Java Runtime Environment (JRE) version 8 STIG for Unix
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- JRE8-UX-000010
- Vuln IDs
-
- V-66721
- Rule IDs
-
- SV-81211r1_rule
Checks: C-67371r1_chk
Verify a JRE deployment configuration file exists as indicated: /etc/.java/deployment/deployment.config If the configuration file does not exist as indicated, this is a finding.
Fix: F-72821r1_fix
Create a JRE deployment configuration file as indicated: /etc/.java/deployment/deployment.config
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- JRE8-UX-000020
- Vuln IDs
-
- V-66909
- Rule IDs
-
- SV-81399r2_rule
Checks: C-67545r2_chk
Navigate to the “deployment.config” file for JRE: /etc/.java/deployment/deployment.config The deployment.config file contains two properties: deployment.system.config and deployment.system.config.mandatory. The "deployment.system.config" key points to the location of the deployment.properties file. The location is variable. It can point to a file on the local disk, or a UNC path. The following is an example: “deployment.system.config=/etc/.java/deployment/deployment.properties" If the “deployment.system.config” key does not exist or does not point to the location of the deployment.properties file, this is a finding. If the “deployment.system.config.mandatory” key does not exist or is set to false, this is a finding.
Fix: F-73009r2_fix
Navigate to the “deployment.config” file for JRE: /etc/.java/deployment/deployment.config Add the key “deployment.system.config=<Path to deployment.properties>” to the deployment.config file. The following is an example: “deployment.system.config=/etc/.java/deployment/deployment.properties". Note the use of forward slashes. Add the key “deployment.system.config.mandatory=true” to the deployment.config file.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- JRE8-UX-000030
- Vuln IDs
-
- V-66911
- Rule IDs
-
- SV-81401r1_rule
Checks: C-67547r1_chk
Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties If there is no file entitled “deployment.properties”, this is a finding.
Fix: F-73011r1_fix
Create the Java deployment properties file “/etc/.java/deployment/deployment.properties”
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- JRE8-UX-000060
- Vuln IDs
-
- V-66913
- Rule IDs
-
- SV-81403r1_rule
Checks: C-67549r1_chk
Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties If the key “deployment.security.level=VERY_HIGH” is not present in the deployment.properties file, or is set to “HIGH”, this is a finding. If the key “deployment.security.level.locked” is not present in the deployment.properties file, this is a finding.
Fix: F-73013r1_fix
Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties Add the key “deployment.security.level=VERY_HIGH” to the deployment.properties file. Add the key “deployment.security.level.locked” to the deployment.properties file.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- JRE8-UX-000070
- Vuln IDs
-
- V-66915
- Rule IDs
-
- SV-81405r1_rule
Checks: C-67551r1_chk
Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties If the key “deployment.webjava.enabled=true” is not present in the deployment.properties file, or is set to “false”, this is a finding. If the key “deployment.webjava.enabled.locked” is not present in the deployment.properties file, this is a finding.
Fix: F-73015r1_fix
Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties Add the key “deployment.webjava.enabled=true” to the deployment.properties file. Add the key “deployment.webjava.enabled.locked” to the deployment.properties file.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- JRE8-UX-000080
- Vuln IDs
-
- V-66917
- Rule IDs
-
- SV-81407r1_rule
Checks: C-67553r1_chk
If the system is on the SIPRNet, this requirement is NA. Navigate to the system-level “deployment.properties” file for Java. /etc/.java/deployment/deployment.properties If the key, “deployment.security.askgrantdialog.notinca=false” is not present, this is a finding. If the key, “deployment.security.askgrantdialog.notinca.locked” is not present, this is a finding. If the key “deployment.security.askgrantdialog.notinca” exists and is set to true, this is a finding.
