VMware vSphere 6.7 VAMI-lighttpd Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +1
Comparison against the immediately-prior release (V1R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 1
- V-257285 High The version of VAMI-lighttpd running on the system must be a supported version.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCLD-67-000001
- Vuln IDs
-
- V-239715
- Rule IDs
-
- SV-239715r879511_rule
Checks: C-42948r816778_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # grep "server.max-connections = 1024" /opt/vmware/etc/lighttpd/lighttpd.conf Expected result: server.max-connections = 1024 If the output does not match the expected result, this is a finding.
Fix: F-42907r679254_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add or reconfigure the following value: server.max-connections = 1024
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- VCLD-67-000002
- Vuln IDs
-
- V-239716
- Rule IDs
-
- SV-239716r879519_rule
Checks: C-42949r816780_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "ssl.cipher-list" Expected result: ssl.cipher-list = "!aNULL:kECDH+AESGCM:ECDH+AESGCM:RSA+AESGCM:kECDH+AES:ECDH+AES:RSA+AES" If the output does not match the expected result, this is a finding.
Fix: F-42908r679257_fix
Navigate to and open /etc/applmgmt/appliance/lighttpd.conf. Add or reconfigure the following value: ssl.cipher-list = "!aNULL:kECDH+AESGCM:ECDH+AESGCM:RSA+AESGCM:kECDH+AES:ECDH+AES:RSA+AES"
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- VCLD-67-000003
- Vuln IDs
-
- V-239717
- Rule IDs
-
- SV-239717r879520_rule
Checks: C-42950r816782_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "ssl.engine" Expected result: ssl.engine = "enable" If the output does not match the expected result, this is a finding.
Fix: F-42909r679260_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add or reconfigure the following value: ssl.engine = "enable"
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VCLD-67-000004
- Vuln IDs
-
- V-239718
- Rule IDs
-
- SV-239718r879521_rule
Checks: C-42951r816784_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|awk '/server\.modules/,/\)/'|grep mod_accesslog Expected result: "mod_accesslog", If the output does not match the expected result, this is a finding.
Fix: F-42910r679263_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add the following value in the "server.modules" section: mod_accesslog The result should be similar to the following: server.modules = ( "mod_access", "mod_accesslog", "mod_proxy", "mod_cgi", "mod_rewrite", "mod_magnet", "mod_setenv", # 7 )
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VCLD-67-000005
- Vuln IDs
-
- V-239719
- Rule IDs
-
- SV-239719r879559_rule
Checks: C-42952r816786_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "server.errorlog" Expected result: server.errorlog = "/opt/vmware/var/log/lighttpd/error.log" If the output does not match the expected result, this is a finding.
Fix: F-42911r679266_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add or reconfigure the following value: server.errorlog = "/opt/vmware/var/log/lighttpd/error.log"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- VCLD-67-000006
- Vuln IDs
-
- V-239720
- Rule IDs
-
- SV-239720r879563_rule
Checks: C-42953r816788_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # grep "^accesslog.format" /opt/vmware/etc/lighttpd/lighttpd.conf The default commented, accesslog format is acceptable for this requirement. No output should be returned. If the command returns any output, this is a finding.
Fix: F-42912r679269_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Comment any existing accesslog.format lines by adding a "#" at the beginning of the line.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- VCLD-67-000011
- Vuln IDs
-
- V-239721
- Rule IDs
-
- SV-239721r879576_rule
Checks: C-42954r816790_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # stat -c "%n has %a permissions and is owned by %U:%G" /opt/vmware/var/log/lighttpd/*.log Expected result: /opt/vmware/var/log/lighttpd/access.log has 640 permissions and is owned by root:root /opt/vmware/var/log/lighttpd/error.log has 640 permissions and is owned by root:root If the output does not match the expected result, this is a finding.
