OL6-00-000253 - The LDAP client must use a TLS connection using trust certificates signed by the site CA.

Information

The tls_cacertdir or tls_cacertfile directives are required when tls_checkpeer is configured (which is the default for openldap versions 2.1 and up). These directives define the path to the trust certificates signed by the site CA.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Ensure a copy of the site's CA certificate has been placed in the file '/etc/pki/tls/CA/cacert.pem'. Configure LDAP to enforce TLS use and to trust certificates signed by the site's CA. First, edit the file '/etc/pam_ldap.conf', and add or correct either of the following lines:

tls_cacertdir /etc/pki/tls/CA

or

tls_cacertfile /etc/pki/tls/CA/cacert.pem

Then review the LDAP server and ensure TLS has been configured.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_6_V1R17_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000776, Group-ID|V-50819, Rule-ID|SV-65025r1_rule, STIG-ID|OL6-00-000253, Vuln-ID|V-50819

Plugin: Unix

Control ID: da53a2f0568d3ec966eeed56a5f36f19bf05824c88c7e6718b00b2fad467d96f