Details
The rhttpproxy ships with FIPS 140-2 validated OpenSSL cryptographic libraries and is configured by default to run in FIPS mode. This module is used for all crypto operations performed by rhttproxy, including protection of data-in-transit over the client TLS connection.
Solution
Navigate to and open /etc/vmware-rhttpproxy/config.xml.
Locate the
Restart the service for changes to take effect.
# vmon-cli --restart rhttpproxy
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Unix.
References
- 800-53|AC-17(2)
- CAT|II
- CCI|CCI-000068
- Rule-ID|SV-240718r679667_rule
- STIG-ID|VCRP-67-000003
- Vuln-ID|V-240718
Comments
Please sign in to leave a comment.