9.1 Ensure Replication Traffic is Secured

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The replication traffic between servers should be secured. Security measures should include ensuring the confidentiality and integrity of the traffic and performing mutual authentication between the servers before performing replication.

Rationale:

The replication traffic should be secured as it gives access to all transferred information and might leak passwords.

Impact:

When the replication traffic is not secured someone might be able to capture passwords and other sensitive information when sent to the replica.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Secure the network traffic using one or more technologies to provide confidentiality and integrity for the traffic and mutual authentication for the servers.
If using SSL/TLS, run the following commands on the REPLICA server(s):

STOP REPLICA; -- required if replication was already running
CHANGE MASTER TO MASTER_SSL=1;
START REPLICA; -- required if you want to restart replication

Note: The PRIMARY and REPLICA servers must already have SSL/TLS enabled and have each others' CA certificates in their trusted CA certificates files.
SSL/TLS mutual authentication procedures are provided in subsequent recommendations. For other implementation options, remediate mutual authentication issues as part of this recommendation.

Default Value:

By default, replication traffic is not secured with encryption or other protections.

See Also

https://workbench.cisecurity.org/benchmarks/12270