VMware vSphere 7.0 VAMI Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 2
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 2
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCLD-70-000001
- Vuln IDs
-
- V-256645
- Rule IDs
-
- SV-256645r888457_rule
Checks: C-60320r888455_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null |grep "server.max-connections"|sed -e 's/^[ ]*//' Expected result: server.max-connections = 1024 If the output does not match the expected result, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60263r888456_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Add or reconfigure the following value: server.max-connections = 1024 Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- VCLD-70-000002
- Vuln IDs
-
- V-256646
- Rule IDs
-
- SV-256646r888460_rule
Checks: C-60321r888458_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|grep "ssl.cipher-list"|sed -e 's/^[ ]*//' Expected result: ssl.cipher-list = "!aNULL:kECDH+AESGCM:ECDH+AESGCM:RSA+AESGCM:kECDH+AES:ECDH+AES:RSA+AES" If the output does not match the expected result, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60264r888459_fix
Navigate to and open: /etc/applmgmt/appliance/lighttpd.conf Add or reconfigure the following value: ssl.cipher-list = "!aNULL:kECDH+AESGCM:ECDH+AESGCM:RSA+AESGCM:kECDH+AES:ECDH+AES:RSA+AES" Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- VCLD-70-000003
- Vuln IDs
-
- V-256647
- Rule IDs
-
- SV-256647r888463_rule
Checks: C-60322r888461_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|grep "ssl.engine"|sed -e 's/^[ ]*//' Expected result: ssl.engine = "enable" If the output does not match the expected result, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60265r888462_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Add or reconfigure the following value: ssl.engine = "enable" Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VCLD-70-000004
- Vuln IDs
-
- V-256648
- Rule IDs
-
- SV-256648r888466_rule
Checks: C-60323r888464_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|awk '/server\.modules/,/\)/'|grep mod_accesslog|sed -e 's/^[ ]*//' Expected result: "mod_accesslog", If the output does not match the expected result, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60266r888465_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Add the following value in the "server.modules" section: mod_accesslog The result should be similar to the following: server.modules = ( "mod_access", "mod_accesslog", "mod_proxy", "mod_cgi", "mod_rewrite", "mod_magnet", "mod_setenv", ) Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VCLD-70-000005
- Vuln IDs
-
- V-256649
- Rule IDs
-
- SV-256649r888469_rule
Checks: C-60324r888467_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|grep "server.errorlog"|sed -e 's/^[ ]*//' Expected result: server.errorlog = "/opt/vmware/var/log/lighttpd/error.log" If the output does not match the expected result, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60267r888468_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Add or reconfigure the following value: server.errorlog = "/opt/vmware/var/log/lighttpd/error.log" Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- VCLD-70-000006
- Vuln IDs
-
- V-256650
- Rule IDs
-
- SV-256650r888472_rule
Checks: C-60325r888470_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|grep "accesslog.format"|sed -e 's/^[ ]*//' The default commented, "accesslog" format is acceptable for this requirement. No output should be returned. If the command returns any output, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60268r888471_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Comment any existing "accesslog.format" lines by adding a "#" at the beginning of the line. Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- VCLD-70-000007
- Vuln IDs
-
- V-256651
- Rule IDs
-
- SV-256651r918984_rule
Checks: C-60326r918982_chk
At the command prompt, run the following command: # find /opt/vmware/var/log/lighttpd/ -xdev -type f -a '(' -perm -o+w -o -not -user root -o -not -group root ')' -exec ls -ld {} \; If any files are returned, this is a finding.
Fix: F-60269r918983_fix
At the command prompt, run the following commands: # chmod o-w <file> # chown root:root <file> Note: Substitute <file> with the listed file.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- VCLD-70-000008
- Vuln IDs
-
- V-256652
- Rule IDs
-
- SV-256652r888478_rule
Checks: C-60327r888476_chk
At the command prompt, run the following command: # rpm -V VMware-visl-integration|grep vmware-services-applmgmt.conf If the command returns any output, this is a finding.
