UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

HAProxy must use SSL/TLS protocols in order to secure passwords during transmission from the client.


Overview

Finding ID Version Rule ID IA Controls Severity
V-240062 VRAU-HA-000190 SV-240062r879609_rule Medium
Description
Data used to authenticate, especially passwords, needs to be protected at all times, and encryption is the standard method for protecting authentication data during transmission. Even when data is passed through a load balancer, data used to authenticate users must be sent via SSL/TLS.
STIG Date
VMW vRealize Automation 7.x HA Proxy Security Technical Implementation Guide 2023-09-12

Details

Check Text ( C-43295r665353_chk )
At the command line execute the following command:

cat /etc/haproxy/conf.d/20-vcac.cfg | awk '$0 ~ /bind.*:80/ || $0 ~ /redirect.*ssl_fc/ {print}'

If the command does not return the two lines below, this is a finding.

bind 0.0.0.0:80
redirect scheme https if !{ ssl_fc }
Fix Text (F-43254r665354_fix)
Navigate to and open /etc/haproxy/conf.d/20-vcac.cfg

Navigate to and configure the "frontend https-in" section with the following two values:

bind 0.0.0.0:80
redirect scheme https if !{ ssl_fc }