DISA STIGS Viewer

RHEL 9 must use mechanisms meeting the requirements of applicable federal laws, executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.

Overview

Finding ID Version Rule ID IA Controls Severity
V-258237 RHEL-09-672025 SV-258237r1051256_rule   Medium
Description
Overriding the system crypto policy makes the behavior of Kerberos violate expectations and makes system configuration more fragmented.
STIG Date
Red Hat Enterprise Linux 9 Security Technical Implementation Guide 2024-12-04

Details

Check Text (C-61978r1051254_chk)
Verify that the symlink exists and targets the correct Kerberos cryptographic policy with the following command:

$ file /etc/crypto-policies/back-ends/krb5.config

If command output shows the following line, Kerberos is configured to use the systemwide crypto policy:

/etc/crypto-policies/back-ends/krb5.config: symbolic link to /usr/share/crypto-policies/FIPS/krb5.txt

If the symlink does not exist or points to a different target, this is a finding.
Fix Text (F-61902r1051255_fix)
Configure Kerberos to use system cryptographic policy.

Create a symlink pointing to system crypto policy in the Kerberos configuration using the following command:

$ sudo ln -s /etc/crypto-policies/back-ends/krb5.config /usr/share/crypto-policies/FIPS/krb5.txt