VCRP-67-000004 - The rhttpproxy must use cryptography to protect the integrity of remote sessions.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The rhttpproxy can be configured to support TLS 1.0, 1.1 and 1.2. Due to intrinsic problems in TLS 1.0 and TLS 1.1, they are disabled by default. The <protocol> block in the rhttproxy configuration is commented out by default, and this configuration forces TLS 1.2. The block may also be set to 'tls1.2' in certain upgrade scenarios, but the effect is the same.

Solution

Navigate to and open /etc/vmware-rhttpproxy/config.xml.

Locate the <config>/<vmacore>/<ssl> block and configure <protocols> as follows:

<protocols>tls1.2</protocols>

Restart the service for changes to take effect.

# vmon-cli --restart rhttpproxy

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001453, Rule-ID|SV-240719r816678_rule, STIG-ID|VCRP-67-000004, Vuln-ID|V-240719

Plugin: Unix

Control ID: 656117460c4bf9d1ede1bbf08c8e16ff040c57e8e26bdd7f9993fb64b763536b