[LON-CAPA-admin] PCI Compliance

Stuart Raeburn raeburn at msu.edu
Thu Jan 3 22:36:29 EST 2013


Hi,

Some clarifications ...

> Can be solved by switched to HTTPS, but to avoid warnings, you need   
> a purchased certificate. Nothing we can do about it.

Certificates are available for use with HTTPS that are free and will  
not cause the client browser to display warnings (e.g., the class 1  
certs from http://www.startssl.com/)

Class 1 certs support one signed certificate per server (i.e., no  
warning for the hostname, but aliases will display a warning) and you  
need to be able to receive e-mail for the top level domain in order to  
submit the certificate signing request.

I use these certs for a number of LON-CAPA Academic Consortium  
services, e.g., https://support.loncapa.org and  
https://testdrive.loncapa.org
as I receive e-mail sent to postmaster for the top level domain (loncapa.org).

>> vulnerable Apache version 2.2.3
>
> Should be updated anyway.
>

If the scan is simply reporting the information from the response header:

Server: Apache/2.2.3 (CentOS)

then that is likely an incomplete picture, given that the change log  
in the .spec file for 2.2.3-65 for CentOS 5 -- the latest Apache  
available for this distro, and released November 12, 2012 -- lists  
security fixes for 26 different CVE vulnerabilities (see below) since  
the original 2.2.3 (July 2006).

For the majority of packages used by LON-CAPA (including Apache) the  
latest package provided by the distro vendor/maintainer (e.g., in  
updates) will be the one in use.  It has been my practice to only  
provide rpms/debs in the repos at install.loncapa.org for packages  
unavailable from a distro's standard repos, or those for which a newer  
version is needed, e.g., gnuplot 4.4 for LON-CAPA 2.11.

The .spec file for httpd-2.2.3-65.el5.centos.3 includes 65 patches  
since the original 2.2.3 (July 2006), and the change log lists the  
following security fixes:

CVE-2012-0053, CVE-2012-0031, CVE-2011-3607, CVE-2011-3192, CVE-2011-3368,
CVE-2011-3192, CVE-2010-1452, CVE-2010-2791, CVE-2009-3555,  
CVE-2009-3555, CVE-2009-3094, CVE-2009-3095, CVE-2009-1890,  
CVE-2009-1891  CVE-2008-1678, CVE-2009-1195, CVE-2008-2939,  
CVE-2007-6388, CVE-2007-6421, CVE-2007-6422, CVE-2007-4465,  
CVE-2007-5000, CVE-2007-3847, CVE-2007-1863, CVE-2007-3304,
CVE-2006-5752


Stuart Raeburn
LON-CAPA Academic Consortium


Quoting Gerd Kortemeyer <korte at lite.msu.edu>:

> Hi,
>
> On Jan 3, 2013, at 8:42 PM, Michael Dugdale   
> <michael.dugdale at johnabbott.qc.ca> wrote:
>>
>> Out of curiosity, some of the items are Apache defaults that are   
>> easy to disable in https.conf
>>> webserver autoindex enabled
>>> HTTP TRACE/TRACK Methods allowed
>>
>>
>> Are these needed for the proper functioning of LON-CAPA, or can   
>> they be safely disabled?
>
> Nope, we don't need it. It would be a good idea to disable.
>
>>
>> port 541 (osiris host IDS agent) open - need to close this port
>
> We don't need this port, can be closed on the operation system level.
>
>
>>
>> webserver autoindex enabled
>
> We don't need this, but it's actually not generally active anyway,   
> as LON-CAPA interferes. Disable in Apache.
>
>>
>> vulnerable Apache version 2.2.3
>
> Should be updated anyway.
>
>
>>
>> HTTP TRACE/TRACK Methods allowed
>
> Can be disabled.
>
>>
>> vulnerable web program (iFoto)
>
>
> Huh? No idea where this comes from.
>
>>
>> HTML page uses cleartext form-based authentication (/adm/roles)
>>
>> HTML page uses cleartext form-based authentication (/adm/menu)
>>
>> HTML page uses cleartext form-based authentication   
>> (/adm/login?username=&domain=)
>>
>> HTML page uses cleartext form-based authentication (/adm/login)
>
>
> Can be solved by switched to HTTPS, but to avoid warnings, you need   
> a purchased certificate. Nothing we can do about it.
>
>
>>
>> web program allows cross-site scripting in query string (/adm/login)
>>
>> web program allows cross-site scripting in query string (/adm/helpdesk)
>
> Disable helpdesk in domain configuration.
>
>>
>> web server allows cross-site tracing
>
> See above.
>
>>
>> cross-site scripting vulnerability in orgurl parameter to /adm/helpdesk
>
> See above.
>
> - Gerd.





More information about the LON-CAPA-admin mailing list