VMware vSphere 6.7 RhttpProxy Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 1
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 1
- V-240719 Medium check The rhttpproxy must use cryptography to protect the integrity of remote sessions.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCRP-67-000001
- Vuln IDs
-
- V-240716
- Rule IDs
-
- SV-240716r679661_rule
Checks: C-43949r679659_chk
At the command prompt, execute the following command: # xmllint --xpath '/config/vmacore/tcpKeepAlive/clientSocket/idleTimeSec' /etc/vmware-rhttpproxy/config.xml Expected result: <idleTimeSec>900</idleTimeSec> If the output does not match the expected result, this is a finding.
Fix: F-43908r679660_fix
Navigate to and open /etc/vmware-rhttpproxy/config.xml. Locate the <config>/<vmacore>/<tcpKeepAlive>/<clientSocket> block and configure <idleTimeSec> as follows: <idleTimeSec>900</idleTimeSec> Restart the service for changes to take effect. # vmon-cli --restart rhttpproxy
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCRP-67-000002
- Vuln IDs
-
- V-240717
- Rule IDs
-
- SV-240717r679664_rule
Checks: C-43950r679662_chk
At the command prompt, execute the following command: # xmllint --xpath '/config/vmacore/http/maxConnections' /etc/vmware-rhttpproxy/config.xml Expected result: <maxConnections> 2048 </maxConnections> If the output does not match the expected result, this is a finding.
Fix: F-43909r679663_fix
Navigate to and open /etc/vmware-rhttpproxy/config.xml. Locate the <config>/<vmacore>/<http> block and configure <maxConnections> as follows: <maxConnections> 2048 </maxConnections> Restart the service for changes to take effect. # vmon-cli --restart rhttpproxy
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- VCRP-67-000003
- Vuln IDs
-
- V-240718
- Rule IDs
-
- SV-240718r679667_rule
Checks: C-43951r679665_chk
At the command prompt, execute the following command: # xmllint --xpath '/config/vmacore/ssl/fips' /etc/vmware-rhttpproxy/config.xml Expected result: <fips>true</fips> If the output does not match the expected result, this is a finding.
Fix: F-43910r679666_fix
Navigate to and open /etc/vmware-rhttpproxy/config.xml. Locate the <config>/<vmacore>/<ssl> block and configure <fips> as follows: <fips>true</fips> Restart the service for changes to take effect. # vmon-cli --restart rhttpproxy
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- VCRP-67-000004
- Vuln IDs
-
- V-240719
- Rule IDs
-
- SV-240719r816678_rule
Checks: C-43952r816677_chk
At the command prompt, execute the following command: # xmllint --xpath '/config/vmacore/ssl/protocols' /etc/vmware-rhttpproxy/config.xml Expected result: <protocols>tls1.2</protocols> OR XPath set is empty If the output does not match the expected result, this is a finding.
Fix: F-43911r679669_fix
Navigate to and open /etc/vmware-rhttpproxy/config.xml. Locate the <config>/<vmacore>/<ssl> block and configure <protocols> as follows: <protocols>tls1.2</protocols> Restart the service for changes to take effect. # vmon-cli --restart rhttpproxy
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VCRP-67-000005
- Vuln IDs
-
- V-240720
- Rule IDs
-
- SV-240720r679673_rule
Checks: C-43953r679671_chk
At the command prompt, execute the following command: # xmllint --xpath '/config/log/level' /etc/vmware-rhttpproxy/config.xml Expected result: <level>verbose</level> If the output does not match the expected result, this is a finding.
Fix: F-43912r679672_fix
Navigate to and open /etc/vmware-rhttpproxy/config.xml. Locate the <config>/<log> block and configure <level> as follows: <level>verbose</level> Restart the service for changes to take effect. # vmon-cli --restart rhttpproxy
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- VCRP-67-000006
- Vuln IDs
-
- V-240721
- Rule IDs
-
- SV-240721r679676_rule
Checks: C-43954r679674_chk
At the command prompt, execute the following command: # xmllint --xpath '/config/log/outputToFiles' /etc/vmware-rhttpproxy/config.xml Expected result: <outputToFiles>true</outputToFiles> If the output does not match the expected result, this is a finding.
Fix: F-43913r679675_fix
Navigate to and open /etc/vmware-rhttpproxy/config.xml. Locate the <config>/<log> block and configure <outputToFiles> as follows: <outputToFiles>true</outputToFiles> Restart the service for changes to take effect. # vmon-cli --restart rhttpproxy
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- VCRP-67-000007
- Vuln IDs
-
- V-240722
- Rule IDs
-
- SV-240722r679679_rule
Checks: C-43955r679677_chk
At the command prompt, execute the following command: # stat -c "%n permissions are %a, is owned by %U and group owned by %G" /etc/vmware-rhttpproxy/ssl/rui.key Expected result: /etc/vmware-rhttpproxy/ssl/rui.key permissions are 600, is owned by root and group owned by root If the output does not match the expected result, this is a finding.
Fix: F-43914r679678_fix
At the command prompt, execute the following commands: # chmod 600 /etc/vmware-rhttpproxy/ssl/rui.key # chown root:root /etc/vmware-rhttpproxy/ssl/rui.key
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- VCRP-67-000008
- Vuln IDs
-
- V-240723
- Rule IDs
-
- SV-240723r679682_rule
Checks: C-43956r679680_chk
At the command prompt, execute the following command: # xmllint --xpath '/config/ssl' /etc/vmware-rhttpproxy/config.xml Expected result: <ssl> <!-- The server private key file --> <privateKey>/etc/vmware-rhttpproxy/ssl/rui.key</privateKey> <!-- The server side certificate file --> <certificate>/etc/vmware-rhttpproxy/ssl/rui.crt</certificate> <!-- vecs server name. Currently vecs runs on all node types. --> <vecsServerName>localhost</vecsServerName> </ssl> If the output does not match the expected result, this is a finding.
Fix: F-43915r679681_fix
Navigate to and open /etc/vmware-rhttpproxy/config.xml. Locate the first <ssl> block and set its content to the following: <ssl> <!-- The server private key file --> <privateKey>/etc/vmware-rhttpproxy/ssl/rui.key</privateKey> <!-- The server side certificate file --> <certificate>/etc/vmware-rhttpproxy/ssl/rui.crt</certificate> <!-- vecs server name. Currently vecs runs on all node types. --> <vecsServerName>localhost</vecsServerName> </ssl> Restart the service for changes to take effect. # vmon-cli --restart rhttpproxy
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- VCRP-67-000009
- Vuln IDs
-
- V-240724
- Rule IDs
-
- SV-240724r679685_rule
Checks: C-43957r679683_chk
At the command prompt, execute the following command: # grep -v "^#" /etc/vmware-syslog/stig-services-rhttpproxy.conf Expected result: input(type="imfile" File="/var/log/vmware/rhttpproxy/rhttpproxy.log" Tag="rhttpproxy-main" Severity="info" Facility="local0") If the file does not exist, this is a finding. If the output of the command does not match the expected result, this is a finding.
Fix: F-43916r679684_fix
Navigate to and open /etc/vmware-syslog/stig-services-rhttpproxy.conf. Create the file if it does not exist. Set the contents of the file as follows: input(type="imfile" File="/var/log/vmware/rhttpproxy/rhttpproxy.log" Tag="rhttpproxy-main" Severity="info" Facility="local0")