VCRP-70-000002 - Envoy must set a limit on established connections.

Information

Envoy client connections must be limited to preserve system resources and continue servicing connections without interruption. Without a limit set, the system would be vulnerable to a trivial denial-of-service attack where connections are created en masse and vCenter resources are entirely consumed.

Envoy comes hard coded with a tested and supported value for 'maxHttpsConnections' that must be verified and maintained.

Solution

Navigate to and open:

/etc/vmware-rhttpproxy/config.xml

Locate the <config>/<envoy>/<L4Filter> block and configure <maxHttpsConnections> as follows:

<maxHttpsConnections>2048</maxHttpsConnections>

Restart the service for changes to take effect.

# vmon-cli --restart rhttpproxy

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_7-0_Y23M07_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-10, CAT|II, CCI|CCI-000054, Rule-ID|SV-256738r889152_rule, STIG-ID|VCRP-70-000002, Vuln-ID|V-256738

Plugin: Unix

Control ID: 258763028af7205235c563274ab8d881af96cfe32e4ecd275ea06703bdea23f9