AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - SessionCryptoCipher

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Generating a session identifier (ID) that is not easily guessed through brute force is essential to deter several types of session attacks. By knowing the session ID, an attacker can hijack a user session that has already been user authenticated by the hosted application. The attacker does not need to guess user identifiers and passwords or have a secure token since the user session has already been authenticated.

Generating session IDs that are at least 128 bits (16 bytes) in length will cause an attacker to take a large amount of time and resources to guess, reducing the likelihood of an attacker guessing a session ID.

Solution

Configure the web server to generate session identifiers that are at least 128 bits in length.

Ensure that 'session_crypto_module' is enabled.

Determine the location of the 'httpd.conf' file by running the following command:

httpd -V

Review the 'HTTPD_ROOT' path.

Navigate to the 'HTTPD_ROOT'/conf directory.

Edit the 'httpd.conf' file.

SessionCryptoCipher aes256

Restart Apache: apachectl restart

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apache_Server_2-4_Unix_Y24M01_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001188, Rule-ID|SV-214252r881435_rule, STIG-ID|AS24-U1-000510, STIG-Legacy|SV-102775, STIG-Legacy|V-92687, Vuln-ID|V-214252

Plugin: Unix

Control ID: 8f5d72d138aa0677def6e2492933c1a832383f39dc2919021b77f43617359ef6