1. Home
  2. Security Hardening
  3. DISA STIG Apache Server 2.4 Unix Site V2R2 Middleware
  4. AS24-U2-000380 – The Apache web server must perform RFC 5280-compliant certification path validation – SSLVerifyDepth

AS24-U2-000380 – The Apache web server must perform RFC 5280-compliant certification path validation – SSLVerifyDepth

Details

A certificate’s certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path validation is necessary for a relying party to make an informed decision regarding acceptance of an end entity certificate. Certification path validation includes checks such as certificate issuer trust, time validity, and revocation status for each certificate in the certification path. Revocation status information for CA and subject certificates in a certification path is commonly provided via certificate revocation lists (CRLs) or online certificate status protocol (OCSP) responses.

Solution

Determine the location of the ‘HTTPD_ROOT’ directory and the ‘ssl.conf’ file:

# httpd -V | egrep -i ‘httpd_root|server_config_file’
-D HTTPD_ROOT=’/etc/httpd’

Edit <'HTTPD_ROOT'>/conf.d/ssl.conf

Set ‘SSLVerifyClient’ to ‘require’.

Set ‘SSLVerifyDepth’ to ‘1’.

SSLVerifyDepth 1

For more information: https://httpd.apache.org/docs/current/mod/ssl_module.html

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Identification and Authentication.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles