GEN008180 - If the system is using LDAP for authentication or account information, the TLS certificate authority file and/or directory (as appropriate) must have mode 0644 (0755 for directories) or less permissive - '/etc/ssl/ca.cert'

Information

LDAP can be used to provide user authentication and account information, which are vital to system security. The LDAP client configuration must be protected from unauthorized modification.

Solution

Change the mode of the file or directory.

File Procedure:
# chmod 0644 <certpath>

Directory Procedure:
# chmod 0755 <certpath>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-6, 800-53|CM-6b., CAT|II, CCI|CCI-000225, CCI|CCI-000366, Rule-ID|SV-218702r603259_rule, STIG-ID|GEN008180, STIG-Legacy|SV-63289, STIG-Legacy|V-22565, Vuln-ID|V-218702

Plugin: Unix

Control ID: 589a41f14cf941414a6040ed771d4849aac53ec62e3280b906ef2dfc3e2e700f