Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-32274 | WINPK-000003 | SV-42607r2_rule | IATS-1 IATS-2 | Medium |
Description |
---|
To ensure that users do not experience denial of service when performing certificate-based authentication to DoD websites due to the system chaining to a root other than DoD Root CA 2, the DoD Interoperability Root CA to DoD Root CA 2 cross certificate must be installed in the Untrusted Certificate Store. |
STIG | Date |
---|---|
Windows Server 2008 R2 Domain Controller Security Technical Implementation Guide | 2012-09-05 |
Check Text ( C-40782r2_chk ) |
---|
Verify the DoD Root CA 2 certificate issued by DoD Interoperability Root CA1 is installed as an Untrusted Certificate using the Certificates MMC snap-in. Run “MMC” Select “File”, “Add/Remove Snap-in…” Select “Certificates”, click “Add” Select “Computer account”, click “Next” Select “Local computer: (the computer this console is running on)”, click “Finish” Click “OK” Expand “Certificates” and navigate to “Untrusted Certificates\Certificates” Search in the center pane for “DoD Root CA 2” under “Issued To” with “DoD Interoperability Root CA 1 as “Issued By” If there is no entry for “DoD Root CA 2” this is a finding. Select “DoD Root CA 2” Right click and select “Open” Select the “Details” Tab Scroll to the bottom and select “Thumbprint Algorithm” Verify the Value is “sha1”, If the value for “Thumbprint Algorithm” is not “sha1” this is a finding. Next select “Thumbprint” If the value for the “Thumbprint” field is not “b1:10:5c:d1:0f:c3:70:f5:6b:89:dd:1d:49:f6:d8:30:df:35:f2:de” this is a finding. |
Fix Text (F-36197r2_fix) |
---|
Install the DoD Interoperability Root CA to DoD Root CA 2 cross certificate. The FBCA Cross-Certificate Remover tool is available on IASE at http://iase.disa.mil/pki-pke/function_pages/tools.html |