Fix: F-73017r1_fix
If the system is on the SIPRNet, this requirement is NA. Disable the “Allow user to grant permissions to content from an untrusted authority” feature. Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties Add the key “deployment.security.askgrantdialog.notinca=false” to the deployment.properties file. Add the key “deployment.security.askgrantdialog.notinca.locked” to the deployment.properties file.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- JRE8-UX-000090
- Vuln IDs
-
- V-66919
- Rule IDs
-
- SV-81409r1_rule
Checks: C-67555r1_chk
If the system is on the SIPRNet, this requirement is NA. Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties If the key, “deployment.security.askgrantdialog.show=false” is not present, this is a finding. If the key, “deployment.security.askgrantdialog.show.locked” is not present, this is a finding. If the key “deployment.security.askgrantdialog.show” exists and is set to true, this is a finding.
Fix: F-73019r1_fix
If the system is on the SIPRNet, this requirement is NA. Lock the “Allow user to grant permissions to content from an untrusted authority” feature. Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties Add the key “deployment.security.askgrantdialog.show=false” to the deployment.properties file. Add the key “deployment.security.askgrantdialog.show.locked” to the deployment.properties file.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- JRE8-UX-000100
- Vuln IDs
-
- V-66921
- Rule IDs
-
- SV-81411r1_rule
Checks: C-67557r1_chk
If the system is on the SIPRNet, this requirement is NA. Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties If the key “deployment.security.validation.ocsp=true” is not present in the deployment.properties file, this is a finding. If the key “deployment.security.validation.ocsp.locked” is not present in the deployment.properties file, this is a finding. If the key “deployment.security.validation.ocsp” is set to “false”, this is a finding.
Fix: F-73021r2_fix
If the system is on the SIPRNet, this requirement is NA. Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties Add the key “deployment.security.validation.ocsp=true” to the deployment.properties file. Add the key “deployment.security.validation.ocsp.locked” to the deployment.properties file.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- JRE8-UX-000110
- Vuln IDs
-
- V-66923
- Rule IDs
-
- SV-81413r1_rule
Checks: C-67559r1_chk
Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties If the key “deployment.security.blacklist.check=true” is not present in the deployment.properties file, or is set to “false”, this is a finding. If the key “deployment.security.blacklist.check.locked” is not present in the deployment.properties file, this is a finding.
Fix: F-73023r2_fix
Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties Add the key “deployment.security.blacklist.check=true” to the deployment.properties file. Add the key “deployment.security.blacklist.check.locked” to the deployment.properties file.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001774
- Version
- JRE8-UX-000120
- Vuln IDs
-
- V-66925
- Rule IDs
-
- SV-81415r2_rule
Checks: C-67561r2_chk
Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties If the key “deployment.user.security.exception.sites” is not present in the deployment.properties file, this is a finding. If the key “deployment.user.security.exception.sites” is not set to the location of the exception.sites file, this is a finding. An example of a correct setting is: deployment.user.security.exception.sites=/etc/.java/deployment/exception.sites
Fix: F-73025r2_fix
Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties Add the key “deployment.user.security.exception.sites=/etc/.java/deployment/exception.sites” to the deployment.properties file.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001774
- Version
- JRE8-UX-000130
- Vuln IDs
-
- V-66927
- Rule IDs
-
- SV-81417r1_rule
Checks: C-67563r1_chk
If the system is on the SIPRNet, this requirement is NA. Navigate to the “exception.sites” file for Java: /etc/.java/deployment/exception.sites If the exception.sites file does not exist, it must be created. The exception.sites file is a text file containing single-line URLs for accepted risk sites. If there are no AO approved sites to be added to the configuration, it is acceptable for this file to be blank. If the “exception.sites” file does not exist, this is a finding. If the “exception.sites” file contains URLs that are not AO approved, this is a finding.
Fix: F-73027r2_fix
If the system is on the SIPRNet, this requirement is NA. Create the JRE exception.sites file: No default file exists. A text file named exception.sites, and the directory structure in which it is located must be manually created. The location must be aligned as defined in the deployment.properties file. /etc/.java/deployment/deployment.properties is an example.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001991
- Version
- JRE8-UX-000150
- Vuln IDs
-
- V-66929
- Rule IDs
-
- SV-81419r1_rule
Checks: C-67565r1_chk
If the system is on the SIPRNet, this requirement is NA. Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties If the key “deployment.security.validation.crl=true” is not present in the deployment.properties file, or is set to “false”, this is a finding. If the key “deployment.security.validation.crl.locked” is not present in the deployment.properties file, this is a finding.
