2.4.1 Ensure NGINX only listens for network connections on authorized ports

Information

NGINX should be configured to listen only on authorized ports and protocols. While traditional HTTP/1.1 and HTTP/2 use TCP ports 80 and 443, modern HTTP/3 (QUIC) utilizes UDP port 443 . Ensuring that NGINX binds only to approved interfaces and ports minimizes the attack surface.

Limiting listening ports to authorized values ensures that no hidden or unintended services are exposed via NGINX. It also enforces strict control over which protocols (TCP vs. UDP) are accessible, which is particularly important with the introduction of UDP-based HTTP/3 traffic alongside traditional TCP traffic.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Remove or comment out any listen directives that bind to unauthorized ports.

For HTTP/3 (QUIC) Support: Ensure that you explicitly authorize and configure UDP port 443 in addition to TCP port 443.

server {

# Standard HTTPS (TCP)
listen 443 ssl;

# HTTP/3 (UDP)
listen 443 quic reuseport;

# ... SSL/TLS configuration ...
}

Impact:

Disabling unused ports reduces the risk of unauthorized access. However, administrators must be aware that disabling UDP port 443 will break HTTP/3 connectivity, forcing clients to fall back to slower TCP-based HTTP/2 or HTTP/1.1.

See Also

https://workbench.cisecurity.org/benchmarks/18528

Item Details

Category: PLANNING, SYSTEM AND SERVICES ACQUISITION

References: 800-53|PL-8, 800-53|SA-8, CSCv7|9.2

Plugin: Unix

Control ID: 4f86fa999f5edaacc04bd7f5ee4c0b8bafccc403d2107a0994c1b10d62d86c60