RHEL-08-010163 - The krb5-server package must not be installed on RHEL 8.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied upon to provide confidentiality or integrity, and DoD data may be compromised.

RHEL 8 systems utilizing encryption are required to use FIPS-compliant mechanisms for authenticating to cryptographic modules.

Currently, Kerberos does not utilize FIPS 140-2 cryptography.

FIPS 140-2 is the current standard for validating that mechanisms used to access cryptographic modules utilize authentication that meets DoD requirements. This allows for Security Levels 1, 2, 3, or 4 for use on a general-purpose computing system.

Solution

Document the krb5-server package with the ISSO as an operational requirement or remove it from the system with the following command:

$ sudo yum remove krb5-server

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_8_V1R13_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000803, Rule-ID|SV-237640r646890_rule, STIG-ID|RHEL-08-010163, Vuln-ID|V-237640

Plugin: Unix

Control ID: aab750daf578b8d09e7527ff49678cf33a38cdf18838970193d37ce018d29e10