UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

HAProxy must redirect all http traffic to use https.


Overview

Finding ID Version Rule ID IA Controls Severity
V-89185 VRAU-HA-000335 SV-99835r1_rule High
Description
Remote access to the web server is any access that communicates through an external, non-organization-controlled network. Remote access can be used to access hosted applications or to perform management functions. A web server can be accessed remotely and must be able to enforce remote access policy requirements or work in conjunction with enterprise tools designed to enforce policy requirements. vRA can be configured to redirect unencrypted, http port 80, traffic to use the encrypted, https port 443.
STIG Date
VMW vRealize Automation 7.x HA Proxy Security Technical Implementation Guide 2018-10-12

Details

Check Text ( C-88877r1_chk )
At the command prompt, execute the following command:

grep 'redirect scheme https' /etc/haproxy/conf.d/20-vcac.cfg

Note: the command should return this line:

'redirect scheme https if !{ ssl_fc }'

If the command does not return the expected line, this is a finding.
Fix Text (F-95927r1_fix)
Navigate to and open /etc/haproxy/conf.d/20-vcac.cfg

Navigate to the "frontend https-in" section.

In the "frontend https-in" section, add the 'redirect scheme https if !{ ssl_fc }' option before all 'acl' options.