1. Home
  2. Security Hardening
  3. DISA STIG VMware vSphere 6.7 RhttpProxy V1R1
  4. VCRP-67-000008 – The rhttproxy must exclusively use the HTTPS protocol for client connections – privateKey

VCRP-67-000008 – The rhttproxy must exclusively use the HTTPS protocol for client connections – privateKey

Details

Remotely accessing vCenter via the rhttpproxy involves sensitive information going over the wire. To protect the confidentiality and integrity of these communications, the rhttpproxy must be configured to use an encrypted session of HTTPS rather than plain-text HTTP. The SSL configuration block inside the rhttproxy configuration must be present and configured correctly to safely enable TLS.

Solution

Navigate to and open /etc/vmware-rhttpproxy/config.xml.

Locate the first block and set its content to the following:


/etc/vmware-rhttpproxy/ssl/rui.key
/etc/vmware-rhttpproxy/ssl/rui.crt

localhost

Restart the service for changes to take effect.

# vmon-cli –restart rhttpproxy

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles