VCFL-67-000018 - vSphere Client must ensure appropriate permissions are set on the keystore.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The web server's private key is used to prove the identity of the server to clients and securely exchange the shared secret key used to encrypt communications between the web server and clients. By gaining access to the private key, an attacker can pretend to be an authorized server and decrypt the SSL traffic between a client and the web server.

vSphere Client pulls the machine certificate from the VECS keystore and stores it in keystore.jks so Tomcat can access it. The minimum permissions and ownership on the keystore are set by default but must be verified.

Solution

At the command prompt, execute the following command:

# chmod 640 /etc/vmware/vsphere-client/keystore.jks
# chown vsphere-client:users /etc/vmware/vsphere-client/keystore.jks

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000186, Rule-ID|SV-239759r679504_rule, STIG-ID|VCFL-67-000018, Vuln-ID|V-239759

Plugin: Unix

Control ID: 1e085e891cca86a1ca6c43bf45793ddee8bf6048238941c00497a74874ee77d8