Check: SRG-APP-000219-WSR-000191
Web Server SRG:
SRG-APP-000219-WSR-000191
(in versions v4 r2 through v3 r3)
Title
The web server must restrict a consistent inbound source IP for the entire user session. (Unknown impact)
Discussion
Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false information into sessions. Application communication sessions are protected utilizing transport encryption protocols, such as TLS. TLS provides web applications with a means to be able to authenticate user sessions and encrypt application traffic. Session authentication can be single (one way) or mutual (two way) in nature. Single authentication authenticates the server for the client, whereas mutual authentication provides a means for both the client and the server to authenticate each other. This requirement addresses communications protection at the application session, versus the network packet, and establishes grounds for confidence at both ends of communications sessions in ongoing identities of other parties and in the validity of information transmitted. Depending on the required degree of confidentiality and integrity, web services will require the use of TLS mutual authentication (two-way/bidirectional).
Check Content
Verify the web server limits authenticated user sessions to a consistent inbound IP for the entire user session If the web server does not limit authenticated user sessions to a consistent inbound IP for the entire user session, this is a finding.
Fix Text
Configure the web server to restrict the user session to a consistent inbound IP for the entire user session.
Additional Identifiers
Rule ID: SV-264361r984428_rule
Vulnerability ID: V-264361
Group Title: SRG-APP-000219
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001184 |
Protect the authenticity of communications sessions. |
Controls
Number | Title |
---|---|
SC-23 |
Session Authenticity |