Fix: F-60270r888477_fix
Navigate to and open: /etc/vmware-syslog/vmware-services-applmgmt.conf Create the file if it does not exist. Set the contents of the file as follows: #applmgmt.log input(type="imfile" File="/var/log/vmware/applmgmt/applmgmt.log" Tag="applmgmt" Severity="info" Facility="local0") #applmgmt-audit.log input(type="imfile" File="/var/log/vmware/applmgmt-audit/applmgmt-audit.log" Tag="applmgmt-audit" Severity="info" Facility="local0") #applmgmt-backup-restore-audit.log input(type="imfile" File="/var/log/vmware/applmgmt-audit/applmgmt-br-audit.log" Tag="applmgmt-br-audit" Severity="info" Facility="local0") #vami-access.log input(type="imfile" File="/opt/vmware/var/log/lighttpd/access.log" Tag="vami-access" Severity="info" Facility="local0") #vami-error.log input(type="imfile" File="/opt/vmware/var/log/lighttpd/error.log" Tag="vami-error" Severity="info" Facility="local0") #dcui.log input(type="imfile" File="/var/log/vmware/applmgmt/dcui.log" Tag="dcui" Severity="info" Facility="local0") #detwist.log input(type="imfile" File="/var/log/vmware/applmgmt/detwist.log" Tag="detwist" Severity="info" Facility="local0") #firewall-reload.log input(type="imfile" File="/var/log/vmware/applmgmt/firewall-reload.log" Tag="firewall-reload" Severity="info" Facility="local0") #applmgmt_vmonsvc.std* input(type="imfile" File="/var/log/vmware/applmgmt/applmgmt_vmonsvc.std*" Tag="applmgmt_vmonsvc" Severity="info" Facility="local0") #backupSchedulerCron input(type="imfile" File="/var/log/vmware/applmgmt/backupSchedulerCron.log" Tag="backupSchedulerCron" Severity="info" Facility="local0") #progress.log input(type="imfile" File="/var/log/vmware/applmgmt/progress.log" Tag="progress" Severity="info" Facility="local0") #statsmonitor-alarms input(type="imfile" File="/var/log/vmware/applmgmt/statsmonitor-alarms.log" Tag="statsmonitor-alarms" Severity="info" Facility="local0") #StatsMonitor input(type="imfile" File="/var/log/vmware/applmgmt/StatsMonitor.log" Tag="StatsMonitor" Severity="info" Facility="local0") #StatsMonitorStartup.log.std* input(type="imfile" File="/var/log/vmware/applmgmt/StatsMonitorStartup.log.std*" Tag="StatsMonitor-Startup" Severity="info" Facility="local0") #PatchRunner input(type="imfile" File="/var/log/vmware/applmgmt/PatchRunner.log" Tag="PatchRunner" Severity="info" Facility="local0") #update_microservice input(type="imfile" File="/var/log/vmware/applmgmt/update_microservice.log" Tag="update_microservice" Severity="info" Facility="local0") #vami input(type="imfile" File="/var/log/vmware/applmgmt/vami.log" Tag="vami" Severity="info" Facility="local0") #vcdb_pre_patch input(type="imfile" File="/var/log/vmware/applmgmt/vcdb_pre_patch.*" Tag="vcdb_pre_patch" Severity="info" Facility="local0") #dnsmasq.log input(type="imfile" File="/var/log/vmware/dnsmasq.log" Tag="dnsmasq" Severity="info" Facility="local0") #procstate input(type="imfile" File="/var/log/vmware/procstate" Tag="procstate" Severity="info" Facility="local0") #backup.log input(type="imfile" File="/var/log/vmware/applmgmt/backup.log" Tag="applmgmt-backup" Severity="info" Facility="local0") #size.log input(type="imfile" File="/var/log/vmware/applmgmt/size.log" Tag="applmgmt-size" Severity="info" Facility="local0") #restore.log input(type="imfile" File="/var/log/vmware/applmgmt/restore.log" Tag="applmgmt-restore" Severity="info" Facility="local0") #reconciliation.log input(type="imfile" File="/var/log/vmware/applmgmt/reconciliation.log" Tag="applmgmt-reconciliation" Severity="info" Facility="local0") #pnid_change.log input(type="imfile" File="/var/log/vmware/applmgmt/pnid_change.log" Tag="applmgmt-pnid-change" Severity="info" Facility="local0") File="/opt/vmware/var/log/lighttpd/error.log" Tag="vami-error" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/dcui.log" Tag="dcui" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/detwist.log" Tag="detwist" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/firewall-reload.log" Tag="firewall-reload" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/applmgmt_vmonsvc.std*" Tag="applmgmt_vmonsvc" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/backupSchedulerCron.log" Tag="backupSchedulerCron" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/progress.log" Tag="progress" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/statsmoitor-alarms.log" Tag="statsmoitor-alarms" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/StatsMonitor.log" Tag="StatsMonitor" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/StatsMonitorStartup.log.std*" Tag="StatsMonitor-Startup" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/PatchRunner.log" Tag="PatchRunner" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/update_microservice.log" Tag="update_microservice" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/vami.log" Tag="vami" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/vcdb_pre_patch.