VMware vSphere 7.0 vCenter Appliance Lookup Service Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 1
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 1
- V-256712 Medium checkfix Lookup Service log files must only be accessible by privileged users.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCLU-70-000001
- Vuln IDs
-
- V-256706
- Rule IDs
-
- SV-256706r888709_rule
Checks: C-60381r888707_chk
At the command prompt, run the following command: # xmllint --xpath '/Server/Service/Connector[@port="${bio-custom.http.port}"]/@connectionTimeout' /usr/lib/vmware-lookupsvc/conf/server.xml Expected result: connectionTimeout="60000" If the output does not match the expected result, this is a finding.
Fix: F-60324r888708_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/server.xml Configure the <Connector> node with the value: connectionTimeout="60000" Example: <Connector .. connectionTimeout="60000" ..> Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCLU-70-000002
- Vuln IDs
-
- V-256707
- Rule IDs
-
- SV-256707r888712_rule
Checks: C-60382r888710_chk
At the command prompt, run the following command: # xmllint --xpath '/Server/Service/Connector[@port="${bio-custom.http.port}"]/@maxThreads' /usr/lib/vmware-lookupsvc/conf/server.xml Expected result: XPath set is empty If the output does not match the expected result, this is a finding.
Fix: F-60325r888711_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/server.xml In the <Connector> node, remove the "maxThreads" key/value pair. Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCLU-70-000003
- Vuln IDs
-
- V-256708
- Rule IDs
-
- SV-256708r888715_rule
Checks: C-60383r888713_chk
At the command prompt, run the following command: # xmllint --xpath '/Server/Service/Connector[@port="${bio-custom.http.port}"]/@maxPostSize' /usr/lib/vmware-lookupsvc/conf/server.xml Expected result: XPath set is empty If the output does not match the expected result, this is a finding.
Fix: F-60326r888714_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/server.xml In the <Connector> node, remove the "maxPostSize" key/value pair. Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCLU-70-000004
- Vuln IDs
-
- V-256709
- Rule IDs
-
- SV-256709r888718_rule
Checks: C-60384r888716_chk
At the command prompt, run the following command: # xmllint --format /usr/lib/vmware-lookupsvc/conf/context.xml | xmllint --xpath '/Context/@useHttpOnly' - Expected result: useHttpOnly="true" If the output does not match the expected result, this is a finding.
Fix: F-60327r888717_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/context.xml Add the following configuration to the <Context> node: useHttpOnly="true" Example: <Context useHttpOnly="true"> Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VCLU-70-000005
- Vuln IDs
-
- V-256710
- Rule IDs
-
- SV-256710r888721_rule
Checks: C-60385r888719_chk
At the command prompt, run the following command: # xmllint --xpath '/Server/Service/Engine/Host/Valve[@className="org.apache.catalina.valves.AccessLogValve"]/@pattern' /usr/lib/vmware-lookupsvc/conf/server.xml Expected result: pattern="%t %I [RemoteIP] %{X-Forwarded-For}i %u [Request] %h:%{remote}p to local %{local}p - %H %m %U%q [Response] %s - %b bytes [Perf] process %Dms / commit %Fms / conn [%X]" If the output does not match the expected result, this is a finding.
Fix: F-60328r888720_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/server.xml Inside the <Host> node, find the "AccessLogValve" <Valve> node and replace the "pattern" element as follows: pattern="%t %I [RemoteIP] %{X-Forwarded-For}i %u [Request] %h:%{remote}p to local %{local}p - %H %m %U%q [Response] %s - %b bytes [Perf] process %Dms / commit %Fms / conn [%X]" Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VCLU-70-000006
- Vuln IDs
-
- V-256711
- Rule IDs
-
- SV-256711r888724_rule
Checks: C-60386r888722_chk
At the command prompt, run the following command: # grep StreamRedirectFile /etc/vmware/vmware-vmon/svcCfgfiles/lookupsvc.json Expected result: "StreamRedirectFile": "%VMWARE_LOG_DIR%/vmware/lookupsvc/lookupsvc_stream.log", If no log file is specified for the "StreamRedirectFile" setting, this is a finding.
