Hardening Nagios XI VMware Appliance
Posted: Thu Feb 17, 2011 12:19 pm
Of course your Nagios XI appliance should be behind a firewall, not accessible to the world, but in addition there are some ways to harden it:
(Qualys Lvl 3) In /etc/httpd/conf.d/ssl.conf, edit the following:
SSLProtocol -ALL +SSLv3 +TLSv1
SSLCipherSuite ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
(Qualys Lvl 2) Disable directory browsing/listing. Edit /etc/httpd/conf/httpd.conf and AND /etc/httpd/conf.d/*.conf, remove "Indexes" from all Options declarations.
(Qualys Lvl 2) Edit /etc/httpd/conf/httpd.conf, add the following:
TraceEnable Off
(Qualys Lvl 1) Edit /etc/php.ini, change the following from On to Off:
expose_php=Off
There are some more Qualys hits, that maybe can be addressed in the next version of XI?
(Qualys Lvl 3)
QID 86728 Web Server Uses Plain-Text Form Based Authentication
Please contact the vendor of the hardware/software for a possible fix for the issue. For custom applications, ensure that data sent via HTML login forms is encrypted before being sent from the client to the host.
(Qualys Lvl 2) TCP Sequence Number Approximation Based Denial of Service
QID 82054
This vulnerability will permit a remote attacker to inject a SYN or RST packet into the session, causing it to be reset and effectively allowing for denial of service attacks. An attacker would exploit this issue by sending a packet to a receiving implementation with an approximated sequence number and a forged source IP address and TCP port.
Didn't see a quick fix for CentOS.
(Qualys Lvl 2)
QID 86729 AutoComplete Attribute Not Disabled for Password in Form Based Authentication
Contact the vendor to have the AutoComplete attribute disabled for the password field in all forms. The AutoComplete attribute should also be disabled for the user ID field.
(Qualys Lvl 2)
5 SSL Certificate hits. How do we update the self-signed certificate after changing the host name?
(Qualys Lvl 3) In /etc/httpd/conf.d/ssl.conf, edit the following:
SSLProtocol -ALL +SSLv3 +TLSv1
SSLCipherSuite ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
(Qualys Lvl 2) Disable directory browsing/listing. Edit /etc/httpd/conf/httpd.conf and AND /etc/httpd/conf.d/*.conf, remove "Indexes" from all Options declarations.
(Qualys Lvl 2) Edit /etc/httpd/conf/httpd.conf, add the following:
TraceEnable Off
(Qualys Lvl 1) Edit /etc/php.ini, change the following from On to Off:
expose_php=Off
There are some more Qualys hits, that maybe can be addressed in the next version of XI?
(Qualys Lvl 3)
QID 86728 Web Server Uses Plain-Text Form Based Authentication
Please contact the vendor of the hardware/software for a possible fix for the issue. For custom applications, ensure that data sent via HTML login forms is encrypted before being sent from the client to the host.
(Qualys Lvl 2) TCP Sequence Number Approximation Based Denial of Service
QID 82054
This vulnerability will permit a remote attacker to inject a SYN or RST packet into the session, causing it to be reset and effectively allowing for denial of service attacks. An attacker would exploit this issue by sending a packet to a receiving implementation with an approximated sequence number and a forged source IP address and TCP port.
Didn't see a quick fix for CentOS.
(Qualys Lvl 2)
QID 86729 AutoComplete Attribute Not Disabled for Password in Form Based Authentication
Contact the vendor to have the AutoComplete attribute disabled for the password field in all forms. The AutoComplete attribute should also be disabled for the user ID field.
(Qualys Lvl 2)
5 SSL Certificate hits. How do we update the self-signed certificate after changing the host name?