*" Tag="vcdb_pre_patch" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/dnsmasq.log" Tag="dnsmasq" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/procstate" Tag="procstate" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/backup.log" Tag="applmgmt-backup" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/size.log" Tag="applmgmt-size" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/restore.log" Tag="applmgmt-restore" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/reconciliation.log" Tag="applmgmt-reconciliation" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/applmgmt/pnid_change.log" Tag="applmgmt-pnid-change" Severity="info" Facility="local0")
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- VCLD-70-000009
- Vuln IDs
-
- V-256653
- Rule IDs
-
- SV-256653r888481_rule
Checks: C-60328r888479_chk
At the command prompt, run the following command: # rpm -qa|grep lighttpd|xargs rpm -V|grep -v -E "lighttpd.conf|vami-lighttp.service" If the command returns any output, this is a finding.
Fix: F-60271r888480_fix
If the VAMI binaries have been modified from the default state when deployed as part of the vCenter Server Appliance (VCSA), the system must be wiped and redeployed or restored from backup. VMware does not recommend or support recovering from such a state by reinstalling RPMs or similar efforts.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-70-000010
- Vuln IDs
-
- V-256654
- Rule IDs
-
- SV-256654r888484_rule
Checks: C-60329r888482_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|awk '/server\.modules/,/\)/'|sed -e 's/^[ ]*//' Expected result: server.modules=( "mod_access", "mod_accesslog", "mod_proxy", "mod_cgi", "mod_rewrite", "mod_magnet", "mod_setenv", #7 ) If the output does not match the expected result, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60272r888483_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Configure the "server.modules" section to the following: server.modules = ( "mod_access", "mod_accesslog", "mod_proxy", "mod_cgi", "mod_rewrite", ) server.modules += ( "mod_magnet" ) Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-70-000011
- Vuln IDs
-
- V-256655
- Rule IDs
-
- SV-256655r888487_rule
Checks: C-60330r888485_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|awk '/mimetype\.assign/,/\)/'|grep -E "\.sh|\.csh" If the command returns any value, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60273r888486_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Remove any lines that reference ".sh" or ".csh" from the "mimetype.assign" section. Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-70-000012
- Vuln IDs
-
- V-256656
- Rule IDs
-
- SV-256656r888490_rule
Checks: C-60331r888488_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|grep "mimetype.use-xattr"|sed 's: ::g' Expected result: mimetype.use-xattr="disable" If the output does not match the expected result, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60274r888489_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Add or reconfigure the following value: mimetype.use-xattr = "disable" Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-70-000013
- Vuln IDs
-
- V-256657
- Rule IDs
-
- SV-256657r888493_rule
Checks: C-60332r888491_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|awk '/cgi\.assign/,/\)/'|sed -e 's/^[ ]*//' Expected result: cgi.assign = ( ".py" => "/usr/bin/python", ".cgi" => "/usr/bin/python", # 2 ) If the output does not match the expected result, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60275r888492_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Configure the "cgi.assign" section to the following: cgi.assign = ( ".py" => "/usr/bin/python", ".cgi" =>"/usr/bin/python" ) Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-70-000014
- Vuln IDs
-
- V-256658
- Rule IDs
-
- SV-256658r918987_rule
Checks: C-60333r918985_chk
At the command prompt, run the following command: # grep "url.access-deny" /opt/vmware/etc/lighttpd/lighttpd.conf Expected result: url.access-deny = ( "~", ".inc" ) If the output does not match the expected result, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60276r918986_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Add or reconfigure the following value: url.access-deny = ( "~", ".inc" ) Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-70-000015
- Vuln IDs
-
- V-256659
- Rule IDs
-
- SV-256659r888499_rule