Fix: F-60329r888723_fix
Navigate to and open: /etc/vmware/vmware-vmon/svcCfgfiles/lookupsvc.json Below the last line of the "PreStartCommandArg" block, add or reconfigure the following line: "StreamRedirectFile": "%VMWARE_LOG_DIR%/vmware/lookupsvc/lookupsvc_stream.log", Restart the appliance for changes to take effect.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- VCLU-70-000007
- Vuln IDs
-
- V-256712
- Rule IDs
-
- SV-256712r918958_rule
Checks: C-60387r918956_chk
At the command prompt, run the following command: # find /var/log/vmware/lookupsvc -xdev -type f ! -name lookupsvc-init.log -a '(' -perm -o+w -o -not -user lookupsvc -o -not -group lookupsvc ')' -exec ls -ld {} \; If any files are returned, this is a finding. Note: Prior to Update 3h, the user and group should be root.
Fix: F-60330r918957_fix
At the command prompt, run the following commands: # chmod o-w /var/log/vmware/lookupsvc/<file> # chown lookupsvc:lookupsvc /var/log/vmware/lookupsvc/<file> Note: Substitute <file> with the listed file.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VCLU-70-000008
- Vuln IDs
-
- V-256713
- Rule IDs
-
- SV-256713r888730_rule
Checks: C-60388r888728_chk
At the command prompt, run the following command: # rpm -V vmware-lookupsvc|grep "^..5......"|grep -E "\.war|\.jar|\.sh|\.py" If there is any output, this is a finding.
Fix: F-60331r888729_fix
Reinstall the vCenter Server Appliance (VCSA) or roll back to a backup. VMware does not support modifying the Lookup Service installation files manually.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VCLU-70-000009
- Vuln IDs
-
- V-256714
- Rule IDs
-
- SV-256714r888733_rule
Checks: C-60389r888731_chk
At the command prompt, run the following command: # ls -A /usr/lib/vmware-lookupsvc/webapps/*.war Expected result: /usr/lib/vmware-lookupsvc/webapps/ROOT.war If the output does not match the expected result, this is a finding.
Fix: F-60332r888732_fix
For each unexpected directory returned in the check, run the following command: # rm /usr/lib/vmware-lookupsvc/webapps/<NAME> Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLU-70-000010
- Vuln IDs
-
- V-256715
- Rule IDs
-
- SV-256715r888736_rule
Checks: C-60390r888734_chk
At the command prompt, run the following command: # grep UserDatabaseRealm /usr/lib/vmware-lookupsvc/conf/server.xml If the command produces any output, this is a finding.
Fix: F-60333r888735_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/server.xml Remove all <Realm> nodes. Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLU-70-000011
- Vuln IDs
-
- V-256716
- Rule IDs
-
- SV-256716r888739_rule
Checks: C-60391r888737_chk
At the command prompt, run the following command: # grep "package.access" /usr/lib/vmware-lookupsvc/conf/catalina.properties Expected result: package.access=sun.,org.apache.catalina.,org.apache.coyote.,org.apache.tomcat.,org.apache.jasper. If the output of the command does not match the expected result, this is a finding.
Fix: F-60334r888738_fix
Navigate to and open: /usr/lib/vmware-sso/vmware-sts/conf/catalina.properties Ensure the "package.access" line is configured as follows: package.access=sun.,org.apache.catalina.,org.apache.coyote.,org.apache.tomcat.,org.apache.jasper. Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLU-70-000012
- Vuln IDs
-
- V-256717
- Rule IDs
-
- SV-256717r888742_rule
Checks: C-60392r888740_chk
At the command prompt, run the following command: # grep -En '(x-csh<)|(x-sh<)|(x-shar<)|(x-ksh<)' /usr/lib/vmware-lookupsvc/conf/web.xml If the command produces any output, this is a finding.
Fix: F-60335r888741_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/web.xml Remove all of the following nodes lines: <mime-type>application/x-csh</mime-type> <mime-type>application/x-shar</mime-type> <mime-type>application/x-sh</mime-type> <mime-type>application/x-ksh</mime-type> Restart the service with the following command: # vmon-cli --restart lookupsvc Note: Delete the entire mime-mapping node for the target mime-type. Example: <mime-mapping> <extension>sh</extension> <mime-type>application/x-sh</mime-type> </mime-mapping>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLU-70-000013
- Vuln IDs
-
- V-256718
- Rule IDs
-
- SV-256718r888745_rule
Checks: C-60393r888743_chk
At the command prompt, run the following command: # xmllint --format /usr/lib/vmware-lookupsvc/conf/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '/web-app/servlet-mapping/servlet-name[text()="jsp"]/parent::servlet-mapping' - Expected result: <servlet-mapping> <servlet-name>jsp</servlet-name> <url-pattern>*.jsp</url-pattern> <url-pattern>*.jspx</url-pattern> </servlet-mapping> If the .jsp and .jspx file url-patterns are not configured as in the expected result, this is a finding.