Fix: F-42913r679272_fix
At the command prompt, enter the following command: # chown root:root /opt/vmware/var/log/lighttpd/*.log # chmod 640 /opt/vmware/var/log/lighttpd/*.log
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- VCLD-67-000014
- Vuln IDs
-
- V-239722
- Rule IDs
-
- SV-239722r879582_rule
Checks: C-42955r816792_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # grep -v "^#" /etc/vmware-syslog/stig-services-vami.conf Expected result: input(type="imfile" File="/opt/vmware/var/log/lighttpd/access.log" Tag="vami-access" Severity="info" Facility="local0") If the file does not exist, this is a finding. If the output of the command does not match the expected result above, this is a finding.
Fix: F-42914r679275_fix
Navigate to and open /etc/vmware-syslog/stig-services-vami.conf. Create the file if it does not exist. Set the contents of the file as follows: input(type="imfile" File="/opt/vmware/var/log/lighttpd/access.log" Tag="vami-access" Severity="info" Facility="local0")
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VCLD-67-000015
- Vuln IDs
-
- V-239723
- Rule IDs
-
- SV-239723r879584_rule
Checks: C-42956r816794_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # rpm -qa|grep lighttpd|xargs rpm -V|grep -vE "lighttpd.conf|vami-lighttp.*\.service" If the command returns any output, this is a finding.
Fix: F-42915r679278_fix
If the VAMI binaries have been modified from the default state when deployed as part of the VCSA, the system must be wiped and redeployed or restored from backup. VMware does not recommend or support recovering from such a state by reinstalling RPMs or similar efforts.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-67-000016
- Vuln IDs
-
- V-239724
- Rule IDs
-
- SV-239724r879587_rule
Checks: C-42957r816796_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|awk '/server\.modules/,/\)/' Expected result: server.modules = ( "mod_access", "mod_accesslog", "mod_proxy", "mod_cgi", "mod_rewrite", "mod_magnet", "mod_setenv", # 7 ) If the output does not match the expected result, this is a finding.
Fix: F-42916r679281_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Configure the "server.modules" section to the following: server.modules = ( "mod_access", "mod_accesslog", "mod_proxy", "mod_cgi", "mod_rewrite", ) server.modules += ( "mod_magnet" )
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-67-000017
- Vuln IDs
-
- V-239725
- Rule IDs
-
- SV-239725r879587_rule
Checks: C-42958r816798_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|awk '/mimetype\.assign/,/\)/'|grep -E "\.sh|\.csh" If the command returns any value, this is a finding.
Fix: F-42917r679284_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Remove any lines that reference ".sh" or ".csh" from the "mimetype.assign" section.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-67-000018
- Vuln IDs
-
- V-239726
- Rule IDs
-
- SV-239726r879587_rule
Checks: C-42959r816800_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "mimetype.use-xattr" Expected result: mimetype.use-xattr = "disable" If the output does not match the expected result, this is a finding.
Fix: F-42918r679287_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add or reconfigure the following value: mimetype.use-xattr = "disable"
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-67-000019
- Vuln IDs
-
- V-239727
- Rule IDs
-
- SV-239727r879587_rule
Checks: C-42960r816802_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|awk '/cgi\.assign/,/\)/' Expected result: cgi.assign = ( ".pl" => "/usr/bin/perl", ".cgi" => "/usr/bin/perl", ".rb" => "/usr/bin/ruby", ".erb" => "/usr/bin/eruby", ".py" => "/usr/bin/python", # 5 ) If the output does not match the expected result, this is a finding.
Fix: F-42919r679290_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Configure the "cgi.assign" section to the following: cgi.assign = ( ".pl" => "/usr/bin/perl", ".cgi" => "/usr/bin/perl", ".rb" => "/usr/bin/ruby", ".erb" => "/usr/bin/eruby", ".py" => "/usr/bin/python", # 5 )
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-67-000020
- Vuln IDs
-
- V-239728
- Rule IDs
-
- SV-239728r879587_rule
Checks: C-42961r816804_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "url.access-deny" Expected result: url.access-deny = ("~", ".inc") If the output does not match the expected result, this is a finding.
