TCAT-AS-000040 - TLS 1.2 must be used on secured HTTP connectors.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Using older versions of TLS introduces security vulnerabilities that exist in the older versions of the protocol. Tomcat by default will use all available versions of the SSL/TLS protocols unless the version is explicitly defined in the SSL configuration attribute for the associated connector. This introduces the opportunity for the client to negotiate the use of an older protocol version and increases the risk of compromise of the Tomcat server.

All connectors must use TLS 1.2. While this check specifically verifies the use of TLSv1.2, it does not provide all of the steps required to successfully configure a secured TLS connection. That task involves multiple additional steps that are not included here. Refer to Tomcat documentation for all of the steps needed to create a TLS protected connector.

Satisfies: SRG-APP-000015-AS-000010, SRG-APP-000172-AS-000120, SRG-APP-000439-AS-000155

Solution

As a privileged user on the Tomcat server, edit the $CATALINA_BASE/conf/server.xml and modify the <Connector/> element.

Add the 'SSLEnabledProtocols=' flag to the connector or modify the existing flag.

Set SSLEnabledProtocols='TLSv1.2'. Save the server.xml file and restart Tomcat:
sudo systemctl restart tomcat
sudo systemctl reload-daemon

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apache_Tomcat_Application_Server_9_V2R4_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000197, CCI|CCI-001453, CCI|CCI-002418, Rule-ID|SV-222929r615938_rule, STIG-ID|TCAT-AS-000040, STIG-Legacy|SV-111547, STIG-Legacy|V-102433, Vuln-ID|V-222929

Plugin: Unix

Control ID: a94f0026a02a0e8988225a5a31fa6e6afcb6507f1cdcf2995f654953e3920707