Check: VCRP-67-000007
VMware vSphere 6.7 RhttpProxy STIG:
VCRP-67-000007
(in versions v1 r3 through v1 r1)
Title
The rhttpproxy private key file must be protected from unauthorized access. (Cat II impact)
Discussion
The rhttpproxy's private key is used to prove the identity of the server to clients and securely exchange the shared secret key used to encrypt communications between the web server and clients. By gaining access to the private key, an attacker can pretend to be an authorized server and decrypt the TLS traffic between a client and the web server.
Check Content
At the command prompt, execute the following command: # stat -c "%n permissions are %a, is owned by %U and group owned by %G" /etc/vmware-rhttpproxy/ssl/rui.key Expected result: /etc/vmware-rhttpproxy/ssl/rui.key permissions are 600, is owned by root and group owned by root If the output does not match the expected result, this is a finding.
Fix Text
At the command prompt, execute the following commands: # chmod 600 /etc/vmware-rhttpproxy/ssl/rui.key # chown root:root /etc/vmware-rhttpproxy/ssl/rui.key
Additional Identifiers
Rule ID: SV-240722r879613_rule
Vulnerability ID: V-240722
Group Title: SRG-APP-000176-WSR-000096
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000186 |
The information system, for PKI-based authentication, enforces authorized access to the corresponding private key. |
Controls
Number | Title |
---|---|
IA-5 (2) |
Pki-Based Authentication |