Check: RHEL-08-010280
RHEL 8 STIG:
RHEL-08-010280
(in version v2 r6)
Title
RHEL 8 IP tunnels must use FIPS 140-3-approved cryptographic algorithms. (Cat II impact)
Discussion
Overriding the system crypto policy makes the behavior of the Libreswan service violate expectations and makes system configuration more fragmented.
Check Content
Note: If the ipsec service is not installed, this requirement is Not Applicable. Verify the IPsec service uses the system crypto policy with the following command: $ sudo grep include /etc/ipsec.conf /etc/ipsec.d/*.conf /etc/ipsec.conf:include /etc/crypto-policies/back-ends/libreswan.config /etc/ipsec.conf:include /etc/ipsec.d/*.conf If the ipsec configuration file does not contain "include /etc/crypto-policies/back-ends/libreswan.config", this is a finding.
Fix Text
Configure Libreswan to use the system cryptographic policy. Add the following line to "/etc/ipsec.conf": include /etc/crypto-policies/back-ends/libreswan.config
Additional Identifiers
Rule ID: SV-279930r1156343_rule
Vulnerability ID: V-279930
Group Title: SRG-OS-000033-GPOS-00014
Expert Comments
CCIs
| Number | Definition |
|---|---|
| CCI-000068 |
Implement cryptographic mechanisms to protect the confidentiality of remote access sessions. |
Controls
| Number | Title |
|---|---|
| AC-17(2) |
Protection of Confidentiality and Integrity Using Encryption |