Fix: F-60336r888744_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/web.xml Navigate to and locate the mapping for the JSP servlet. It is the <servlet-mapping> node that contains <servlet-name>jsp</servlet-name>. Configure the <servlet-mapping> node to look like the code snippet below: <!-- The mappings for the JSP servlet --> <servlet-mapping> <servlet-name>jsp</servlet-name> <url-pattern>*.jsp</url-pattern> <url-pattern>*.jspx</url-pattern> </servlet-mapping> Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLU-70-000014
- Vuln IDs
-
- V-256719
- Rule IDs
-
- SV-256719r888748_rule
Checks: C-60394r888746_chk
At the command prompt, run the following command: # grep -n 'webdav' /usr/lib/vmware-lookupsvc/conf/web.xml If the command produces any output, this is a finding.
Fix: F-60337r888747_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/web.xml Find the <servlet-name>webdav</servlet-name> node and remove the entire parent <servlet> block. Find the <servlet-name>webdav</servlet-name> node and remove the entire parent <servlet-mapping> block. Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLU-70-000015
- Vuln IDs
-
- V-256720
- Rule IDs
-
- SV-256720r888751_rule
Checks: C-60395r888749_chk
At the command prompt, run the following command: # grep JreMemoryLeakPreventionListener /usr/lib/vmware-lookupsvc/conf/server.xml Expected result: <Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/> If the output of the command does not match the expected result, this is a finding.
Fix: F-60338r888750_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/server.xml Navigate to the <Server> node. Add '<Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/>' to the <Server> node. Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLU-70-000016
- Vuln IDs
-
- V-256721
- Rule IDs
-
- SV-256721r888754_rule
Checks: C-60396r888752_chk
At the command prompt, run the following command: # find /usr/lib/vmware-vsphere-ui/server/static/ -type l -ls If the command produces any output, this is a finding.
Fix: F-60339r888753_fix
At the command prompt, run the following command: Note: Replace <file_name> for the name of any files that were returned. # unlink <file_name> Repeat the commands for each file that was returned.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- VCLU-70-000017
- Vuln IDs
-
- V-256722
- Rule IDs
-
- SV-256722r888757_rule
Checks: C-60397r888755_chk
At the command prompt, run the following command: # find /usr/lib/vmware-lookupsvc/lib /usr/lib/vmware-lookupsvc/conf -xdev -type f -a '(' -perm -o+w -o -not -user root -o -not -group root ')' -exec ls -ld {} \; If the command produces any output, this is a finding.
Fix: F-60340r888756_fix
At the command prompt, run the following commands: # chmod o-w <file> # chown root:root <file> Repeat the command for each file that was returned.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- VCLU-70-000018
- Vuln IDs
-
- V-256723
- Rule IDs
-
- SV-256723r888760_rule
Checks: C-60398r888758_chk
At the command line, run the following command: # grep EXIT_ON_INIT_FAILURE /usr/lib/vmware-lookupsvc/conf/catalina.properties Expected result: org.apache.catalina.startup.EXIT_ON_INIT_FAILURE=true If the output of the command does not match the expected result, this is a finding.
Fix: F-60341r888759_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/catalina.properties Add or change the following line: org.apache.catalina.startup.EXIT_ON_INIT_FAILURE=true Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- VCLU-70-000019
- Vuln IDs
-
- V-256724
- Rule IDs
-
- SV-256724r888763_rule
Checks: C-60399r888761_chk
At the command prompt, run the following command: # xmllint --xpath '/Server/Service/Connector[@port="${bio-custom.http.port}"]/@acceptCount' /usr/lib/vmware-lookupsvc/conf/server.xml Expected result: acceptCount="100" If the output does not match the expected result, this is a finding.