Fix: F-42920r679293_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add or reconfigure the following value: url.access-deny = ( "~", ".inc" )
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-67-000021
- Vuln IDs
-
- V-239729
- Rule IDs
-
- SV-239729r879587_rule
Checks: C-42962r816806_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|awk '/server\.modules/,/\)/'|grep mod_webdav If any value is returned, this is a finding.
Fix: F-42921r679296_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Delete or comment out the "mod_webdav" line. The line may be in an included config and not in the parent config.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-67-000022
- Vuln IDs
-
- V-239730
- Rule IDs
-
- SV-239730r879587_rule
Checks: C-42963r816808_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "server.max-keep-alive-idle" Expected result: server.max-keep-alive-idle = 30 If the output does not match the expected result, this is a finding.
Fix: F-42922r679299_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf file. Add or reconfigure the following value: server.max-keep-alive-idle = 30
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-67-000023
- Vuln IDs
-
- V-239731
- Rule IDs
-
- SV-239731r879587_rule
Checks: C-42964r816810_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # find /opt/vmware/share/htdocs -type l If any files are listed, this is a finding.
Fix: F-42923r679302_fix
At the command prompt, enter the following command: # unlink <file_name> Note: Replace <file_name> for the name of any files that were returned. Repeat the command for each file that was listed.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- VCLD-67-000025
- Vuln IDs
-
- V-239732
- Rule IDs
-
- SV-239732r879613_rule
Checks: C-42965r816812_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # stat -c "%n has %a permissions and is owned by %U:%G" /etc/applmgmt/appliance/server.pem Expected result: /etc/applmgmt/appliance/server.pem has 600 permissions and is owned by root:root If the output does not match the expected result, this is a finding.
Fix: F-42924r679305_fix
At the command prompt, execute the following commands: # chown root:root /etc/applmgmt/appliance/server.pem # chmod 600 /etc/applmgmt/appliance/server.pem
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- VCLD-67-000026
- Vuln IDs
-
- V-239733
- Rule IDs
-
- SV-239733r879631_rule
Checks: C-42966r816814_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # find /opt/vmware/share/htdocs/ -xdev -type d -a '(' -not -perm 0755 -o -not -user root -o -not -group root ')' -exec ls -ld {} \; If any files are returned, this is a finding.
Fix: F-42925r679308_fix
At the command prompt, execute the following commands: # chmod 0755 <directory> # chown root:root <directory> Note: Substitute <directory> with each directory returned from the check.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- VCLD-67-000027
- Vuln IDs
-
- V-239734
- Rule IDs
-
- SV-239734r879650_rule
Checks: C-42967r816816_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "server.max-fds" Expected result: server.max-fds = 2048 If the output does not match the expected result, this is a finding.
Fix: F-42926r679311_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add or reconfigure the following value: server.max-fds = 2048
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VCLD-67-000028
- Vuln IDs
-
- V-239735
- Rule IDs
-
- SV-239735r879652_rule
Checks: C-42968r816818_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|awk '/mimetype\.assign/,/\)/'|grep "text/"|grep -v "charset=utf-8" If the command returns any value, this is a finding.
Fix: F-42927r679314_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Navigate to the "mimetype.assign" block. Replace all the mappings whose assigned type is "text/*" with mappings for UTF-8 encoding, as follows: ".css" => "text/css; charset=utf-8", ".html" => "text/html; charset=utf-8", ".htm" => "text/html; charset=utf-8", ".js" => "text/javascript; charset=utf-8", ".asc" => "text/plain; charset=utf-8", ".c" => "text/plain; charset=utf-8", ".cpp" => "text/plain; charset=utf-8", ".log" => "text/plain; charset=utf-8", ".conf" => "text/plain; charset=utf-8", ".text" => "text/plain; charset=utf-8", ".txt" => "text/plain; charset=utf-8", ".spec" => "text/plain; charset=utf-8", ".dtd" => "text/xml; charset=utf-8", ".xml" => "text/xml; charset=utf-8",
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCLD-67-000029
- Vuln IDs
-
- V-239736
- Rule IDs
-
- SV-239736r879655_rule
Checks: C-42969r816820_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "dir-listing.activate" Expected result: dir-listing.activate = "disable" If the output does not match the expected result, this is a finding.
