STIGQter STIGQter: STIG Summary: Oracle Linux 6 Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

If the system is using LDAP for authentication or account information, the system must use a TLS connection using FIPS 140-2 approved cryptographic algorithms.

DISA Rule

SV-208931r603263_rule

Vulnerability Number

V-208931

Group Title

SRG-OS-000250

Rule Version

OL6-00-000252

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure LDAP to enforce TLS use. First, edit the file "/etc/pam_ldap.conf", and add or correct the following lines:

ssl start_tls

Then review the LDAP server and ensure TLS has been configured.

Check Contents

If the system does not use LDAP for authentication or account information, this is not applicable.

To ensure LDAP is configured to use TLS for all transactions, run the following command:

$ grep start_tls /etc/pam_ldap.conf

If no lines are returned, this is a finding.

Vulnerability Number

V-208931

Documentable

False

Rule Version

OL6-00-000252

Severity Override Guidance

If the system does not use LDAP for authentication or account information, this is not applicable.

To ensure LDAP is configured to use TLS for all transactions, run the following command:

$ grep start_tls /etc/pam_ldap.conf

If no lines are returned, this is a finding.

Check Content Reference

M

Target Key

2928

Comments