Fix: F-73029r2_fix
If the system is on the SIPRNet, this requirement is NA. Enable the “Check certificates for revocation using Certificate Revocation Lists (CRL)” option. Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties Add the key “deployment.security.validation.crl=true” to the deployment.properties file. Add the key “deployment.security.validation.crl.locked” to the deployment.properties file.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001991
- Version
- JRE8-UX-000160
- Vuln IDs
-
- V-66931
- Rule IDs
-
- SV-81421r1_rule
Checks: C-67567r1_chk
If the system is on the SIPRNet, this requirement is NA. Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties If the key “deployment.security.revocation.check=ALL_CERTIFICATES” is not present, or is set to “PUBLISHER_ONLY”, or “NO_CHECK”, this is a finding. If the key “deployment.security.revocation.check.locked” is not present, this is a finding.
Fix: F-73031r2_fix
If the system is on the SIPRNet, this requirement is NA. Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties Add the key “deployment.security.revocation.check=ALL_CERTIFICATES” to the deployment.properties file. Add the key “deployment.security.revocation.check.locked” to the deployment.properties file.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- JRE8-UX-000170
- Vuln IDs
-
- V-66933
- Rule IDs
-
- SV-81423r1_rule
Checks: C-67569r1_chk
Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties If the key “deployment.insecure.jres=PROMPT” is not present in the deployment.properties file, this is a finding. If the key “deployment.insecure.jres.locked” is not present in the deployment.properties file, this is a finding. If the key “deployment.insecure.jres” is set to “NEVER”, this is a finding.
Fix: F-73033r2_fix
Navigate to the system-level “deployment.properties” file for JRE. /etc/.java/deployment/deployment.properties Add the key “deployment.insecure.jres=PROMPT” to the deployment.properties file. Add the key “deployment.insecure.jres.locked” to the deployment.properties file.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002617
- Version
- JRE8-UX-000190
- Vuln IDs
-
- V-66935
- Rule IDs
-
- SV-81425r1_rule
Checks: C-67571r1_chk
Review the system configuration to ensure old versions of JRE have been removed. There are two ways to uninstall Java. Use the method that you used when you installed Java. For example, if you used RPM to install Java, then use the RPM uninstall method. If RPM is installed, first query to ascertain that JRE was installed using RPM. Search for the JRE package by typing: # rpm -qa | grep -i jre If RPM reports a package similar to jre-<version>-fcs, then JRE is installed with RPM. If JRE is not installed using RPM, skip to "Self-extracting file uninstall". To uninstall Java via RPM, type: # rpm -e jre-<version>-fcs Self-extracting file uninstall: 1. Browse folders to ascertain where JRE is installed. Common locations are /usr/java/jre_<version> or opt/jre_nb/jre_<version>/bin/java/ 2. When you have located the directory, you may delete the directory by using the following command: Note: Ensure JRE is not already installed using RPM before removing the directory. # rm -r /<path to jre>/jre<version> Ensure only one instance of JRE is installed on the system. # ps -ef | grep -I jre If more than one instance of JRE is running, this is a finding.
Fix: F-73035r1_fix
Remove previous versions of JRE. RPM uninstall: # rpm -e jre-<version>-fcs Self-extracting file uninstall: # rm -r jre<version> Perform for all out of date instances of JRE.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- JRE8-UX-000180
- Vuln IDs
-
- V-66937
- Rule IDs
-
- SV-81427r1_rule
Checks: C-67573r1_chk
Open a terminal window and type the command: "java -version" sans quotes. The return value should contain Java build information: "Java (TM) SE Runtime Environment (build x.x.x.x)" Cross reference the build information on the system with the Oracle Java site to identify the most recent build available. If the version of Oracle JRE 8 running on the system is out of date, this is a finding.
Fix: F-73037r1_fix
Test applications to ensure operational compatibility with new version of Java. Install latest version of Oracle JRE 8.