OL6-00-000253 - The LDAP client must use a TLS connection using trust certificates signed by the site CA.

Information

The tls_cacertdir or tls_cacertfile directives are required when tls_checkpeer is configured (which is the default for openldap versions 2.1 and up). These directives define the path to the trust certificates signed by the site CA.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Ensure a copy of the site's CA certificate has been placed in the file '/etc/pki/tls/CA/cacert.pem'. Configure LDAP to enforce TLS use and to trust certificates signed by the site's CA. First, edit the file '/etc/pam_ldap.conf', and add or correct either of the following lines:

tls_cacertdir /etc/pki/tls/CA

or

tls_cacertfile /etc/pki/tls/CA/cacert.pem

Then review the LDAP server and ensure TLS has been configured.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_6_V2R7_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-17(2), CAT|II, CCI|CCI-001453, Rule-ID|SV-219564r793821_rule, STIG-ID|OL6-00-000253, STIG-Legacy|SV-65025, STIG-Legacy|V-50819, Vuln-ID|V-219564

Plugin: Unix

Control ID: 2dfc2b3f543b4585b9b7f0dfee13536e29b09be9bb96c8719d9c5e2752c10715