UCF STIG Viewer Logo

The ESXi host must use DoD-approved certificates.


Overview

Finding ID Version Rule ID IA Controls Severity
V-239328 ESXI-67-000078 SV-239328r674913_rule Medium
Description
The default self-signed, VMware Certificate Authority-issued host certificate must be replaced with a DoD-approved certificate when the host will be accessed directly, such as during a VM console connection. The use of a DoD certificate on the host assures clients that the service they are connecting to is legitimate and properly secured.
STIG Date
VMware vSphere 6.7 ESXi Security Technical Implementation Guide 2022-01-05

Details

Check Text ( C-42561r674911_chk )
From the vSphere Web Client, select the host and click Configure >> System >> Certificate.

If the issuer is not a DoD-approved certificate authority, this is a finding.

If the host will never be accessed directly (VM console connections bypass vCenter), this is not a finding.
Fix Text (F-42520r674912_fix)
Obtain a DoD-issued certificate and private key for the host following the requirements below:

Key size: 2048 bits or more (PEM encoded)

Key format: PEM; VMware supports PKCS8 and PKCS1 (RSA keys)
x509 version 3

SubjectAltName must contain DNS Name=

CRT (Base-64) format

Contains the following Key Usages: Digital Signature, Non Repudiation, Key Encipherment

Start time of one day before the current time.

CN (and SubjectAltName) set to the host name (or IP address) that the ESXi host has in the vCenter Server inventory.

Put the host into maintenance mode.

Temporarily enable SSH on the host. SCP the new certificate and key to /tmp. SSH to the host. Back up the existing certificate and key:

mv /etc/vmware/ssl/rui.crt /etc/vmware/ssl/rui.crt.bak
mv /etc/vmware/ssl/rui.key /etc/vmware/ssl/rui.key.bak

Copy the new certificate and key to /etc/vmware/ssl/ and rename them to rui.crt and rui.key respectively. Restart management agents to implement the new certificate:

services.sh restart

From the vSphere Web Client, select the vCenter Server and click Configure >> System >> Advanced Settings.

Find the "vpxd.certmgmt value" and set it to "custom".