STIGQter STIGQter: STIG Summary: Red Hat Enterprise Linux 8 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 23 Apr 2021:

RHEL 8 must prevent system daemons from using Kerberos for authentication.

DISA Rule

SV-230238r646862_rule

Vulnerability Number

V-230238

Group Title

SRG-OS-000120-GPOS-00061

Rule Version

RHEL-08-010161

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure RHEL 8 to prevent system daemons from using Kerberos for authentication.

Remove any files with the .keytab extension from the operating system.

Check Contents

Verify that RHEL 8 prevents system daemons from using Kerberos for authentication.

If the system is a server utilizing krb5-server-1.17-18.el8.x86_64 or newer, this requirement is not applicable.
If the system is a workstation utilizing krb5-workstation-1.17-18.el8.x86_64 or newer, this requirement is not applicable.

Check if there are available keytabs with the following command:

$ sudo ls -al /etc/*.keytab

If this command produces any file(s), this is a finding.

Vulnerability Number

V-230238

Documentable

False

Rule Version

RHEL-08-010161

Severity Override Guidance

Verify that RHEL 8 prevents system daemons from using Kerberos for authentication.

If the system is a server utilizing krb5-server-1.17-18.el8.x86_64 or newer, this requirement is not applicable.
If the system is a workstation utilizing krb5-workstation-1.17-18.el8.x86_64 or newer, this requirement is not applicable.

Check if there are available keytabs with the following command:

$ sudo ls -al /etc/*.keytab

If this command produces any file(s), this is a finding.

Check Content Reference

M

Target Key

2921

Comments