SV-214252r612240_rule
V-214252
SRG-APP-000224-WSR-000137
AS24-U1-000510
CAT II
10
Configure the web server to generate session identifiers that are at least 128 bits in length.
Ensure that "session_crypto_module" is enabled.
Determine the location of the "httpd.conf" file by running the following command:
httpd -V
Review the "HTTPD_ROOT" path.
Navigate to the "HTTPD_ROOT"/conf directory.
Edit the "httpd.conf" file.
SessionCryptoCipher aes256
Restart Apache: apachectl restart
Review the web server documentation and deployed configuration to determine the length of the generated session identifiers.
First ensure that "session_crypto" is enabled:
httpd -M |grep session_crypto
If the above command returns "session_crypto_module", the module is enabled in the running server.
Determine the location of the "HTTPD_ROOT" directory and the "httpd.conf" file:
# httpd -V | egrep -i 'httpd_root|server_config_file'
-D HTTPD_ROOT="/etc/httpd"
-D SERVER_CONFIG_FILE="conf/httpd.conf"
Review the "httpd.conf" file.
If the "SessionCryptoCipher" is not used or "SessionCryptoCipher" is not set to "aes256", this is a finding.
V-214252
False
AS24-U1-000510
Review the web server documentation and deployed configuration to determine the length of the generated session identifiers.
First ensure that "session_crypto" is enabled:
httpd -M |grep session_crypto
If the above command returns "session_crypto_module", the module is enabled in the running server.
Determine the location of the "HTTPD_ROOT" directory and the "httpd.conf" file:
# httpd -V | egrep -i 'httpd_root|server_config_file'
-D HTTPD_ROOT="/etc/httpd"
-D SERVER_CONFIG_FILE="conf/httpd.conf"
Review the "httpd.conf" file.
If the "SessionCryptoCipher" is not used or "SessionCryptoCipher" is not set to "aes256", this is a finding.
M
3996