SV-235794r627509_rule
V-235794
SRG-APP-000141
DKER-EE-001880
CAT II
10
This fix only applies to the DTR component of Docker Enterprise.
Integrate DTR with a trusted CA.
via UI:
In the DTR web console, navigate to "System" | "General" and click on the "Show TLS Settings" link in the "Domain & Proxies" section. Fill in the "TLS Root CA" field with the contents of the external public CA certificate. Assuming the user generated a server certificate from that CA for DTR, also fill in the "TLS Certificate Chain" and "TLS Private Key" fields with the contents of the public/private certificates respectively. The "TLS Certificate Chain" field must include both the DTR server certificate and any intermediate certificates. Click on the "Save" button.
via CLI:
Linux: Execute the following command as a superuser on one of the UCP Manager nodes in the cluster:
docker run -it --rm docker/dtr:[dtr_version] reconfigure --dtr-ca "$(cat [ca.pem])" --dtr-cert "$(cat [dtr_cert.pem])" --dtr-key "$(cat [dtr_private_key.pem])"
Check that DTR has been integrated with a trusted certificate authority (CA).
via UI:
In the DTR web console, navigate to "System" | "General" and click on the "Show TLS settings" link in the "Domain & Proxies" section. Verify the certificate chain in "TLS Root CA" box is valid and matches that of the trusted CA.
via CLI:
Linux: Execute the following command and verify the certificate chain in the output is valid and matches that of the trusted CA:
echo "" | openssl s_client -connect [dtr_url]:443 | openssl x509 -noout -text
If the certificate chain in the output is not valid and does not match that of the trusted CA, then this is a finding.
V-235794
False
DKER-EE-001880
Check that DTR has been integrated with a trusted certificate authority (CA).
via UI:
In the DTR web console, navigate to "System" | "General" and click on the "Show TLS settings" link in the "Domain & Proxies" section. Verify the certificate chain in "TLS Root CA" box is valid and matches that of the trusted CA.
via CLI:
Linux: Execute the following command and verify the certificate chain in the output is valid and matches that of the trusted CA:
echo "" | openssl s_client -connect [dtr_url]:443 | openssl x509 -noout -text
If the certificate chain in the output is not valid and does not match that of the trusted CA, then this is a finding.
M
5281