RHEL 10 must use FIPS 140-3-approved cryptographic algorithms for IP tunnels.

STIG ID: RHEL-10-300070  |  SRG: SRG-OS-000033-GPOS-00014 |  Severity: high (CAT I)  |  CCI: CCI-000068 |  Vulnerability Id: V-281014

Vulnerability Discussion

Overriding the systemwide cryptographic policy makes the behavior of the Libreswan service violate expectations and makes system configuration more fragmented.

Check

Note: If the IPsec service is not installed, this requirement is not applicable.

Verify RHEL 10 sets the IPsec service to use the systemwide cryptographic policy with the following command:

$ sudo grep include /etc/ipsec.conf /etc/ipsec.d/*.conf
/etc/ipsec.conf:include /etc/crypto-policies/back-ends/libreswan.config

If the ipsec configuration file does not contain "include /etc/crypto-policies/back-ends/libreswan.config", this is a finding.

Fix

Configure RHEL 10 so that Libreswan uses the systemwide cryptographic policy.

Add the following line to "/etc/ipsec.conf":

include /etc/crypto-policies/back-ends/libreswan.config