SV-230274r627750_rule
V-230274
SRG-OS-000375-GPOS-00160
RHEL-08-010400
CAT II
10
Configure the operating system to implement certificate status checking for multifactor authentication.
Review the "/etc/sssd/sssd.conf" file to determine if the system is configured to prevent OCSP or certificate verification.
Add the following line to the "/etc/sssd/sssd.conf" file:
certificate_verification = ocsp_dgst=sha1
The "sssd" service must be restarted for the changes to take effect. To restart the "sssd" service, run the following command:
$ sudo systemctl restart sssd.service
Verify the operating system implements certificate status checking for multifactor authentication.
Check to see if Online Certificate Status Protocol (OCSP) is enabled and using the proper digest value on the system with the following command:
$ sudo grep certificate_verification /etc/sssd/sssd.conf | grep -v "^#"
certificate_verification = ocsp_dgst=sha1
If the certificate_verification line is missing "ocsp_dgst=sha1", ask the administrator to indicate what type of multifactor authentication is being utilized and how the system implements certificate status checking. If there is no evidence of certificate status checking being used, this is a finding.
V-230274
False
RHEL-08-010400
Verify the operating system implements certificate status checking for multifactor authentication.
Check to see if Online Certificate Status Protocol (OCSP) is enabled and using the proper digest value on the system with the following command:
$ sudo grep certificate_verification /etc/sssd/sssd.conf | grep -v "^#"
certificate_verification = ocsp_dgst=sha1
If the certificate_verification line is missing "ocsp_dgst=sha1", ask the administrator to indicate what type of multifactor authentication is being utilized and how the system implements certificate status checking. If there is no evidence of certificate status checking being used, this is a finding.
M
2921