VCRP-67-000003 - The rhttpproxy must be configured to operate solely with FIPS ciphers.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The rhttpproxy ships with FIPS 140-2 validated OpenSSL cryptographic libraries and is configured by default to run in FIPS mode. This module is used for all crypto operations performed by rhttproxy, including protection of data-in-transit over the client TLS connection.

Solution

Navigate to and open /etc/vmware-rhttpproxy/config.xml.

Locate the <config>/<vmacore>/<ssl> block and configure <fips> as follows:

<fips>true</fips>

Restart the service for changes to take effect.

# vmon-cli --restart rhttpproxy

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000068, Rule-ID|SV-240718r679667_rule, STIG-ID|VCRP-67-000003, Vuln-ID|V-240718

Plugin: Unix

Control ID: 8707e5bce940843172edb7800490b677db9d7405a0b3c11547ca75b44ee18a20