GEN008340 - If the system is using LDAP for authentication or account information, the LDAP TLS key file must have mode 0600 or less permissive - '/etc/openldap/cacerts/key.pem'

Information

LDAP can be used to provide user authentication and account information, which are vital to system security. The LDAP client configuration must be protected from unauthorized modification.

Note: Depending on the particular implementation, group and other read permission may be necessary for unprivileged users to successfully resolve account information using LDAP. This will still be a finding, as these permissions provide users with access to system authenticators.

Solution

Change the mode of the file.
# chmod 0600 <keypath>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-6, 800-53|CM-6b., CAT|II, CCI|CCI-000225, CCI|CCI-000366, Rule-ID|SV-218710r603259_rule, STIG-ID|GEN008340, STIG-Legacy|SV-63233, STIG-Legacy|V-22573, Vuln-ID|V-218710

Plugin: Unix

Control ID: 4134a1d50b6d387441850819ad77e8fc54642c391e3574dedab9fea63ec0e4e8