OH12-1X-000202 - OHS must have the SSLSessionCacheTimeout directive set properly.

Information

During an SSL session, information about the session is stored in the global/inter-process SSL Session Cache, the OpenSSL internal memory cache and for sessions resumed by TLS session resumption (RFC 5077). This information must not be allowed to live forever, but expire and become invalid so that an attacker cannot hijack the session if not closed by the hosted application properly.

Solution

1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/ssl.conf with an editor.

2. Search for the 'SSLSessionCacheTimeout' directive at the OHS server configuration scope.

3. Set the 'SSLSessionCacheTimeout' directive to '60', add the directive if it does not exist.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_HTTP_Server_12-1-3_V2R3_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-221440r961863_rule, STIG-ID|OH12-1X-000202, STIG-Legacy|SV-79133, STIG-Legacy|V-64643, Vuln-ID|V-221440

Plugin: Unix

Control ID: cdd5168ac521c018ae2c5966761387da5bffc9b6658c0e954e8bf90a33171e99