VCRP-67-000003 - The rhttpproxy must be configured to operate solely with FIPS ciphers.

Information

The rhttpproxy ships with FIPS 140-2 validated OpenSSL cryptographic libraries and is configured by default to run in FIPS mode. This module is used for all crypto operations performed by rhttproxy, including protection of data-in-transit over the client TLS connection.

Solution

Navigate to and open /etc/vmware-rhttpproxy/config.xml.

Locate the <config>/<vmacore>/<ssl> block and configure <fips> as follows:

<fips>true</fips>

Restart the service for changes to take effect.

# vmon-cli --restart rhttpproxy

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y23M07_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-17(2), CAT|II, CCI|CCI-000068, Rule-ID|SV-240718r879519_rule, STIG-ID|VCRP-67-000003, Vuln-ID|V-240718

Plugin: Unix

Control ID: 3bc3b3e26a118ed8fb8e1bc744b3f096254661babb4ce3534f49f135ea31ae94