Checks: C-60334r888497_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|awk '/server\.modules/,/\)/'|grep mod_webdav If any value is returned, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60277r888498_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Delete or comment out the "mod_webdav" line. Note: The line may be in an included config and not in the parent config itself. Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-70-000016
- Vuln IDs
-
- V-256660
- Rule IDs
-
- SV-256660r888502_rule
Checks: C-60335r888500_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|grep "server.max-keep-alive-idle"|sed 's: ::g' Expected result: server.max-keep-alive-idle=30 If the output does not match the expected result, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60278r888501_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf file. Add or reconfigure the following value: server.max-keep-alive-idle = 30 Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- VCLD-70-000017
- Vuln IDs
-
- V-256661
- Rule IDs
-
- SV-256661r888505_rule
Checks: C-60336r888503_chk
At the command prompt, run the following command: # stat -c "%n has %a permissions and is owned by %U:%G" /etc/applmgmt/appliance/server.pem Expected result: /etc/applmgmt/appliance/server.pem has 600 permissions and is owned by root:root If the output does not match the expected result, this is a finding.
Fix: F-60279r888504_fix
At the command prompt, run the following commands: # chown root:root /etc/applmgmt/appliance/server.pem # chmod 600 /etc/applmgmt/appliance/server.pem
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- VCLD-70-000018
- Vuln IDs
-
- V-256662
- Rule IDs
-
- SV-256662r888508_rule
Checks: C-60337r888506_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|grep "server.max-fds"|sed 's: ::g' Expected result: server.max-fds=2048 If the output does not match the expected result, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60280r888507_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Add or reconfigure the following value: server.max-fds = 2048 Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VCLD-70-000019
- Vuln IDs
-
- V-256663
- Rule IDs
-
- SV-256663r888511_rule
Checks: C-60338r888509_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|awk '/mimetype\.assign/,/\)/'|grep "text/"|grep -v "charset=utf-8"|sed -e 's/^[ ]*//' If the command returns any value, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60281r888510_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Navigate to the "mimetype.assign" block. Replace all the mappings whose assigned type is "text/*" with mappings for UTF-8 encoding. For example: ".log" => "text/plain; charset=utf-8", ".conf" => "text/plain; charset=utf-8", ".text" => "text/plain; charset=utf-8", ".txt" => "text/plain; charset=utf-8", ".spec" => "text/plain; charset=utf-8", ".dtd" => "text/xml; charset=utf-8", ".xml" => "text/xml; charset=utf-8", Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCLD-70-000020
- Vuln IDs
-
- V-256664
- Rule IDs
-
- SV-256664r888514_rule
Checks: C-60339r888512_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|grep "dir-listing.activate"|sed 's: ::g' Expected result: dir-listing.activate="disable" If the output does not match the expected result, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60282r888513_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Add or reconfigure the following value: dir-listing.activate = "disable" Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCLD-70-000021
- Vuln IDs
-
- V-256665
- Rule IDs
-
- SV-256665r888517_rule
Checks: C-60340r888515_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|awk '/server\.modules/,/\)/'|grep mod_status If any value is returned, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60283r888516_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf. Remove the line containing "mod_status". Note: The line may be in an included config and not in the parent config. Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCLD-70-000022
- Vuln IDs
-
- V-256666
- Rule IDs
-
- SV-256666r888520_rule
Checks: C-60341r888518_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|grep "debug.log-request-handling"|sed 's: ::g' Expected result: debug.log-request-handling="disable" If the output does not match the expected result, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60284r888519_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Add or reconfigure the following value: debug.log-request-handling = "disable" Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- VCLD-70-000023
- Vuln IDs
-
- V-256667
- Rule IDs
-
- SV-256667r888523_rule
Checks: C-60342r888521_chk
At the command prompt, run the following command: # ps -f -U root | awk '$0 ~ /vami-lighttpd/ && $0 !~ /awk/ {print $1}' Expected result: root If the output does not match the expected result, this is a finding.