Fix: F-60342r888762_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/server.xml Navigate to the <Connector> configured with port="${bio-custom.http.port}". Add or change the following value: acceptCount="100" Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VCLU-70-000020
- Vuln IDs
-
- V-256725
- Rule IDs
-
- SV-256725r888766_rule
Checks: C-60400r888764_chk
At the command prompt, run the following command: # xmllint --xpath '/Server/Service/Connector[@port="${bio-custom.http.port}"]/@URIEncoding' /usr/lib/vmware-lookupsvc/conf/server.xml Expected result: URIEncoding="UTF-8" If the output does not match the expected result, this is a finding.
Fix: F-60343r888765_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/server.xml Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value 'URIEncoding="UTF-8"'. Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCLU-70-000021
- Vuln IDs
-
- V-256726
- Rule IDs
-
- SV-256726r888769_rule
Checks: C-60401r888767_chk
At the command prompt, run the following command: # xmllint --format /usr/lib/vmware-lookupsvc/conf/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '/web-app/welcome-file-list' - Expected result: <welcome-file-list> <welcome-file>index.html</welcome-file> <welcome-file>index.htm</welcome-file> <welcome-file>index.jsp</welcome-file> </welcome-file-list> If the output of the command does not match the expected result, this is a finding.
Fix: F-60344r888768_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/web.xml Add the following section under the <web-apps> node: <welcome-file-list> <welcome-file>index.html</welcome-file> <welcome-file>index.htm</welcome-file> <welcome-file>index.jsp</welcome-file> </welcome-file-list> Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCLU-70-000022
- Vuln IDs
-
- V-256727
- Rule IDs
-
- SV-256727r888772_rule
Checks: C-60402r888770_chk
At the command prompt, run the following command: # xmllint --format /usr/lib/vmware-lookupsvc/conf/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '//param-name[text()="listings"]/..' - Expected result: <init-param> <param-name>listings</param-name> <param-value>false</param-value> </init-param> If the output of the command does not match the expected result, this is a finding.
Fix: F-60345r888771_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/web.xml Set the <param-value> to "false" in all <param-name>listing</param-name> nodes. The setting should look like the following: <init-param> <param-name>listings</param-name> <param-value>false</param-value> </init-param> Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCLU-70-000023
- Vuln IDs
-
- V-256728
- Rule IDs
-
- SV-256728r888775_rule
Checks: C-60403r888773_chk
At the command prompt, run the following command: # xmllint --xpath '/Server/Service/Connector[@port="${bio-custom.http.port}"]/@server' /usr/lib/vmware-lookupsvc/conf/server.xml Expected result: server="Anonymous" If the output does not match the expected result, this is a finding.
Fix: F-60346r888774_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/server.xml Navigate to each of the <Connector> nodes. Configure each <Connector> node with 'server="Anonymous"'. Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCLU-70-000024
- Vuln IDs
-
- V-256729
- Rule IDs
-
- SV-256729r888778_rule
Checks: C-60404r888776_chk
At the command prompt, run the following command: # xmllint --xpath '/Server/Service/Engine/Host/Valve[@className="org.apache.catalina.valves.ErrorReportValve"]' /usr/lib/vmware-lookupsvc/conf/server.xml Expected result: <Valve className="org.apache.catalina.valves.ErrorReportValve" showServerInfo="false" showReport="false"/> If the output of the command does not match the expected result, this is a finding.
Fix: F-60347r888777_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/server.xml Locate the following Host block: <Host ...> ... </Host> Inside this block, add the following on a new line: <Valve className="org.apache.catalina.valves.ErrorReportValve" showServerInfo="false" showReport="false"/> Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCLU-70-000025
- Vuln IDs
-
- V-256730
- Rule IDs
-
- SV-256730r888781_rule
Checks: C-60405r888779_chk
At the command prompt, run the following command: # grep allowTrace /usr/lib/vmware-lookupsvc/conf/server.xml If "allowTrace" is set to "true", this is a finding. If no line is returned, this is not a finding.
Fix: F-60348r888780_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/server.xml Locate and navigate to 'allowTrace="true"'. Remove the 'allowTrace="true"' setting. Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCLU-70-000026
- Vuln IDs
-
- V-256731
- Rule IDs
-
- SV-256731r888784_rule
Checks: C-60406r888782_chk
At the command prompt, run the following command: # xmllint --format /usr/lib/vmware-lookupsvc/conf/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '//param-name[text()="debug"]/..' - Expected result: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param> If the output of the command does not match the expected result, this is a finding.