Fix: F-42928r679317_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add or reconfigure the following value: dir-listing.activate = "disable"
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCLD-67-000030
- Vuln IDs
-
- V-239737
- Rule IDs
-
- SV-239737r879655_rule
Checks: C-42970r816822_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|awk '/server\.modules/,/\)/'|grep mod_status If any value is returned, this is a finding.
Fix: F-42929r679320_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Remove the line containing "mod_status". The line may be in an included config and not in the parent config itself.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCLD-67-000031
- Vuln IDs
-
- V-239738
- Rule IDs
-
- SV-239738r879655_rule
Checks: C-42971r816824_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "debug.log-request-handling" Expected result: debug.log-request-handling = "disable" If the output does not match the expected result, this is a finding.
Fix: F-42930r679323_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add or reconfigure the following value: debug.log-request-handling = "disable"
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- VCLD-67-000032
- Vuln IDs
-
- V-239739
- Rule IDs
-
- SV-239739r879753_rule
Checks: C-42972r816826_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # stat -c "%n permissions are %a and ownership is %U:%G" /opt/vmware/etc/lighttpd/lighttpd.conf /etc/applmgmt/appliance/lighttpd.conf Expected result: /opt/vmware/etc/lighttpd/lighttpd.conf permissions are 644 and ownership is root:root /etc/applmgmt/appliance/lighttpd.conf permissions are 644 and ownership is root:root If the output does not match the expected result, this is a finding.
Fix: F-42931r679326_fix
At the command prompt, enter the following command: # chmod 644 <file> # chown root:root <file> Note: Replace <file> with every file returned from the command in the check.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- VCLD-67-000033
- Vuln IDs
-
- V-239740
- Rule IDs
-
- SV-239740r879806_rule
Checks: C-42973r816828_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # ps -f -U root | awk '$0 ~ /vami-lighttpd/ && $0 !~ /awk/ {print $1}' Expected result: root If the output does not match the expected result, this is a finding.
Fix: F-42932r679329_fix
Navigate to and open /usr/lib/systemd/system/vami-lighttp.service in a text editor. Under the "[Service]" section, remove the line that beings with "User=". At the command prompt, execute the following command: # service vami-lighttp restart
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- VCLD-67-000034
- Vuln IDs
-
- V-239741
- Rule IDs
-
- SV-239741r879810_rule
Checks: C-42974r816830_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "ssl.use" Expected result: ssl.use-tlsv12 = "enable" ssl.use-sslv2 = "disable" ssl.use-sslv3 = "disable" ssl.use-tlsv10 = "disable" ssl.use-tlsv11 = "disable" If the output does not match the expected result, this is a finding.
Fix: F-42933r679332_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Replace any and all "ssl.use-*" lines with following: ssl.use-tlsv12 = "enable" ssl.use-sslv2 = "disable" ssl.use-sslv3 = "disable" ssl.use-tlsv10 = "disable" ssl.use-tlsv11 = "disable"
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- VCLD-67-000999
- Vuln IDs
-
- V-257285
- Rule IDs
-
- SV-257285r919286_rule
Checks: C-60970r918895_chk
VAMI-lighttpd 6.7 is no longer supported by the vendor. If the system is running VAMI-lighttpd 6.7, this is a finding.
Fix: F-53958r798705_fix
Upgrade to a supported version.