STIGQter STIGQter: STIG Summary: VMW vRealize Automation 7.x HA Proxy Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

HAProxy must set the no-sslv3 value on all client ports.

DISA Rule

SV-99861r1_rule

Vulnerability Number

V-89211

Group Title

SRG-APP-000439-WSR-000156

Rule Version

VRAU-HA-000460

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Navigate to and open /etc/haproxy/conf.d/30-vro-config.cfg

Navigate to and configure the "frontend https-in-vro-config" section with the following value:

bind :8283 ssl crt /opt/vmware/etc/lighttpd/server.pem ciphers FIPS:+3DES:!aNULL no-sslv3

Navigate to and open /etc/haproxy/conf.d/20-vcac.cfg

Navigate to and configure the "frontend https-in" section with the following value:

bind 0.0.0.0:443 ssl crt /etc/apache2/server.pem ciphers FIPS:+3DES:!aNULL no-sslv3

Check Contents

At the command prompt, execute the following command:

grep -EnR '\bbind\b.*\bssl\b' /etc/haproxy

Verify that each returned line contains the no-sslv3 value.

If any lines do not have this value, this is a finding.

Vulnerability Number

V-89211

Documentable

False

Rule Version

VRAU-HA-000460

Severity Override Guidance

At the command prompt, execute the following command:

grep -EnR '\bbind\b.*\bssl\b' /etc/haproxy

Verify that each returned line contains the no-sslv3 value.

If any lines do not have this value, this is a finding.

Check Content Reference

M

Target Key

3455

Comments