Fix: F-60285r888522_fix
Navigate to and open: /usr/lib/systemd/system/vami-lighttp.service Under the "[Service]" section, remove the line that beings with "User=". Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VCLD-70-000024
- Vuln IDs
-
- V-256668
- Rule IDs
-
- SV-256668r888526_rule
Checks: C-60343r888524_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|grep "ssl.use"|sed 's: ::g' Expected result: ssl.use-sslv2="disable" ssl.use-sslv3="disable" ssl.use-tlsv10="disable" ssl.use-tlsv11="disable" ssl.use-tlsv12="enable" If the output does not match the expected result, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60286r888525_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Replace all "ssl.use-*" lines with the following: ssl.use-sslv2="disable" ssl.use-sslv3="disable" ssl.use-tlsv10="disable" ssl.use-tlsv11="disable" ssl.use-tlsv12="enable" Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- VCLD-70-000025
- Vuln IDs
-
- V-256669
- Rule IDs
-
- SV-256669r888529_rule
Checks: C-60344r888527_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|grep "ssl\.honor-cipher-order"|sed 's: ::g' Expected result: ssl.honor-cipher-order = "enable" If the output does not match the expected result, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60287r888528_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Add or reconfigure the following setting: ssl.honor-cipher-order = "enable" Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- VCLD-70-000026
- Vuln IDs
-
- V-256670
- Rule IDs
-
- SV-256670r888532_rule
Checks: C-60345r888530_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|grep "ssl\.disable-client-renegotiation"|sed 's: ::g' If no line is returned, this is not a finding. If "ssl.disable-client-renegotiation" is set to "disabled", this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60288r888531_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Remove any setting for "ssl.disable-client-renegotiation". Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCLD-70-000027
- Vuln IDs
-
- V-256671
- Rule IDs
-
- SV-256671r888535_rule
Checks: C-60346r888533_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|grep "server.tag"|sed 's: ::g' Expected result: server.tag="vami" If the output does not match the expected result, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60289r888534_fix
Navigate to and open: /etc/applmgmt/appliance/lighttpd.conf Add or reconfigure the following value: server.tag = "vami" Restart the service with the following command: # vmon-cli --restart applmgmt
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- VCLD-70-000056
- Vuln IDs
-
- V-256672
- Rule IDs
-
- SV-256672r888538_rule
Checks: C-60347r888536_chk
At the command prompt, run the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf 2>/dev/null|grep "server.fips-mode"|sed -e 's/^[ ]*//' Expected result: server.fips-mode = "enable" If the output does not match the expected result, this is a finding. Note: The command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". Refer to KB Article 2100508 for more details: https://kb.vmware.com/s/article/2100508
Fix: F-60290r888537_fix
Navigate to and open: /opt/vmware/etc/lighttpd/lighttpd.conf Add or reconfigure the following value: server.fips-mode = "enable" Restart the service with the following command: # vmon-cli --restart applmgmt