On 6/29/12 5:45 PM, Willy Santos wrote:
CCI-000185 requires, for PKI-based authentication, the validation of 
certificates using a certification path to an accepted trust anchor. For 
SSL/TLS the refenced rule addresses this requirement.

Signed-off-by: Willy Santos <[email protected]>
---
  rhel6/src/input/system/network/ssl.xml |    2 +-
  1 files changed, 1 insertions(+), 1 deletions(-)

diff --git a/rhel6/src/input/system/network/ssl.xml 
b/rhel6/src/input/system/network/ssl.xml
index f66914e..4a54343 100644
--- a/rhel6/src/input/system/network/ssl.xml
+++ b/rhel6/src/input/system/network/ssl.xml
@@ -115,7 +115,7 @@ To avoid this warning, and properly authenticate the 
servers, your CA certificat
  application on every client system that will be connecting to an SSL-enabled 
server.</description>
  <!--<ident cce="TODO" />-->
  <!--TODO:MANUAL<oval id="network_ssl_enable_client_support" />-->
-<ref nist="AC-3, AC-17, CM-6, SC-12, SC-13" />
+<ref nist="AC-3, AC-17, CM-6, SC-12, SC-13" disa="185" />
  </Rule>
<Rule id="network_ssl_add_ca_firefox">

Ack
_______________________________________________
scap-security-guide mailing list
[email protected]
https://fedorahosted.org/mailman/listinfo/scap-security-guide

Reply via email to