VCRP-70-000003 - Envoy must be configured to operate in FIPS mode.

Information

Envoy ships with FIPS 140-2 validated OpenSSL cryptographic libraries and is configured by default to run in FIPS mode. This module is used for all cryptographic operations performed by Envoy, including protection of data-in-transit over the client Transport Layer Security (TLS) connection.

Satisfies: SRG-APP-000014-WSR-000006, SRG-APP-000179-WSR-000111, SRG-APP-000416-WSR-000118, SRG-APP-000439-WSR-000188, SRG-APP-000179-WSR-000110

Solution

Navigate to and open:

/etc/vmware-rhttpproxy/config.xml

Locate the <config>/<vmacore>/<ssl> block and configure <fips> as follows:

<fips>true</fips>

Restart the service for changes to take effect.

# vmon-cli --restart rhttpproxy

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_7-0_Y23M07_STIG.zip

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-17(2), 800-53|IA-7, 800-53|SC-8, 800-53|SC-13, CAT|II, CCI|CCI-000068, CCI|CCI-000803, CCI|CCI-002418, CCI|CCI-002450, Rule-ID|SV-256739r889155_rule, STIG-ID|VCRP-70-000003, Vuln-ID|V-256739

Plugin: Unix

Control ID: 67767b0a411dd7a81f31d4dfac5327c2a66c72b20f8fd3dab03300980c555a23