VCRP-67-000004 - The rhttpproxy must use cryptography to protect the integrity of remote sessions.


The rhttpproxy can be configured to support TLS 1.0, 1.1 and 1.2. Due to intrinsic problems in TLS 1.0 and TLS 1.1, they are disabled by default. The block in the rhttproxy configuration is commented out by default, and this configuration forces TLS 1.2. The block may also be set to 'tls1.2' in certain upgrade scenarios, but the effect is the same.


Navigate to and open /etc/vmware-rhttpproxy/config.xml.

Locate the // block and configure as follows:


Restart the service for changes to take effect.

# vmon-cli --restart rhttpproxy

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Unix.