Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
At the command prompt, run the following commands: # find /var/log/vmware/rhttpproxy/ -xdev -type f -a '(' -perm -o+w -o -not -user rhttpproxy -o -not -group rhttpproxy ')' -exec ls -ld {} \; # find /var/log/vmware/envoy/ -xdev -type f -a '(' -perm -o+w -o -not -user envoy -o -not -group envoy ')' -exec ls -ld {} \; If any files are returned, this is a finding.
At the command prompt, run the following commands for rhttpproxy log files: # chmod o-w <file> # chown rhttpproxy:rhttpproxy <file> or At the command prompt, run the following commands for envoy log files: # chmod o-w <file> # chown envoy:envoy <file>
At the command prompt, run the following command: # stat -c "%n permissions are %a, is owned by %U and group owned by %G" /etc/vmware-rhttpproxy/ssl/rui.key Expected result: /etc/vmware-rhttpproxy/ssl/rui.key permissions are 600, is owned by rhttpproxy and group owned by rhttpproxy If the output does not match the expected result, this is a finding.
At the command prompt, run the following commands: # chmod 600 /etc/vmware-rhttpproxy/ssl/rui.key # chown rhttpproxy:rhttpproxy /etc/vmware-rhttpproxy/ssl/rui.key
By default, there is a vmware-services-rhttpproxy.conf rsyslog configuration file that includes the service logs when syslog is configured on vCenter, but it must be verified. At the command prompt, run the following command: # cat /etc/vmware-syslog/vmware-services-rhttpproxy.conf Expected result: #rhttpproxy log input(type="imfile" File="/var/log/vmware/rhttpproxy/rhttpproxy.log" Tag="rhttpproxy-main" Severity="info" Facility="local0") #rhttpproxy init stdout input(type="imfile" File="/var/log/vmware/rhttpproxy/rproxy_init.log.stdout" Tag="rhttpproxy-stdout" Severity="info" Facility="local0") #rhttpproxy init stderr input(type="imfile" File="/var/log/vmware/rhttpproxy/rproxy_init.log.stderr" Tag="rhttpproxy-stderr" Severity="info" Facility="local0") If the output does not match the expected result, this is a finding.
Navigate to and open: /etc/vmware-syslog/vmware-services-rhttpproxy.conf Create the file if it does not exist. Set the contents of the file as follows: #rhttpproxy log input(type="imfile" File="/var/log/vmware/rhttpproxy/rhttpproxy.log" Tag="rhttpproxy-main" Severity="info" Facility="local0") #rhttpproxy init stdout input(type="imfile" File="/var/log/vmware/rhttpproxy/rproxy_init.log.stdout" Tag="rhttpproxy-stdout" Severity="info" Facility="local0") #rhttpproxy init stderr input(type="imfile" File="/var/log/vmware/rhttpproxy/rproxy_init.log.stderr" Tag="rhttpproxy-stderr" Severity="info" Facility="local0")
By default, there is a vmware-services-envoy.conf rsyslog configuration file that includes the service logs when syslog is configured on vCenter, but it must be verified. At the command prompt, run the following command: # cat /etc/vmware-syslog/vmware-services-envoy.conf Expected result: #envoy service log input(type="imfile" File="/var/log/vmware/envoy/envoy.log" Tag="envoy-main" Severity="info" Facility="local0") #envoy access log input(type="imfile" File="/var/log/vmware/envoy/envoy-access.log" Tag="envoy-access" Severity="info" Facility="local0") #envoy init stdout input(type="imfile" File="/var/log/vmware/envoy/envoy_init.log.stdout" Tag="envoy-stdout" Severity="info" Facility="local0") #envoy init stderr input(type="imfile" File="/var/log/vmware/envoy/envoy_init.log.stderr" Tag="envoy-stderr" Severity="info" Facility="local0") If the output does not match the expected result, this is a finding.
Navigate to and open: /etc/vmware-syslog/vmware-services-envoy.conf Create the file if it does not exist. Set the contents of the file as follows: #envoy service log input(type="imfile" File="/var/log/vmware/envoy/envoy.log" Tag="envoy-main" Severity="info" Facility="local0") #envoy access log input(type="imfile" File="/var/log/vmware/envoy/envoy-access.log" Tag="envoy-access" Severity="info" Facility="local0") #envoy init stdout input(type="imfile" File="/var/log/vmware/envoy/envoy_init.log.stdout" Tag="envoy-stdout" Severity="info" Facility="local0") #envoy init stderr input(type="imfile" File="/var/log/vmware/envoy/envoy_init.log.stderr" Tag="envoy-stderr" Severity="info" Facility="local0")
At the command prompt, run the following commands: # xmllint --xpath '/config/envoy/L4Filter/maxRemoteHttpsConnections/text()' /etc/vmware-rhttpproxy/config.xml # xmllint --xpath '/config/envoy/L4Filter/maxRemoteHttpConnections/text()' /etc/vmware-rhttpproxy/config.xml Example result: 2048 or XPath set is empty If the output is not "2048" or "XPath set it empty", this is a finding. Note: If "XPath set is empty" is returned the default values are in effect and is 2048.
Navigate to and open: /etc/vmware-rhttpproxy/config.xml Locate the <config>/<envoy>/<L4Filter> block and configure it as follows: <maxRemoteHttpsConnections>2048</maxRemoteHttpsConnections> <maxRemoteHttpConnections>2048</maxRemoteHttpConnections> Restart the service for changes to take effect. # vmon-cli --restart rhttpproxy