Fix: F-60349r888783_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/web.xml Navigate to all <debug> nodes that are not set to "0". Set the <param-value> to "0" in all <param-name>debug</param-name> nodes. Note: The debug setting should look like the following: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param> Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- VCLU-70-000027
- Vuln IDs
-
- V-256732
- Rule IDs
-
- SV-256732r888787_rule
Checks: C-60407r888785_chk
At the command prompt, run the following command: # rpm -V vmware-lookupsvc|grep logging.properties|grep "^..5......" If the above command returns any output, this is a finding.
Fix: F-60350r888786_fix
Reinstall the vCenter Server Appliance (VCSA) or roll back to a backup. VMware does not support modifying the Lookup Service installation files manually.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- VCLU-70-000028
- Vuln IDs
-
- V-256733
- Rule IDs
-
- SV-256733r888790_rule
Checks: C-60408r888788_chk
At the command prompt, run the following command: # rpm -V VMware-visl-integration|grep vmware-services-lookupsvc.conf If the above command returns any output, this is a finding.
Fix: F-60351r888789_fix
Navigate to and open: /etc/vmware-syslog/vmware-services-lookupsvc.conf Create the file if it does not exist. Set the contents of the file as follows: #localhost_access_log input(type="imfile" File="/var/log/vmware/lookupsvc/tomcat/localhost_access.log" Tag="lookupsvc-localhost_access" Severity="info" Facility="local0") #lookupsvc_stream.log.std input(type="imfile" File="/var/log/vmware/lookupsvc/lookupsvc_stream.log.std*" Tag="lookupsvc-std" Severity="info" Facility="local0") #lookupserver-default input(type="imfile" File="/var/log/vmware/lookupsvc/lookupserver-default.log" Tag="lookupsvc-lookupserver-default" Severity="info" Facility="local0") #lookupServer input(type="imfile" File="/var/log/vmware/lookupsvc/lookupServer.log" Tag="lookupsvc-lookupServer" Severity="info" Facility="local0") #ls-perflogs input(type="imfile" File="/var/log/vmware/lookupsvc/vmware-lookupservice-perf.log" Tag="lookupsvc-perf" Severity="info" Facility="local0") #ls-gc input(type="imfile" File="/var/log/vmware/lookupsvc/vmware-lookupsvc-gc.log.*.current" Tag="lookupsvc-gc" Severity="info" Facility="local0")
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- VCLU-70-000029
- Vuln IDs
-
- V-256734
- Rule IDs
-
- SV-256734r888793_rule
Checks: C-60409r888791_chk
At the command prompt, run the following command: # grep '\.port' /usr/lib/vmware-lookupsvc/conf/catalina.properties Expected result: base.shutdown.port=-1 base.jmx.port=-1 bio-custom.http.port=7090 bio-custom.https.port=8443 If the output of the command does not match the expected result, this is a finding.
Fix: F-60352r888792_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/catalina.properties Navigate to the port's specification section. Set the Lookup Service port specifications according to the shipping configuration below: base.shutdown.port=-1 base.jmx.port=-1 bio-custom.http.port=7090 bio-custom.https.port=8443 Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- VCLU-70-000030
- Vuln IDs
-
- V-256735
- Rule IDs
-
- SV-256735r888796_rule
Checks: C-60410r888794_chk
At the command prompt, run the following commands: # xmllint --xpath '/Server/@port' /usr/lib/vmware-lookupsvc/conf/server.xml Expected result: port="${base.shutdown.port}" If the output does not match the expected result, this is a finding.
Fix: F-60353r888795_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/server.xml Ensure the server port is set as follows: <Server port="${base.shutdown.port}"> Restart the service with the following command: # vmon-cli --restart lookupsvc
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VCLU-70-000031
- Vuln IDs
-
- V-256736
- Rule IDs
-
- SV-256736r888799_rule
Checks: C-60411r888797_chk
At the command prompt, run the following command: # xmllint --format /usr/lib/vmware-lookupsvc/conf/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '/web-app/session-config/cookie-config/secure' - Expected result: <secure>true</secure> If the output of the command does not match the expected result, this is a finding.
Fix: F-60354r888798_fix
Navigate to and open: /usr/lib/vmware-lookupsvc/conf/web.xml Navigate to the /<web-apps>/<session-config>/<cookie-config> node and configure it as follows: <cookie-config> <http-only>true</http-only> <secure>true</secure> </cookie-config> Restart the service with the following command: # vmon-cli --restart lookupsvc