Details
The rhttpproxy’s private key is used to prove the identity of the server to clients and securely exchange the shared secret key used to encrypt communications between the web server and clients.
By gaining access to the private key, an attacker can pretend to be an authorized server and decrypt the TLS traffic between a client and the web server.
Solution
At the command prompt, execute the following commands:
# chmod 600 /etc/vmware-rhttpproxy/ssl/rui.key
# chown root:root /etc/vmware-rhttpproxy/ssl/rui.key
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Identification and Authentication.This control applies to the following type of system Unix.
References
- 800-53|IA-5(2)(b)
- CAT|II
- CCI|CCI-000186
- CSCv6|3.1
- Rule-ID|SV-240722r679679_rule
- STIG-ID|VCRP-67-000007
- Vuln-ID|V-240722