SV-227059r603265_rule
V-227059
SRG-OS-000250
GEN007980
CAT II
10
Configure all LDAP authentications and connections to be encrypted using TLS and FIPS 140-2 approved cryptographic algorithms.
Check if the system is using NSS LDAP.
# grep -v '^#' /etc/nsswitch.conf | grep ldap
If no lines are returned, this vulnerability is not applicable.
Verify TLS is used for client authentications to the server
# grep "NS_LDAP_AUTH=" /var/ldap/ldap_client_file
If any of the authentication methods used do not begin with "tls:", this is a finding.
Retrieve the list of LDAP servers.
# grep "NS_LDAP_SERVERS=" /var/ldap/client_file
Use the certutil to verify the cipher(s) used for every server.
# certutil -L -n < host nickname > -d /var/ldap
If any of the TLS connections do not use FIPS 140-2 approved cryptographic algorithms, this is a finding.
V-227059
False
GEN007980
Check if the system is using NSS LDAP.
# grep -v '^#' /etc/nsswitch.conf | grep ldap
If no lines are returned, this vulnerability is not applicable.
Verify TLS is used for client authentications to the server
# grep "NS_LDAP_AUTH=" /var/ldap/ldap_client_file
If any of the authentication methods used do not begin with "tls:", this is a finding.
Retrieve the list of LDAP servers.
# grep "NS_LDAP_SERVERS=" /var/ldap/client_file
Use the certutil to verify the cipher(s) used for every server.
# certutil -L -n < host nickname > -d /var/ldap
If any of the TLS connections do not use FIPS 140-2 approved cryptographic algorithms, this is a finding.
M
4060