UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Lighttpd must use SSL/TLS protocols in order to secure passwords during transmission from the client.


Overview

Finding ID Version Rule ID IA Controls Severity
V-240248 VRAU-LI-000225 SV-240248r879609_rule Medium
Description
Data used to authenticate, especially passwords, needs to be protected at all times, and encryption is the standard method for protecting authentication data during transmission. Data used to authenticate the vAMI admin must be sent to Lighttpd via SSL/TLS. To ensure that Lighttpd is using SSL/TLS, the ssl.engine must be enabled.
STIG Date
VMware vRealize Automation 7.x Lighttpd Security Technical Implementation Guide 2023-09-12

Details

Check Text ( C-43481r667919_chk )
At the command prompt, execute the following command:

grep '^ssl.engine' /opt/vmware/etc/lighttpd/lighttpd.conf

If the value of "ssl.engine" is not set to "enable", this is a finding.
Fix Text (F-43440r667920_fix)
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf file

Configure the lighttpd.conf file with the following:

ssl.engine = "enable"