of system security. Communication between an LDAP server and a host using LDAP for NSS require authentication.
STIG Date
VMware ESX 3 Server 2016-05-13

Details

Check Text ( C-27891r1_chk )
Check if the system is using NSS LDAP.
# grep -v '^#' /etc/nsswitch.conf | grep ldap
If no lines are returned, this vulnerability is not applicable.

Verify a server certificate is required and verified by the NSS LDAP configuration.
# grep -i '^tls_checkpeer' /etc/ldap.conf
If no line is returned, or the value is not yes, this is a finding.
Fix Text (F-24205r1_fix)
Edit /etc/ldap.conf and add or set the tls_checkpeer setting to yes.